Entries |
Document | Title | Date |
20080209281 | Storage device and control device - Data in a storage medium is scanned while a storage device is in an idle state. A proportion of scanned data in entire data in the storage medium is compared with a threshold value. If the proportion of the scanned data is less than the threshold value, an unscanned data in the storage medium is scanned during a time interval between commands received by the storage device from outside. The process is repeated until the proportion of the scanned data is equal to or more than the threshold value. | 08-28-2008 |
20080229157 | Performing Externally Assisted Calls in a Heterogeneous Processing Complex - A mechanism is provided for accessing, by an application running on a first processor, operating system services from an operating system running on a second processor by performing an assisted call. A data plane processor first constructs a parameter area based on the input and output parameters for the function that requires control processor assistance. The current values for the input parameters are copied into the parameter area. An assisted call message is generated based on a combination of a pointer to the parameter area and a specific library function opcode for the library function that is being called. The assisted call message is placed into the processor's stack immediately following a stop-and-signal instruction. The control plane processor is signaled to perform the library function corresponding to the opcode on behalf of the data plane processor by executing a stop and signal instruction. | 09-18-2008 |
20080270853 | Method of Routing I/O Adapter Error Messages in a Multi-Host Environment - A method and apparatus is provided for routing error messages in a distributed computer system comprising multiple root nodes, and further comprising one or more PCI switches and one or more I/O adapters, wherein each root node includes one or more system images. In one useful embodiment, a method is provided for routing I/O error messages to root nodes respectively associated with the errors contained in the messages. The method includes detecting occurrence of an error at a specified one of the adapters, wherein the error affects one of the system images, and generating an error message at the specified adapter. The method further comprises routing the error message from the specified adapter to the particular root node that includes the affected system image. The error message is then selectively processed at the particular root node, in order to identify the affected system image. Usefully, the step of routing the error message includes using a bus/device/function number associated with the error, together with a routing table located in one of the PCI switches, to route the error message to the correct root node and system image. | 10-30-2008 |
20080288829 | METHOD AND APPARATUS FOR VERIFYING DATA IN A STORAGE SYSTEM - A method for verifying data in a storage system is disclosed. A host computer transmits area management data to a storage controller. The area management data specifies a range of a storage area in a storage device to be used by an application program having a mechanism for verifying data suitability. Upon receipt of an input/output request transmitted from the host computer, the storage controller performs verification, which is usually performed by the application program, of the data that is to be processed according to the data input/output request and to be input/output to/from the storage area, which is specified in accordance with the received area management data. | 11-20-2008 |
20080313507 | Software reliability analysis using alerts, asserts and user interface controls - Described is a technology by which software instrumentation data collected during software program usage sessions is analyzed to identify potential problems with software program usage, such as based on frequency of problem occurrence during the usage sessions. Reliability metrics may be calculated from the information. Failure data additionally collected during the usage sessions may be accessed to derive details that correspond to the potential problems. In one example, the information may be analyzed to determine which alerts and/or asserts occurred most often, and/or to determine a relationship between user interface control operations (e.g., clicks and usage of commands) and alerts or asserts. | 12-18-2008 |
20090006904 | APPARATUS AND METHOD TO CHECK DATA INTEGRITY WHEN HANDLING DATA - An apparatus and method to check integrity when handling data. The method provides a storage array which includes a plurality of sectors. The method defines (N) data state identifiers and (N) parity state identifiers. The method receives a command to handle data, where that command designates a target sector. The method determines the data state identifier assigned to the target sector, determines the parity state identifier assigned to the target sector, and compares the data state identifier and the parity state identifier. If the method determines that the data state identifier and the parity state identifier are the same, the method performs the command to handle data. Alternatively, if the method determines that the data state identifier and the parity state identifier differ, the method generates an error message. | 01-01-2009 |
20090013220 | Data Collecting Apparatus and Gateway Apparatus - This invention intends to provide a data collecting apparatus and a gateway apparatus capable of reducing the labor for setting the threshold value or condition used for a real running point, reducing the number of cases where the threshold value or condition is erroneously set and setting the threshold value or condition within a narrow range. | 01-08-2009 |
20090024880 | System and method for triggering control over abnormal program termination - Methods and systems for handling errors in applications are provided. A comparison may be executed to confirm that actual results are in accordance with expected results. If the comparison results in an application error, a special execution software object is executed. The special execution software object obtains and maintains a copy of the application context associated with the application error found. A user may then view the application context to determine the source of the error. A logbook may be maintained to store all of the application errors and associated application contexts. | 01-22-2009 |
20090031177 | Method for providing download and upload service in network control system - The present invention relates to a method for providing a download and upload service using variable length packet communication in a living network control system. For example, a user located inside or outside a house controls or monitors operations or operation states of various appliances such as refrigerator or laundry machine through a living network installed at home, such as a RS-485 network, small output network, or power line network so that convenience of remote control and supervision can be provided to a user. Further, in a case where a download or upload service is executed in a living network in which various appliances connected thereto, variable length packet communication, which is capable of diving data by the buffer size of a device, and then sending and assembling the data, is used so that a download and upload service for various appliances connected through the living network can be more effectively executed. | 01-29-2009 |
20090037781 | CORRECTING INTERMITTENT ERRORS IN DATA STORAGE STRUCTURES - Embodiments of apparatuses and methods for correcting intermittent errors in data storage structures are disclosed. In one embodiment, an apparatus includes a data storage location, error detection logic, inverting logic, control logic, operating logic, and evaluation logic. The error detection logic is to detect an error in a data value read from the data storage location. The inverting logic is to invert the erroneous data value to produce an inverted erroneous data value. The control logic is to cause the inverted erroneous data value to be stored in the data storage location and subsequently read from the data storage location to produce an operand value. The operating logic is to perform a logical operation using the erroneous data value and the operand value. The evaluation logic is to evaluate the result to determine if the error is a soft error. | 02-05-2009 |
20090063909 | VARIABLE OSCILLATOR FOR GENERATING DIFFERENT FREQUENCIES IN A CONTROLLER AREA NETWORK - A device suitable for use as a module in a Controller Area Network (CAN) system with a bus or connection includes relatively simple and inexpensive components, including an oscillator that generates a number of different frequencies in response to directions from a microcomputer. A CAN Controller receiving the frequencies is connected to the bus via a transceiver. The device has utility for verification and validation work in association with a CAN system. | 03-05-2009 |
20090077428 | Software Method And System For Controlling And Observing Computer Networking Devices - Mechanisms for managing the keyboard, video or mouse commands at a target device, which may be a computer or non-computer. During a boot up cycle, the present subject matter uses the intelligent platform management interface and a BIOS management application to receive keyboard or video signals from the BIOS, convert the signals to internet protocol format, and transmit those signals to a managing computer. Controls signals may be transmitted from the managing computer to the target device. After the boot up cycle, the target device may be configured to cause the management of the computer to be transferred from the BIOS management application to an operating system management application. During normal operation, the operating system management application provides for the ability to receive at the target computer keyboard, video or mouse signals and to transmit to the managing computer keyboard, video or mouse signals generated at the target device. | 03-19-2009 |
20090113254 | System management apparatus and method for multi-shelf modular computing system - The invention provides a system management apparatus for a multi-shelf modular computing system. The system management apparatus receives and parses an alert information in response to an abnormal parameter/state relative to a component of the multi-shelf modular computing system sent from a shelf management device of the multi-shelf modular computing system, and stores the parsed alert information into a storage module. Then, the system management apparatus periodically retrieves the parsed alert information, if any, from the storage module and generates a visual alert information indicating the abnormal parameter/state. Thereby, a user can view the visual alert information to perceive the abnormal parameter/state rapidly and intuitively, so as to take corresponding measures. | 04-30-2009 |
20090132867 | MEDIA FOR USING PARALLEL PROCESSING CONSTRUCTS - One or more computer-readable media store executable instructions that, when executed by processing logic, perform parallel processing. The media store one or more instructions for receiving one or more portions of an inner context of a program created for a technical computing environment, allocating one or more portions of the inner context of the program to two or more labs for parallel execution, receiving one or more results associated with the parallel execution of the one or more portions from the two or more labs, and providing the one or more results to an outer context of the program. | 05-21-2009 |
20090144588 | FINITE STATE MACHINE ERROR RECOVERY - The use of a simple (e.g., magnitude comparator) circuit, and of a flag bit, for detecting and preventing errors from occurring in the FSM state bits that could otherwise cause the system to hang. Preferably, the flag bit is set with all the valid state transitions, and a magnitude comparator (for instance) is used to continuously monitor the value of the current state bits. When a FSM state transition occurs based on the flag bit and the output of the magnitude comparator, a potential error condition can be detected and the FSM transition can be blocked or the FSM can be safely transitioned into a predetermined “reset state”. | 06-04-2009 |
20090177930 | TIMING CONTROLLER, ERROR DETECTION METHOD OF THE TIMING CONTROLLER, AND DISPLAY DEVICE HAVING THE TIMING CONTROLLER - A timing controller includes a control unit, an error signal generating unit, and an operation detecting unit. The control unit transfers a plurality of input data and outputs a plurality of completion signals according to transfer states of the respective data. The error signal generating unit generates a plurality of error signals with different waveforms, and the operation detecting unit selectively outputs one of the plurality of error signals in response to the plurality of completion signals. | 07-09-2009 |
20090217109 | ENHANCED PRESENCE ROUTING AND ROSTER FIDELITY BY PROACTIVE CRASHED ENDPOINT DETECTION - Endpoint crashes in a real time communication system are detected by a home server providing presence and other services to the endpoint upon receipt of an error message from an access server between the endpoint and the home server. The home server uses a cookie inserted into a dialog between itself and the endpoint identifying the endpoint, a session state created by the access server identifying the endpoint, or a transaction state maintained by the home server to look up the endpoint associated with the error message. Race conditions occurring when an endpoint crashes and recovers rapidly can be avoided employing a timestamp or sequence number incremented for each new endpoint registration and comparing a current timestamp or sequence number to the stored one before updating records at the home server. By notifying other subscribers about crashed endpoints, routing fidelity is enhanced. | 08-27-2009 |
20090249132 | Data Processing Apparatus and Method of Verifying Programs - According to one embodiment, an information processing apparatus includes a plurality of execution modules, a system memory shared by the plurality or execution modules, and a scheduler which controls assignment of a plurality of basic modules to the plurality of execution modules in order to execute a program in parallel by the plurality of execution modules. The scheduler saves data items, which is to be input by the execution modules as input data items of the basic modules and is stored in the storage areas of the system memory, in other storage areas of the system memory before the basic modules are executed, and compares the data items stored in the storage areas of the system memory and accessed by the execution modules with the data items saved in the other storage areas of the system memory after the basic modules have been executed. | 10-01-2009 |
20090271666 | MESSAGE PROCESSING DEVICE AND METHOD THEREOF - There are provided a message processing device and a method improved to store a plenty of messages used for processing. When a message is transmitted to another node for providing a service, a message processing unit ( | 10-29-2009 |
20090300433 | INFORMATION PROCESSING APPARATUS, MEDIUM RECORDING ERROR NOTIFICATION PROGRAM, AND ERROR NOTIFICATION METHOD - There is provided an information processing apparatus that includes a CPU board | 12-03-2009 |
20090307536 | METHOD FOR PROTECTING SOFTWARE PROGRAMS - In order to protect a software program, at least one corruption function is included in the program. Also included in the program is at least one instruction that causes the program to be directed to the corruption function. An available breakpoint is then set such that, when the starting location of the corruption function is reached, an exception is generated and the handling of the exception causes the corruption function not to run. This has the effect that, if a malicious user attempts to use the available hardware breakpoint to perform unauthorized actions on the software program, the corruption function will run, and the software program will be unusable. | 12-10-2009 |
20090313509 | CONTROL METHOD FOR INFORMATION STORAGE APPARATUS, INFORMATION STORAGE APPARATUS, PROGRAM AND COMPUTER READABLE INFORMATION RECORDING MEDIUM - A control method for an information storage apparatus has the steps of: providing redundancy of information stored in the information storage apparatus; a redundancy failure recording part recording a record of a redundancy failure in a state recording part, when the failure has occurred in keeping of the redundant state of the information; a redundancy monitoring part reading the record of the redundancy failure from the state recording part the record; and a reporting part reporting the redundancy failure when the record of the redundancy failure is read by the redundancy monitoring part. | 12-17-2009 |
20090327818 | MULTI-CORE ENGINE FOR DETECTING BIT ERRORS - The following description includes a method and a system of detecting bit errors in a multi-core processor. When a subatomic particle, or other matter, impacts the processing cores of the processor, bit flips may occur. To detect these bit flips and thereby prevent erroneous results, operations performed by one core are inversely performed by another core. By comparing the results of the original operation and the inverse operation, embodiments of the invention can detect errors in binary data. If an error is detected, then the operations are performed again. Alternatively, multiple cores do not perform inverse operations, but instead perform identical operations in parallel. The results from the parallel operations are compared and if the results are not identical, then the operations are repeated. | 12-31-2009 |
20090327819 | Fault Tolerant Distributed Mobile Architecture - A method, system and machine-readable storage medium for providing fault tolerance in a distributed mobile architecture (dMA) system. The method includes receiving a message or failing to receive the message within a predetermined time relating to a first dMA gateway (dMAG) at a second dMAG. It is determined whether the first dMAG is not operational or is otherwise offline based on the received message or the failure to receive the message. One or more dMA nodes associated with the first dMAG are notified in order to request connections to an external system via the second dMAG. The external system is also notified to request connections to one or more dMA nodes associated with the first dMAG via the second dMAG. | 12-31-2009 |
20100005345 | BIT SHADOWING IN A MEMORY SYSTEM - A communication interface device, system, method, and design structure for bit shadowing in a memory system are provided. The communication interface device includes shadow selection logic to select a driver bit position as a shadowed driver value, and line drivers to transmit data for the selected driver bit position and the shadowed driver value on separate link segments of a bus. The communication interface device also includes shadow compare logic to compare a selected received value with a shadowed received value from the bus and identify a miscompare in response to a mismatch of the compare, and shadow counters to count a rate of the miscompare relative to a bus error rate over a period of time. A defective link segment is identified in response to the rate of the miscompare within a predefined threshold of the bus error rate. | 01-07-2010 |
20100011258 | Coordinating the Execution of System and Database Scripts in a Database Server - An administrator can specify a script sequence including one or more system scripts and database scripts. A graphical user interface is provided to allow the administrator to specify an execution order of individual scripts in the script sequence and a timeout interval for when the script sequence will complete. Once the script sequence is specified, the script sequence can be run without further intervention by the administrator. | 01-14-2010 |
20100023813 | Data Filtering Method - The invention discloses a data filtering method for filtering a 3G data stream which is received. The data filtering method according to the invention includes the following steps. At first, a step (a) of receiving a 3G data stream continually is performed. Then, a step (b) of determining whether the 3G data stream comprises a complete filtering unit is performed. If the 3G data stream comprises a complete filtering unit, a step (c) of determining whether the 3G data stream includes invalid data is performed. If the 3G data stream includes invalid data, a step (d) of marking the invalid data according to a predetermined protocol is performed. Finally, a step (e) of filtering out the marked invalid data is performed. | 01-28-2010 |
20100037104 | IMAGE FORMING APPARATUS AND METHOD OF CONTROLLING APPLICATION THEREOF - A method to control an application installed on an image forming apparatus includes checking current status information of the image forming apparatus, comparing the checked current status information with executability information to execute a pre-stored application, and if the application is executable as a result of the comparing, executing the application, and if the application is not executable, displaying information that the application is not executable. | 02-11-2010 |
20100058119 | SYSTEM AND METHOD FOR MANAGING NON-VOLATILE MEMORY BASED ON HEALTH - An invention is provided for managing non-volatile memory having a plurality of memory blocks and a plurality of error values associated with the memory blocks. The method includes recording an error value indicating a number of errors occurring in a memory block during an operation accessing the memory block. The error values can then be aggregated to calculate an overall health of the memory, or used individually, for example, by selecting a memory block for a memory operation based on the associated error value. In general, the error value is updated when the most recent number of errors occurring in the memory block during an operation accessing the memory block is greater than a current recorded value. | 03-04-2010 |
20100083058 | Method And System Of Installing A Program On A First Computer, And Dulpicating The Installation On A Second Computer - Installing a program on a first or primary computer system, and duplicating the installation on a second or secondary computer system. At least some of the illustrative embodiments are methods comprising installing a software program on a first computer system by way of a human interacting with the first computer system (the installing by way of a plurality of operations), programmatically duplicating each operation on a second computer system coupled to the first computer system (the duplicating of each operation on the second computer system in real time with each operation on the first computer system), programmatically analyzing a result of each operation on the first computer system against a result of each operation on the second computer system, and notifying the human (by way of the first computer system) when the result of the operation on the second computer system is unexpected. | 04-01-2010 |
20100088554 | APPARATUS AND METHODS FOR CAPTURE OF FLOW CONTROL ERRORS IN CLOCK DOMAIN CROSSING DATA TRANSFERS - Apparatus methods for capturing flow control errors in FIFO exchanges between producing and consuming circuits operating in different clock domains. Tag information at the start of an exchange is transferred to a synchronizing component before data of a transfer transaction is entered in the FIFO. The tag information is also associated with each unit of data transferred to the FIFO by the producing circuit. The synchronizing component verifies the each unit of data retrieved by the consuming circuit has the expected tag information associated therewith and signals an error is the tag information does not match. Thus an error by the producing circuit in entering too much or too little data for a transfer is detected before erroneous data is retrieved and processed by the consuming circuit. | 04-08-2010 |
20100088555 | Method for encoding a contactless switching system - An embodiment of the invention relates to a contactless switching system and an embodiment relates to a method for encoding same with at least one sensor and at least one signal generator, where the signal generator sends at least one data sequence and the sensor receives the data sequence. In at least one embodiment, an aim is to specify a technical teaching for encoding a contactless switching system inexpensively and in a versatile fashion. To this end, at least one embodiment of the invention proposes anchoring user-implementable encoding in the checksum of the data sequence or the checksum computation code, so that the checksum which the data sequence contains is used to check the quality of the data transmission and at the same time to implement the encoding. | 04-08-2010 |
20100107017 | Method to Isolate Crash of an Embedded Multi-Threaded Application to a Shared Library Call Without Core Dump Files or Debugger - The present disclosure relates in general to embedded information handling systems, and more particularly to systems and methods for isolating a crash of an embedded multi-threaded application to a shared library call in embedded information handling systems. | 04-29-2010 |
20100115346 | METHOD FOR PROCESSING CONTENT AND TERMINAL THEREOF - Disclosed is a method for processing a DCD content in a DCD (Dynamic Content Delivery). When a DCD content is delivered between a server and a terminal in a DCD service system, a client of the terminal delivers the DCD content to a DECA (DCD Enabled Client Application) of the terminal. If the DECA cannot play (execute) the content, the DECA sends to the client an error notification message and a generated status value (information about device capabilities of the terminal), and the client sends the error notification message and the status value to the server. Accordingly, if an error informing that the content received from the server cannot be played has occurred, the error is processed between the terminal and the server from the point of the terminal. | 05-06-2010 |
20100122123 | METHOD FOR GUARANTEEING CONSISTENCY OF FUNCTIONAL PARTS ACROSS A SOFTWARE INSTALLATION IN A COMPUTER - A method for guaranteeing consistency of functional parts across a software installation in a computer that is platform and language independent. Specifically, each software installation will contain a part, for example a DLL that exports a function or variable, which is available to other parts in the installation. All other parts in the installation, for example, executable files and other DLLs, will reference the exported resource. The name of the exported resource should evoke a particular software level and be specific to the software installation it belongs to. All other software installations on the same computer will follow this practice. Thus, all parts in a software installation will effectively reference a software level (via an exported resource). When the multiple parts of software are loaded into computer memory prior to execution of the software, the operating system will attempt to resolve references to the exported resource. If a software part has been modified such that it refers to an inconsistent export resource, the operating system will produce an error at software load time, immediately identifying the inconsistent part. | 05-13-2010 |
20100125762 | Form Validation with Table Driven Error Handling - Various embodiments provide a validation framework to validate whether data entered in a web application is valid. The framework includes a validation resource that contains a validation rule for the web application. The framework also includes a validation group web control that can generate client validation script that is useable by a client to validate whether the entered data is valid. In at least some embodiments, an event table that specifies the validation rules is used to present an error message when the entered data is not valid. | 05-20-2010 |
20100138701 | Method and System for Retrieving Diagnostic Information - A system, method, and apparatus for retrieving trouble codes from an equipment under diagnosis and retrieving only relevant diagnostic information relative to the returned codes from one or more remote diagnostic libraries. An electronic diagnostic library contains diagnostic vehicle information tagged with trouble code identification ID's at a first location, and a diagnostic tool at a second location requests only relevant diagnostic information from the electronic library that is tagged with trouble code identification ID's corresponding to the retrieved trouble codes and information identifying the equipment under diagnosis. The diagnostic tool receives the specific diagnostic vehicle information at the first location and may store the specific vehicle information locally prior to displaying an index to the information to a repair technician. | 06-03-2010 |
20100153791 | MANAGING BY ONE PROCESS STATE OF ANOTHER PROCESS TO FACILITATE HANDLING OF ERROR CONDITIONS - One process of a processing environment maintains state on behalf of another process of the processing environment, and uses that state to determine if a problem exists with the another process. The one process is a non-volatile process, while the another process is a volatile process. | 06-17-2010 |
20100162053 | ERROR DETECTION METHOD AND A SYSTEM INCLUDING ONE OR MORE MEMORY DEVICES - A system including one or more memory devices, and an error detection and correction method are disclosed. A memory device of the system includes an input for receiving a packet. A first portion of the packet may include at least one command byte, and a second portion of the packet may include parity bits to facilitate command error detection. The memory device may include an error manager configured to detect, based on the parity bits, whether an error exists in the at least one command byte, and circuitry configured to provide the packet to the error manager. | 06-24-2010 |
20100169718 | Metro Ethernet Connectivity Fault Management Acceleration - A network element disposed at an edge of a connectivity fault management (CFM) domain includes a switch fabric, a central processor (CP) card, and a line card in communication with the CP card through the switch fabric. The line card includes an Ethernet interface for transmitting and receiving Ethernet CFM frames over a network and circuitry configured to generate new continuity check messages (CCMs) periodically, to process CCMs received on each connection supported by the line card, and to detect a loss of continuity for any of the connections supported by the line card. The line card maintains a list of supported connections. A generate timer and an age counter are associated with each connection in the list. The line card generates a CCM for a given connection when the generate timer expires and detects a loss of continuity for the given connection when its age counter exceeds a threshold. | 07-01-2010 |
20100169719 | NETWORK FLOW VOLUME SCALING - Flow information records are identified and sorted out based on the sending and/or receiving customer. Prior art problems are overcome by using a combination of router identification, SNMP numbers and interface numbers to identify the source and destination of data flow records. A flow information packet containing one or more information flow records is received at a flow process and parsed to identify the router source. The datagram of the flow information packet is examined to identify an SNMP number associated with the source and/or destination affiliated with the flow information packet. Based on the SNMP number, the interface of the router associated with the datagram is identified and the records are accordingly sorted into buckets. The total traffic through the router interface for a period of time is obtained via an SNMP query and the data apportioned to a bucket is scaled based on the results. | 07-01-2010 |
20100229050 | APPARATUS HAVING FIRST BUS AND SECOND BUS CONNECTABLE TO I/O DEVICE, INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING APPARATUS - An apparatus connected to a first and second buses, the apparatus having a first controller that transforms first form data into second form data, transforms second form data into first form data, and outputs the transformed data, a second controller that transforms first form data into second form data, transforms second form data into first form data, and outputs the transformed data, a first distributing unit connected to the first and second controllers, the first distributing unit distributing first form data to the first and second controllers, respectively, a first selector that selects one of the second form data, and outputs the selected data, a second distributing unit connected to the first and the second controllers, the second distributing unit distributing second form data to the first and second controllers, respectively, and a second selector that selects one of the first form data, and outputs the selected data | 09-09-2010 |
20100241910 | METHOD AND SYSTEM FOR MAINTENANCE OF A DATA-PROCESSING APPARATUS - A method and system for performing one or more preventative maintenance functions for a data-processing apparatus. One or more notifications regarding daily maintenance functions can be generated in the form of a reminder when the data-processing apparatus begins operation. A history of the maintenance functions performed can be stored in a memory through remote data pushes. An email alert can be generated and transmitted to a user regarding incomplete maintenance functions in order to track the maintenance activities. The data-processing apparatus can be monitored in a consolidated manner and the occurrence of fault information stored and then rapidly retrieved to provide notifications indicative of such maintenance data. | 09-23-2010 |
20100251035 | PROGRAM, INFORMATION PROCESSING DEVICE, CONTENT PROCESSING METHOD, AND CONTENT PROCESSING SYSTEM - An information processing device includes: a receiving operation for receiving, from a transmission device, content and first verification data corresponding to divided content obtained by dividing the content; a detecting operation for detecting an error of the divided content based on second verification data to be calculated based on the divided content and the first verification data received in the receiving operation; and an obtaining operation for obtaining other divided content corresponding to the divided content having the error detected in the detecting operation from another information processing device different from the transmission device, when the error of the divided content is detected in the detecting operation. | 09-30-2010 |
20100262872 | METHOD AND APPARATUS FOR DETECTING COMMUNICATION ERRORS ON A BUS - A semiconductor memory includes multi-mode reporting signals, a state register, and parity detectors. The parity detector determines whether signals received on a communication bus contain a desired parity. The multi-mode reporting signals enable reporting of communication faults without adding additional signals to the semiconductor memory by being configured in a normal operating mode or a parity fault mode for reporting communication faults to an external memory controller. The state register enables storing of received values from the communication bus. With the state register, a memory controller may determine correctly received signal patterns and failing signal patterns. Parity may be defined as even or odd and may be generated based on various signal configurations. The invention may be configured as a computing system comprising a processor, an input device, an output device, the memory controller, and at least one semiconductor memory. | 10-14-2010 |
20100275070 | CONVERSION OF A CLASS ORIENTED DATA FLOW PROGRAM WITH INHERITANCE TO A STRUCTURE ORIENTED DATA FLOW PROGRAM - System and method for converting a class oriented data flow program to a structure oriented data flow program. A first data flow program is received, where the first data flow program is an object oriented program comprising instances of one or more classes, and wherein the first data flow program is executable to perform a first function. The first data flow program is automatically converted to a second data flow program, where the second data flow program does not include the instances of the one or more classes, and where the second data flow program is executable to perform the first function. The second data flow program is stored on a computer memory, where the second data flow program is configured to be deployed to a device, e.g., a programmable hardware element, and where the second data flow program is executable on the device to perform the first function. | 10-28-2010 |
20100281311 | METHOD AND SYSTEM FOR RECONSTRUCTING ERROR RESPONSE MESSAGES UNDER WEB APPLICATION ENVIRONMENT - A computer-implemented method and system for reconstructing a response message to an improper accessing request in a web application environment. The method includes: obtaining the URL of a web application to be accessed by the improper accessing request and the error parameter information of the improper accessing request; obtaining a response template based on the obtained URL of the web application to be accessed; and merging the obtained error parameter information of the improper accessing request with the obtained response template to generate a reconstructed response message for the improper accessing request. The system includes: a message obtaining device; a response message template obtaining device; and a response message merging device. | 11-04-2010 |
20100281312 | SERVER-BASED NOTIFICATION OF ALARM EVENT SUBSEQUENT TO COMMUNICATION FAILURE WITH ARMED SECURITY SYSTEM - A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is armed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay. | 11-04-2010 |
20100318858 | METHOD AND SYSTEM FOR AUDITING TRANSACTION DATA FROM DATABASE OPERATIONS - A method for validating SRS registry transaction data includes receiving OLTP transaction data from a first database, parsing the OLTP transaction data, and comparing the parsed OLTP transaction data to one or more of a set of profiles. Each of the one or more of the set of profiles includes metadata in XML files. The method also includes caching the parsed OLTP transaction data in a first data cache, receiving log data associated with the OLTP transaction data; and caching the log data in a second data cache. The method further includes correlating the parsed transaction data cached in the first data cache with the log data cached in the second data cache. | 12-16-2010 |
20100325495 | SYSTEMS AND METHOD FOR TRANSACTION STALL DETECTION AND PROPAGATING THE RESULT IN A MULTI-CORE ARCHITECTURE - The present invention is directed towards systems and methods for determining failure in and controlling access to a shared resource in a multi-core system. In some embodiments of a multi-core system, individual cores may share the same resource. Additionally, the resource may occasionally fail or need to be reset, and the period during which the resource is being reset may be non-instantaneous. In an embodiment without coordination between the cores, one core experiencing a failure may reset the resource. During the period in which the resource is resetting, another core may interpret the reset as a failure and reset the resource. As more cores interpret the resets as failures, they will trigger resets, quickly resulting in the resource being constantly reset and unavailable. Thus, in some embodiments, a coordination system may be utilized to determine failure of a shared resource and control resets and access to the shared resource. | 12-23-2010 |
20100332915 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION SERVICES FOR USER ENDPOINT DEVICES - A system that incorporates teachings of the present disclosure may include, for example, an edge device having a controller to receive a Session Initiation Protocol (SIP) message from a user endpoint device (UE) requesting communication services, forward the SIP message to a network element of a Server Office, receive from the network element a first error message indicating communication services at the Server Office are unavailable, replace the first error message with a second error message, the second error message indicating a temporary unavailability of communication services, and transmit the second error message to the UE. Additional embodiments are disclosed. | 12-30-2010 |
20100332916 | PORTABLE ELECTRONIC APPARATUS, PROCESSING APPARATUS FOR PORTABLE ELECTRONIC APPARATUS, AND DATA PROCESSING METHOD IN PORTABLE ELECTRONIC APPARATUS - A smart card comprises a storage unit in which various data are stored, a communication unit to perform data communication with an external apparatus, and a processing unit which executes processing corresponding to a command received via the communication unit. The processing unit of the smart card detects data judged to have data abnormality from the data stored in the storage unit in a case where the command received from the external apparatus is an abnormal data confirmation command, and notifies the external apparatus of response data including information indicating the data in which the data abnormality has been detected by the detection. | 12-30-2010 |
20100332917 | Control apparatus - A control apparatus controls a device to which the control apparatus is connected. The control apparatus includes a storing unit and a linking unit. The storing unit stores an error message that contains information on a failed component in a storage device upon receiving the error message from the device. The linking unit stores the error message and information on a replacement component, which has been installed in the device in place of the failed component, in the storage device in association with each other upon receiving the information on the replacement component. | 12-30-2010 |
20110010590 | ENTERPRISE BLACK BOX SYSTEM AND METHOD FOR DATA CENTERS - Enterprises are fast moving towards restructuring their IT infrastructure by exploiting the emerging models of data centers. In one extreme, the whole of application, storage, and network needs of an enterprise are to be managed by third party data centers. While the use of third party data centers is an attractive proposition for enterprises, it can potentially put their intellectual property in the form of applications and data assets under threat. There is a need for a system that is a part of a data center but owned by an enterprise that provides a single point of entry and exit for interacting and communicating with the data center and the enterprise relies on this system to obtain an insight into the functioning and behavior of the data center. | 01-13-2011 |
20110022901 | METHOD FOR TESTING HARD DISKS UNDER AN EXTENSIBLE FIRMWARE INTERFACE - A method for testing hard disks under an extensible firmware interface (EFI) provides a device tree of hard disks. Nodes of the device tree represent block devices or file systems of the hard disks. Devices paths and handles corresponding to each of the device paths are obtained from the device tree. Parent controller handles of each of the device paths are obtained. If there are parent controller handles the same as the obtained handles, the parent controller handles the same as the obtained handles are deleted. The computer determines that a number of the hard disks is equal to a number of the device paths corresponding to the remained parent controller handles. Nodes information of each of the device paths corresponding to the remained parent controller handles are determined as hard disk information of each of the hard disks. | 01-27-2011 |
20110047417 | METHOD AND SYSTEM FOR ERROR DETECTION IN PATTERN DEFINITIONS - A method and system for detecting errors in stored pattern definitions. The method describes structuring a pattern definition into a specified format and creating a pattern definition file. The structured pattern definition contents are hashed to generate a filename for the pattern definition file. This filename, along with a corresponding identifier, is added to an identifier document. Each filename in the identifier document is compared with all other filenames to determine a degree of overlap. A potential error is indicated if a filename substantially matches any of the other filenames in the identifier document. | 02-24-2011 |
20110055640 | METHOD AND SYSTEM FOR EXCEPTION DETECTING AND ALERTING - Methods and system for exception detecting and alerting are described. An exception indicating an occurrence of an error in an application and a path to the exception in an application space may be received. The received exception may be compared to a stored exception in a prior version of an exception data structure to determine whether the received exception is a new exception. The exception data structure may include a plurality of stored exceptions. The results of the comparison may be provided. | 03-03-2011 |
20110072319 | Parallel Processing of ETL Jobs Involving Extensible Markup Language Documents - Techniques for running an Extract Transform Load (ETL) job in parallel on one or more processors wherein the ETL job comprises use of an extensible markup language (XML) document are provided. The techniques include receiving an XML document input, identifying a node in the XML document at which partitioning of the XML document is to begin, sending partition information to each respective processor, performing a shallow parsing of the XML document in parallel on the one or more processors, wherein each processor performs shallow parsing using the identified partition node until it reaches its identified partition, using the shallow parsing to generate the partition of the input XML document, wherein each processor generates a different partition of the same XML document, and sending each partition in streaming format to an ETL job instance. | 03-24-2011 |
20110107156 | COMPUTER, COMPUTER SYSTEM, AND APPLICATION EXECUTION METHOD - A computer receives one or more processing requests from at least one or more clients through a network and executes an application for processing the received processing requests using a Java servlet. The processing requests each contain one or more addresses as the destinations of the processing requests. The computer is connected to a database including the following information: application information in which an identifier that uniquely identifies each application and binary logic for executing the application are brought into correspondence with each other; and adapter information in which the identifier and each of the addresses are brought into correspondence with each other. When the computer receives the processing request, it identifies the binary logic based on an address contained in the received processing request and executes the identified binary logic and thereby executes the application. | 05-05-2011 |
20110107157 | REGISTER ACCESS CONTROL METHOD AND CIRCUIT - A register access control circuit and method includes extracting data written to a plurality of registers by specifying the common address in response to read access to a common address, comparing the data extracted from the respective registers, and outputting the data extracted from one of the registers as read data when the data extracted from the respective registers match. | 05-05-2011 |
20110113292 | Method, Device, Computer Program Product and Data Processing Program For Handling Communication Link Problems Between A First Communication Means and A Second Communication Means - A method for handling communication link problems between a first communication means and a second communication means. Data signals, control signals and/or error information are transferred between the first communication means and the second communication means using the communication link. The method includes activating a static identification pattern in the first communication means representing an error information, and stopping a clock signal (Clk) inside the first communication means to freeze a present error condition, in response to a communication link problem being detected, and transferring the activated static identification pattern permanently and/or repeatedly to the second communication means using the communication link. | 05-12-2011 |
20110131456 | Flexibly Integrating Endpoint Logic Into Varied Platforms - In one embodiment, the present invention is directed to an integrated endpoint having a virtual port coupled between an upstream fabric and an integrated device fabric that includes a multi-function logic to handle various functions for one or more intellectual property (IP) blocks coupled to the integrated device fabric. The integrated device fabric has a primary channel to communicate data and command information between the IP block and the upstream fabric and a sideband channel to communicate sideband information between the IP block and the multi-function logic. Other embodiments are described and claimed. | 06-02-2011 |
20110138235 | Method and system for reporting the policy installation failure - A method and a system are provided for reporting policy installation failures in the field of communications. The method and system enable the policy decision functional entity (PD-FE) to accurately obtain detailed information of policy installation failures of the policy enforcement functional entity (PE-FE), thus enhancing the efficiency of sending the next policy for installation. The method includes: when the installation of a policy sent from the PD-FE to the PE-FE is failed, the PE-FE generates a feedback message to be sent to the PD-FE, and the feedback message includes the error reason of the policy failed in installation. | 06-09-2011 |
20110145660 | DETECTION AND REDUCTION OF EXCESSIVE SNMP TRAFFIC - Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively configured to take no action when such messages are subsequently received. | 06-16-2011 |
20110154131 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INTELLIGENT MONITORING SERVICES - Methods, systems, and computer program products for intelligent monitoring services are provided. A method includes sampling data for a subject over a defined time period and calculating a normative value for the defined time period based on the sampled data. The method also includes monitoring incoming data for the subject, comparing a monitored value for the incoming data to the normative value, and generating a responsive action when the monitored value deviates from the normative value. | 06-23-2011 |
20110154132 | METHODS AND APPARATUS FOR TRACKING DATA FLOW BASED ON FLOW STATE VALUES - In one embodiment, a processor-readable medium storing code representing instructions that when executed by a processor cause the processor to update, at a memory location, a first flow state value associated with a data flow to a second flow state value when at least one of a packet from the data flow is received or the memory location is selected after a time period has expired. At least a portion of the packet is analyzed when the second flow state value represents a flow rate of a network data flow anomaly. | 06-23-2011 |
20110173506 | Clearing SCSI Reservations for Non-Detectable Initiators for Extended Duration - A method, system and computer-usable medium are disclosed for managing storage system resources in a storage area network (SAN). A target data storage server registers itself within a storage area network (SAN) fabric to receive a Registered State Change Notification (RSCN) should a SCSI initiator become inactive. A SCSI initiator then requests reservation of a target LUN. In response, the target data server reserves the LUN for use by the SCSI initiator. If a RSCN is received by the target data storage server, then a GID_PN server request, which comprises the unique identifier of SCSI initiator, is generated after a predetermined time interval and a SAN fabric name server. If the name server's response to the GID_PN server request is positive, then the SCSI initiator was detected as being active and the target data storage server keeps the reservation for the LUN active for the SCSI initiator. Otherwise, the reservation for the LUN is released for use by other SCSI initiators. | 07-14-2011 |
20110185237 | System and Method for Delivering Messages - A system and method for delivering messages are provided. A method for communications device operations includes detecting a failure in a delivery of a message to a first recipient device, determining a second recipient device for the message, and initiating a redelivery of the message to the second recipient device. The first recipient device is formerly registered in a first domain of a communications network or is unavailable in the first domain. | 07-28-2011 |
20110231711 | STORAGE SYSTEM AND KNOWN PROBLEM INFORMATION MANAGEMENT METHO - Proposed are a highly reliable storage system capable of inhibiting the problematic operation or change of state in the [storage] system, and a known problem information management method capable of improving the reliability of the storage system. The storage system is provided with a storage apparatus including a storage medium for storing data, and a management apparatus for managing the storage apparatus. The management apparatus includes an apparatus-side known problem information storage unit for storing known problem information as information concerning a problematic operation or a change of state, a maintenance management terminal operation controller for receiving a user's operation or change of state and creating history information according to the operation or change of state, and an apparatus-side known problem information search unit for searching, from the apparatus-side known problem information storage unit, known problem information corresponding to the history information, wherein the maintenance management terminal operation controller inhibits the operation of the searched known problem information. | 09-22-2011 |
20110231712 | INFORMATION PROCESSING APPARATUS, IMAGE FORMING APPARATUS, AND INFORMATION PROCESSING PROGRAM - A CPU I/F decodes a signal transmitted from a CPU to a target location, and transmits the decoded signal to a mediating module mediating with the target location and to an access log recording unit. The access log recording unit generates an access log using the signal received from the CPU I/F, and stores the access log in an internal RAM. A DMA stores the access log stored in the internal RAM in a nonvolatile RAM when a system controller detects any occurrence of an error in the CPU. | 09-22-2011 |
20110264966 | Redundant Media Packet Streams - This invention concerns the transmitting and receiving of digital media packets, such as audio and video channels and lighting instructions. In particular, the invention concerns the transmitting and receiving of redundant media packet streams. Samples are extracted ( | 10-27-2011 |
20110264967 | Method and Apparatus for Maintaining the Status of Objects in Computer Networks Using Virtual State Machines - A network appliance for monitoring, diagnosing and documenting problems among a plurality of devices and processes (objects) coupled to a computer network utilizes periodic polling and collection of object-generated trap data to monitor the status of objects on the computer network. The status of a multitude of objects is maintained in memory utilizing virtual state machines which contain a small amount of persistent data but which are modeled after one of a plurality of finite state machines. The memory further maintains dependency data related to each object which identifies parent/child relationships with other objects at the same or different layers of the OSI network protocol model. A decision engine verifies through on-demand polling that a device is down. A root cause analysis module utilizes status and dependency data to locate the highest object in the parent/child relationship tree that is affected to determine the root cause of a problem. Once a problem has been verified, a “case” is opened and notification alerts may be sent out to one or more devices. A user interface allows all objects within the network to be displayed with their respective status and their respective parent/child dependency objects in various formats. | 10-27-2011 |
20110276842 | MACHINE ABNORMALITY MONITORING DEVICE - A machine abnormality monitoring device has basic information and a priority level preset for each type of abnormality. When an abnormality occurs, snapshot data regarding the abnormality occurrence is stored while being associated with the basic information. In cases where a new abnormality occurs when the snapshot data storage unit has no free storage area, if snapshot data at a priority level lower than that of the new abnormality exists in prior snapshot data stored in the snapshot data storage unit, the storage control unit stores the snapshot data regarding the new abnormality in the snapshot data storage unit in place of the prior snapshot data at the lower priority level while associating the new snapshot data with the basic information. Thus, the administrator is able to acquire the snapshot data regarding an abnormality in question with high reliability. | 11-10-2011 |
20110289364 | APPARATUS, AND ASSOCIATED METHOD, FOR REPORTING DELAYED COMMUNICATION OF DATA MESSAGES - An apparatus, and an associated method, reports when incidence of email or other data-message communication of a wireless network system. An analyzer analyzes logged information and determines the incidence, such as by calculating a ratio, of delayed versus timely message communications. If the ratio, or other indication, is beyond a threshold, a reporter generates a report to alert the high incidence of delayed communications. | 11-24-2011 |
20110296254 | Distillation and reconstruction of provisioning components - Disclosed is a method for archiving provisioning errors that may occur during provisioning of a computing environment having configurable components. The method may comprise distilling a provisioning request, wherein the distilling the provisioning request includes recording, in a provisioning archive, a provisioning request component, and filtering the provisioning request component. The provisioning request component may comprise a component requested to be added to, removed from, and/or updated in the computing environment. The method may further comprise distilling a provisioning target, wherein the distilling the provisioning target includes recording, in the provisioning archive, a target environment, and filtering an existing component of the target environment. Additionally, the method may comprise applying the provisioning request to the provisioning target, including provisioning the target environment, resulting in an updated provisioning target. Furthermore, the method may comprise determining if a provisioning error occurred, and adding the provisioning error, if any, to the provisioning archive. | 12-01-2011 |
20110302458 | FRAMEWORK FOR MANAGING FAILURES IN OUTBOUND MESSAGES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN), a request from a requesting node for an establishment of a first service data flow (SDF); generating a first rule set for implementing the first SDF in response to the request; transmitting a first rule of the rule set to a first node for installation of the first rule; waiting for a period of time for a response from the first node; determining from the response whether installation of the first rule at the first node failed or succeeded; and if installation of the first rule succeeded, transmitting a second rule of the first rule set to a second node for installation of the second rule. | 12-08-2011 |
20110314346 | IDENTIFYING A SLICE NAME INFORMATION ERROR IN A DISPERSED STORAGE NETWORK - A method begins by a processing module sending list digest requests to a set of dispersed storage (DS) units. The method continues with the processing module receiving list digest responses from at least some of the set of DS units and determining whether an inconsistency exists between first and second list digest responses of the list digest responses. The method continues with the processing module requesting at least a portion of each of the slice name information lists from first and second DS units of the set of DS units and identifying a slice name information error associated with the inconsistency based on the at least a portion of each of the slices name information lists of the first and second DS units when the inconsistency exists between first and second list digest responses of the list digest responses. | 12-22-2011 |
20110320887 | SCALABLE I/O ADAPTER FUNCTION LEVEL ERROR DETECTION, ISOLATION, AND REPORTING - A system for implementing scalable input/output (I/O) function level error detection, isolation, and reporting, the system comprising, an I/O hub communicatively coupled to a computer processor, system memory and at least one I/O adapter, the at least one I/O adapter include a function and the I/O hub including logic for implementing a method. The method comprising detecting an error in a communication initiated between the function and the system memory, the communication including an I/O request from an application. The method further comprising preventing future communication between the one function and the system memory in response to the detecting. The method additionally comprising notifying the application that the error in communication occurred in response to the detecting. | 12-29-2011 |
20110320888 | Load Balancing in Broker-Based Messaging Systems and Methods - An exemplary method includes a message broker subsystem receiving a message intended for delivery to a recipient software application instance, determining that the recipient software application instance is included in a plurality of functionally equivalent software application instances that are registered with a global directory service subsystem that is communicatively coupled to the message broker subsystem, automatically selecting a software application instance from the plurality of software application instances for receipt of the message in accordance with a load balancing heuristic, and attempting to deliver the message to the selected software application instance. Corresponding methods and systems are also described. | 12-29-2011 |
20120005543 | SECURE CHECKING OF THE EXCLUSIVITY OF AN ACTIVE/PASSIVE STATE OF PROCESSING UNITS - In a method and a device for securely checking the exclusivity of a binary active/passive state of redundant units, the device includes: at least one exclusive communication device of the state capable of transmitting an exclusive signal relating to the exclusivity of the state to at least one checking device integrated within each of the units. The checking device is capable of checking and confirming the exclusivity of the state. Each of said redundant units in the active state is capable of transmitting to the exclusive communication device the identity signal; the exclusive communication device is capable of receiving at least one of the identity signals from the redundant units; the exclusive communication signal is capable of producing the exclusive signal from at least one of the identity signals; and the checking device is capable of determining the exclusivity of the state of the unit by reading the exclusive signal. | 01-05-2012 |
20120030524 | HIGH RELIABILITY METHOD OF DATA PROCESSING, AND CONTROLLER UNIT - In a method of data processing within a controller ensuring that voting operations are reliably performed error free and in a corresponding controller unit, the input data are characteristic for the particular application where voting occurs. Voting whether or not the incoming data is correct involves a voting comparison method, a voting average method, and checking for a difference being within a certain range. The time dependent signature indicates correctly transmitted input data. Voting, based on the reviewed signature characteristics is an encoded operation. The time dependent signature indicates the data is coming from a correct source, has been a modification, and correct timing slides. Voting whether or not the incoming data is correct is performed in an encoded manner. A correct data is transmitted to be further used to actuate an actuator. The erroneous data is transmitted to be further sent to a fail safe guard. | 02-02-2012 |
20120036399 | System And Method For Automated Software Application Development - A computer-implemented method for identifying a new software application to be developed. A computer database is searched for matching keywords that correspond to any of a group of selected keywords, indicative of the new application. The database contains descriptive keywords which are indicative of a set of existing applications. If no matching keywords are found in the database, then a description of the new application is requested from the potential user; the description of the new application is received from the potential user; and the description of the new application is used as a basis for developing the new application. | 02-09-2012 |
20120047406 | REDUNDANCY CONTROL SYSTEM AND METHOD OF TRANSMITTING COMPUTATIONAL DATA THEREOF - A method of transmitting computational data comprising: a step of generating first computational data and generating first generated data using a first generation algorithm for error detection on return; a step of generating second computational data and generating second generated data using a second generation algorithm for error detection; a step of mutually comparing the first/second computational data; a step of transmitting transmission data including coincident computational data and first/second generated data; in the receiving device, a step of generating computational data and third/fourth generated data from preset first/second generation algorithms; and a step of comparing the first/third generated data and the first/third generated data, and detecting error in the received computational data. | 02-23-2012 |
20120060063 | MANAGEMENT APPARATUS AND METHOD FOR MANAGING A STARTUP OF AN OPERATING SYSTEM - According to an embodiment, a management apparatus includes a management table, a control unit, a module timer, and a judgment unit. The control unit controls an order of executing modules based on an execution order described in a management table. The module timer measures the execution time of each running module. The judgment unit writes real execution time in the management table when the real execution time at the end of the exertion is equal to or shorter than the expected execution time. Otherwise, the judgment unit writes a flag for defective condition in the management table when the real execution time is longer than the expected execution time. When a flag for defective condition is written in the management table, the control unit stops the execution of the running module and starts the execution of the next module. | 03-08-2012 |
20120066555 | MOBILITY OF VERSIONED WORKLOAD PARTITIONS - A versioned workload partition (WPAR) can be migrated from a source machine to a destination machine. Each thread associated with a process executing within the versioned WPAR is frozen. For each thread associated with the process, an error number associated with the thread is received in response to freezing execution of the thread and at least a current state of the thread is determined as checkpoint information associated with the thread based, at least in part, on the error number associated with the thread. The checkpoint information associated with the one or more threads is provided to the destination machine. The checkpoint information is used at the destination machine to reconstruct the process within a destination versioned WPAR on the destination machine. | 03-15-2012 |
20120066556 | ERROR HANDLING IN A VIRTUALIZED OPERATING SYSTEM - When moving workload partitions (WPARs) from machine to machine, operating systems may encounter errors that prevent successful WPAR migration. Recording and reporting errors can be challenging. To move WPARs, the operating system may employ a plurality of software components, such as code residing in user space (e.g., application programs, OS libraries, and shell scripts), code residing in the operating system's kernel, and code residing on remote machines. Embodiments of the invention include a framework that enables all the software components to record errors. The framework can also report the errors to users and processes. | 03-15-2012 |
20120102371 | FAULT CAUSE ESTIMATING SYSTEM, FAULT CAUSE ESTIMATING METHOD, AND FAULT CAUSE ESTIMATING PROGRAM - A fault cause estimating system includes: an initial model generating section which creates an initial fault derivation model indicating a derivation among faults and an initial event derivation model indicating a derivation among the faults and events, based on a basic model definition; an extended Baum-Welch calculating section which creates a fault derivation model which is a transition of a combination of device classes and faults and an event derivation model which is a transition of a combination of device classes and events, based on a instance definition, a class definition, the initial fault derivation model, the initial event derivation model and an event sequence for learning; an instance derivation probability calculating section which creates an instance deviation model of a derivation of an occurrence device based on the event sequence for learning; and an extended Viterbi calculating section which estimates an event cause fault based on the instance definition, the fault occurrence location class definition, the fault derivation model, the event derivation model, the instance derivation model, and the fault cause estimation event sequence. | 04-26-2012 |
20120110395 | MESSAGE COMPOSITION MANAGEMENT FOR FATIGUED COMPOSERS - Embodiments of the present invention provide a method, system and computer program product for message composition management for fatigued composers of electronic messages. In an embodiment of the invention, a method for message composition management for fatigued composers of electronic messages includes detecting a request by a message composer to transmit a message to a designated recipient in a messaging client executing in memory of a computer. The method also includes computing a fatigue quotient for the message composer. Finally the method includes diverting the message to a drafts folder instead of transmitting the message if the fatigue quotient exceeds a threshold value. | 05-03-2012 |
20120137184 | COMMUNICATION SYSTEM AND COMMUNICATION APPARATUS STATE DETERMINING METHOD - A slave station | 05-31-2012 |
20120151282 | MANAGING APPARATUS, MANAGING METHOD - A managing apparatus includes: a storing unit configured to store fault co-occurrence information storing the number of detection times that a first message pattern indicating a message group including messages received from an information processing system in a predetermined duration is deleted; a determining unit configured to detect the first message pattern, to read the number of detection times from the fault co-occurrence information, to calculate a co-occurrence probability of the fault and the first message pattern based on the number of detection times, and to determine that the fault has occurred if the co-occurrence probability is equal to or higher than a threshold value; and an updating unit configured to create a second message pattern indicating a message group obtained by excluding a message output by a changed component from the first message pattern, and to update the first message pattern to the second message pattern. | 06-14-2012 |
20120151283 | DETECTION AND REDUCTION OF EXCESSIVE SNMP TRAFFIC - Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively, be configured to take no action when such messages are subsequently received. | 06-14-2012 |
20120159265 | STORAGE APPARATUS AND CONTROL METHOD FOR STORAGE APPARATUS - A first controller stores externally input data to a memory of the first controller, reads data stored in the memory of the first controller and transmits the data to a second controller through a first controller bridge, detects a failure at the first controller bridge in transmission of the data. The second controller receives the data through a second controller bridge, writes the received data into a memory of the second controller, and determines whether the failure is caused by the first controller if a failure occurs in the memory controller and the second controller bridge. If a failure is detected in the first controller and the second controller and the failure is caused by the first controller, the first controller transmits the data causing the failure during transmission through the first controller bridge and the second controller receives the data through the second controller bridge. | 06-21-2012 |
20120159266 | METHOD, APPARATUS OR SOFTWARE FOR PROCESSING EXCEPTIONS PRODUCED BY AN APPLICATION PROGRAM - A method, apparatus and software is disclosed in which original exceptions issued by an application program are encoded as substitute exceptions with associated metadata identifying the original exception so as to enable to enable a first application program receiving the exception but not arranged to process the original exception to process the substitute exception and to enable a second application program receiving the exception and arranged to process the original exception to extract and process that original exception. | 06-21-2012 |
20120166890 | ERROR DETECTION IN FIFO QUEUES USING SIGNATURE BITS - A first in, first out (FIFO) queue includes logic to provide detection of operational errors in the FIFO queue. The FIFO queue includes entries to store data written to the FIFO queue and signature bits, each signature bit corresponding to one of the entries. A test pattern and a read signature register includes a number of bits greater than a depth of the FIFO queue. A comparator compares the test pattern to the read signature register and output an error signal indicating whether the test pattern matches the read signature register. | 06-28-2012 |
20120233507 | CONFIRM INSTRUCTION FOR PROCESSING VECTORS - The described embodiments include a processor with a fault status register (FSR) that executes a Confirm instruction. In these embodiments, when executing the Confirm instruction, the processor receives a predicate vector that includes N elements. For a first set of bit positions in the FSR for which corresponding elements of the predicate vector are active, the processor determines if at least one of the first set of bit positions in the FSR holds a predetermined value. When at least one of the first set of bit positions in the FSR holds the predetermined value, the processor causes a fault in the processor. | 09-13-2012 |
20120233508 | System and Method for Increased System Availability in Virtualized Environments - A method is provided for managing errors in a virtualized information handling system that includes an error detection system and a hypervisor allowing multiple virtual machines to run on the information handling system. The hypervisor may assign at least one memory region to each of multiple virtual machines. The error detection system may detect an error, determine a physical memory address associated with the error, and report that address to the hypervisor. Additionally, the hypervisor may determine whether the memory region assigned to each virtual machine includes the physical memory address associated with the error. The hypervisor may shut down each virtual machine for which a memory region assigned to that virtual machine includes the physical memory address associated with the error, and not shut down each virtual machine for which the memory regions assigned to that virtual machine do not include the physical memory address associated with the error. | 09-13-2012 |
20120233509 | FAULT DETECTING METHOD AND INFORMATION PROCESSING APPARATUS - An information processing apparatus including a storage area separated into a user space and a kernel space executes, generating a core file of a process existing in the user space, retaining the process with the core file which starts being generated in the user space, and notifying a monitor unit of an identification number of the process with the core file which starts being generated, wherein the monitor unit detects a fault in the process by receiving the identification number allocated to the process. | 09-13-2012 |
20120239986 | SCRIPT EXECUTION WITH FALLBACK - A script specifies a script action and an expected reaction in response to the script action. When one of the script actions is executed, a failure is detected indicating that the expected reaction did not occur. In response to the failure, a fallback action is executed. | 09-20-2012 |
20120239987 | System and Method of Manipulating Virtual Machine Recordings for High-Level Execution and Replay - Execution behavior for processes within a virtual machine is recorded for subsequent replay. The execution behavior comprises a detailed, low-level recording of state changes for processes within the virtual machine. The low-level recording is processed via replay to produce a sliced recording that conforms to time, abstraction, and security requirements for a specific replay scenario. Multiple stages of replay may be arbitrarily stacked to generate different crosscut versions of a common low-level recording. | 09-20-2012 |
20120239988 | COMPUTING UNIT, METHOD OF MANAGING COMPUTING UNIT, AND COMPUTING UNIT MANAGEMENT PROGRAM - The processing load caused by fault monitoring of software components is reduced. Provided is a computing unit ( | 09-20-2012 |
20120246524 | DEBUGGING AID FOR SECURE WIRELESS SYSTEMS - In an encrypted wireless system, when a wireless node detects that it is having problems, it may be programmed to transmit one or more diagnostic messages without encryption, or with reduced encryption. The transmitted diagnostic messages may be received and interpreted by a technician troubleshooting the system. Once the technician troubleshoots and repairs the system, the affected wireless node may detect that it is operating normally, and may cease transmitting the unencrypted, or reduced-encryption, diagnostic messages. In most cases, the wireless system does not need any particular input to initiate the unencrypted, or reduced-encryption, diagnostic message transmissions. | 09-27-2012 |
20120284570 | ERROR PROTECTION FOR PIPELINE RESOURCES - At an instruction pipeline of a data processor, pipeline resource conflicts are detected by setting, for each executing instruction, one or more assignment indicators to indicate which pipeline resources are to be utilized for executing the instruction. The instruction pipeline detects a pipeline resource conflict if an instruction is assigned a pipeline resource for which the assignment indicator is set. In addition, for selected pipeline resources, such as registers in a register file, the instruction pipeline can detect a pipeline resource conflict if more than one instruction attempts to access the pipeline resource when the assignment indicator for the resource is set. In response to detecting a pipeline resource conflict, the instruction pipeline is flushed and returned to a checkpointed state, thereby protecting the instruction pipeline from architectural state errors. | 11-08-2012 |
20120284571 | MONITORING THE HEALTH OF DISTRIBUTED SYSTEMS - The present invention extends to methods, systems, and computer program products for monitoring the health of distributed systems. Embodiments of the invention provide distributed, self-maintained, continuous health monitoring. Using XML and pluggable infrastructure, a logical view of an appliance can be provided. The logical view abstracts physical implementation details of the appliance. Monitoring agents can correlate different distributed system failures and events and reason over collected health information. | 11-08-2012 |
20120290882 | SIGNAL PROCESSING DURING FAULT CONDITIONS - A system is configured to monitor a received signal. In response to detecting a fault condition associated with the received signal, the system sets a fault status indicator to indicate occurrence of the detected fault condition. The system sets a state of the fault status indicator for at least a predetermined amount of time to indicate occurrence of the detected fault condition. Subsequent to setting the fault status indicator for at least the predetermined amount of time to indicate the occurrence of the detected fault condition, the system monitors integrity of the signal again. After the predetermined amount of time, in response to detecting that there is no longer a fault associated with the monitored signal, the system modifies the fault status indicator to indicate absence of the fault condition. | 11-15-2012 |
20120290883 | Computer Implemented Method for Precise May-Happen-in-Parallel Analysis with Applications to Dataflow Analysis of Concurrent Programs - A computer implemented method for automatically for determining errors in concurrent program using lock localization graphs for capturing few relevant lock/unlock statements and function calls required for reasoning about interference at a thread location at hand, responsive to first and second threads of a concurrent program, constructing generalized lock causality graphs and computing cycle signatures, and determining errors in the concurrent program responsive to computing an interference graph and data flow analysis. | 11-15-2012 |
20120290884 | INFORMATION PROCESSING APPARATUS THAT DETECTS STARTUP ERROR, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus which includes at least two controllers and is capable of positively detecting a startup error. Memory devices are connected to the controllers, respectively. A CPU of each controller accesses the memory device connected to the other controller via a bus bridge, identifies a startup stage to which the startup process has proceeded during the start of the self-controller, writes the identified startup stage as startup information into the memory device connected to the other controller, and detects whether or not an abnormality occurs during the startup of the other controller with reference to the startup information written into the memory device connected to the self-controller. | 11-15-2012 |
20120304023 | METHOD AND DEVICE FOR PROVIDING AN INDICATION OF THE RELIABILITY OF A PROCESS PARAMETER VALUE TO A HOST SYSTEM - A field device for determining a process parameter value, comprising a measurement device for determining a process parameter value; circuitry for determining the reliability of the process parameter value; and signaling circuitry for providing the process parameter value and an indication of the reliability of the process parameter value to a host system via a current loop. The signaling circuitry is configurable between a first state in which the indication of the reliability is provided as a digital signal and the process parameter value is provided as an analog DC-value, and a second state in which the indication of the reliability is provided as a predetermined analog DC-value. Hereby, the number of unplanned process interruptions may be reduced when the host system is capable of receiving digital signals. | 11-29-2012 |
20120304024 | DATA PROCESSING METHOD, DATA PROCESSOR AND APPARATUS INCLUDING A DATA PROCESSOR - A method of processing data in a data processor comprising at least two data processing units. The method comprises performing different data processing steps in the data processing units concurrently during a parallel operation, and replicating performances of selected identical data processing steps in the data processing units during a non-synchronised redundant operation. The non-synchronised redundant operation comprises an initial performance of the selected identical data processing steps in one of the data processing units and a replicate performance of the data processing steps starting later than the initial performance, preferably in another of the data processing units. Initial result data representative of results from the initial performance are registered, and compared with replicate result data representative of results from the replicate performance, and an error signal is produced in case of discrepancy. | 11-29-2012 |
20120324297 | FRAMEWORK FOR MANAGING FAILURES IN OUTBOUND MESSAGES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN), a request from a requesting node for an establishment of a first service data flow (SDF); generating a first rule set for implementing the first SDF in response to the request; transmitting a first rule of the rule set to a first node for installation of the first rule; waiting for a period of time for a response from the first node; determining from the response whether installation of the first rule at the first node failed or succeeded; and if installation of the first rule succeeded, transmitting a second rule of the first rule set to a second node for installation of the second rule. | 12-20-2012 |
20130007537 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING PROGRAM THEREFOR - An information processing apparatus is capable of automatically determining whether an operation log needs to be written to an external device when the external device is connected to the information processing apparatus and saving the operation log into the external device when necessary. A determination is made as to whether or not content for retrieving an operation log is present in an external device upon detection of connection of the external device. The operation log is retrieved from a holding unit if a result of the determination shows that the user interface control unit is in an error condition. The retrieved operation log is saved into a storage unit of the external device. | 01-03-2013 |
20130073914 | STORAGE MANAGEMENT SYSTEMS AND METHODS - Storage management systems and methods are presented. In one embodiment, a method comprises: performing a hierarchical configuration information process, including accessing information regarding hierarchical relationships of components associated with a storage environment; performing a storage resource consumption detection process, including detecting consumption of storage resources included in the storage environment; and performing a coordinated consumption analysis process in which at least part of an analysis of the consumption of the storage resources is coordinated across multiple levels of an active spindle hierarchy. In one embodiment, a reaction process is performed. The reaction process can include performing an automated consumption notification process and an automated reclamation process based upon results of the storage resource consumption detection process. | 03-21-2013 |
20130080843 | Detecting Sensor Malfunctions Using Compression Analysis of Binary Decision Diagrams - In particular embodiments, a method includes analyzing a binary decision diagram (BDD) representing a data stream from a sensor to determine a compression rate of the BDD and indicating a sensor malfunction in the sensor if the compression rate of the BDD deviates from a specified compression rate range. | 03-28-2013 |
20130086435 | SCALABLE I/O ADAPTER FUNCTION LEVEL ERROR DETECTION, ISOLATION, AND REPORTING - Embodiments of the invention relate to scalable input/output (I/O) function level error detection, isolation, and reporting. An aspect of the invention includes detecting an error in a communication initiated between the function and a system memory, the communication including an I/O request from an application. Future communication is prevented between the one function and the system memory in response to the detecting. The application is notified that the error in communication occurred in response to the detecting. | 04-04-2013 |
20130086436 | Device and Method for Checking Frames to be used by an Electronic Device of a Communication Network, on the Basis of Function Types and Using Parameters Contained in Said Frames - The invention relates to a device (D) for checking frames of groups of bits, received by an electronic device (O | 04-04-2013 |
20130103990 | CHANGE MANAGEMENT SYSTEM AND METHOD - A method is provided for managing changes to a computer system. The method includes generating a database configured with fields identifying one or more component changes and potential problems associated with each one or more component changes; populating the fields of the database with information as a change is made to a computer system; monitoring the computer system for issuance of error alerts; comparing issued error alerts against entries of potential problems in the database; and identifying a set of at least one of the component changes as a potential cause of the issued error alert based on the result of the comparing step. The method executes a corrective process in response to the identification of the potential cause of the issued error and updates the database entry of the set of at least one of the component changes to reflect the issued error as a confirmed error thereof. | 04-25-2013 |
20130111275 | TROUBLESHOOTING SYSTEM USING DEVICE SNAPSHOTS | 05-02-2013 |
20130111276 | PERIODIC ERROR DETECTION METHOD AND PERIODIC ERROR DETECTION CIRCUIT | 05-02-2013 |
20130124929 | DATA TRANSFER CONTROL DEVICE AND DATA TRANSFER CONTROL METHOD - The data transfer control device of the present invention is capable of improving data transfer efficiency while discarding error data, a DMA parameter storing control unit ( | 05-16-2013 |
20130159793 | Preventing Distribution of a Failure - Mechanisms for preventing a distribution of a failure caused by a sequence of instructions in a distributed client server environment are provided. These mechanisms comprise executing the sequence of instructions on a first client, the instructions being provided by a management control server and being indicative of maintenance actions. These mechanisms may further comprise determining by the first client a failure caused by the sequence of instructions, and generating a warning message by the first client based on the determined failure. The warning message may comprise an indicator for the sequence of instructions. In addition, these mechanisms may comprise sending the warning message for informing a second client about the sequence of instructions causing the failure in order to prevent a distribution of the failure. | 06-20-2013 |
20130173968 | DYNAMIC LINK LIBRARY INTEGRITY CHECKING FOR HANDHELD MEDICAL DEVICES - A method of checking the integrity of a dynamic link library (DLL) file called by an application being executed on a handheld medical device is described. The method includes loading a DLL from a read only memory (ROM) to a random access memory (RAM) beginning at a fixed location in the RAM. The DLL includes a first routine for performing a safety critical function of the handheld medical device and a second routine for performing a cyclical redundancy check (CRC) once the DLL is loaded to the RAM. The method includes selectively executing the first routine from the RAM. The method includes selectively executing the second routine from the RAM including: calculating a check value based on the DLL; comparing the check value with a predetermined check value; and indicating that an error is present when the check value is different than the predetermined check value. | 07-04-2013 |
20130179737 | METHODS AND APPARATUS FOR MANAGING ERROR CODES FOR STORAGE SYSTEMS COUPLED WITH EXTERNAL STORAGE SYSTEMS - A system comprising a plurality of storage systems, which uses storage devices of multiple levels of reliability. The reliability as a whole system is increased by keeping the error code for the relatively low reliability storage disks in the relatively high reliability storage system. The error code is calculated using hash functions and the value is used to compare with the hash value of the data read from the relatively low reliability storage disks. | 07-11-2013 |
20130185604 | FAULT TOLERANT STABILITY CRITICAL EXECUTION CHECKING USING REDUNDANT EXECUTION PIPELINES - A circuit arrangement and method utilize existing redundant execution pipelines in a processing unit to execute multiple instances of stability critical instructions in parallel so that the results of the multiple instances of the instructions can be compared for the purpose of detecting errors. For other types of instructions for which fault tolerant or stability critical execution is not required or desired, the redundant execution pipelines are utilized in a more conventional manner, enabling multiple non-stability critical instructions to be concurrently issued to and executed by the redundant execution pipelines. As such, for non-stability critical program code, the performance benefits of having multiple redundant execution units are preserved, yet in the instances where fault tolerant or stability critical execution is desired for certain program code, the redundant execution units may be repurposed to provide greater assurances as to the fault-free execution of such instructions. | 07-18-2013 |
20130212441 | System and Method for Signature-Based Redundancy Comparison - A system and method for signature-based redundancy comparison provides for receiving, by a master part, an input signal and generating, by the master part, a binary output signal, generating a delayed input signal based on the input signal, generating a first output signature based on the binary output signal, and generating a delayed first output signature based on the first output signature. The system and method further comprise generating a delayed binary output signal based on the delayed input signal, generating, by a checker part, a delayed second output signature based on the delayed binary output signal, comparing the delayed first output signature with the delayed second output signature, and generating an error signal, where the state of the error signal is based upon the comparison. | 08-15-2013 |
20130227357 | MEMORY MODULE REDUNDANCY METHOD, STORAGE PROCESSING DEVICE, AND DATA PROCESSING DEVICE - A system includes one or more memory modules provided with a plurality of operation blocks having a plurality of memory elements which may be simultaneously operated. The system performs write access concurrently by writing data to two or more selected operation blocks. When a fault is detected in one of the two or more operation blocks, access is performed including the write access to two or more operation blocks excluding the operation block in which the fault is detected. | 08-29-2013 |
20130238944 | Systems and Methods for Reduced Latency Loop Correction - Various embodiments of the present invention provide systems and methods for data processing. For example, a data processing circuit is discussed that includes: a data detector circuit, a low latency detection circuit, and an error calculation circuit. The data detector circuit is operable to perform a data detection process on a first signal derived from a data input to yield a detected output, and to provide a loop error as a difference between the detected output and the first signal. The low latency detection circuit operable to process a second signal derived from the data input to yield a fast detector output, and to provide a generated error as a difference between the fast detector output and the second signal. The error calculation circuit is operable to calculate an error value based at least in part on the generated error and the loop error. | 09-12-2013 |
20130238945 | Method and System for Fault Containment - Embodiments relate to systems and methods for error containment in a system comprising detecting an error by processing an input signal by multiple processing units, and delaying at least one output signal of a processing unit to enable, in case an error has been detected, modifying at least one output signal of the processing unit that would cause propagation of the error through the system. | 09-12-2013 |
20130246864 | METHOD FOR NATIVE PROGRAM TO INHERIT SAME TRANSACTION CONTEXT WHEN INVOKED BY PRIMARY PROGRAM RUNNING IN SEPARATE ENVIRONMENT - Native applications inherit transaction contexts when invoked by primary applications running in separate hosting environments, by: receiving, by an interface of a native application server in a first hosting environment, a unique transaction context identifier for an invocation of the native application at the native application server by the primary application at a primary application server in a second hosting environment; receiving a SQL statement from the native application by the interface of the native application server; sending the SQL statement and the unique transaction context identifier to the primary application server for execution by the interface of the native application server; receiving a result of the execution of the SQL statement and the unique transaction context identifier from the primary application server by the interface of the native application server; and sending the result to the native application by the interface of the native application server. | 09-19-2013 |
20130262939 | ERROR RESPONSE CIRCUIT, SEMICONDUCTOR INTEGRATED CIRCUIT, AND DATA TRANSFER CONTROL METHOD - In an error response circuit an analysis circuit unit analyzes a command transmitted from a first circuit section to a second circuit section, and detects a status of data transfer between the first circuit section and the second circuit section. A response circuit unit generates an error signal in accordance with the detected status of the data transfer in response to the second circuit section changing from a first power consumption state to a second power consumption state in which power consumption is lower than power consumption in the first power consumption state. A switching circuit unit transmits the error signal to the first circuit section in place of a response signal that is responsive to the command and transmitted from the second circuit section to the first circuit section. | 10-03-2013 |
20130268811 | PORTABLE DATA CARRIER HAVING OPERATING ERROR COUNTER - In a method in a portable data carrier for securing the data carrier against external attacks on the data carrier, there is employed at least one counter in the data carrier. A specified command is secured here such that it is executed by the data carrier only when the at least one counter lies in a specified, permissible values range, in particular does not undershoot a specified minimum value. The at least one counter is actuated, normally decremented, according to the invention when it is recognized on the basis of a rollback buffer of the data carrier that a preceding execution of a command has been disturbed. | 10-10-2013 |
20130283106 | MANAGEMENT OF DATA IN A SUPPLY CHAIN TRANSACTION - Files related to shipping transactions are received from participants. Each of the files are processed in a first stage of a multi-stage process that includes attempting to translate the files to generate a translated file and storing an error status for each file in which the translation experienced an error. For those files that are successfully translated, they are processed in subsequent stage(s) including applying application rule(s) to those files and storing an error status for those translated files resulting in an error. A participant may view a summary of those translated files that are associated with an error status. The participant may further view details of an error to be displayed and retrieve the underlying file. The participant may edit the file to correct the issue and republish the modified file to be reprocessed in the stage of the multi-stage process that identified the error. | 10-24-2013 |
20130290792 | CRYPTOGRAPHIC PROCESSING WITH RANDOM NUMBER GENERATOR CHECKING - Embodiments of an electronic circuit comprise a module, such as a security module, configured to perform cryptographic processing for a predetermined security protocol that includes random number checking. The security module is controlled by a descriptor that includes instructions that cause the security module to access a generated random number, compare the generated random number to a random number stored during a previous execution of the descriptor, and generate an error signal when the generated random number and the previous execution random number are equal. | 10-31-2013 |
20130297978 | METHOD OF SYSTEM FOR DETECTING ABNORMAL INTERLEAVINGS IN CONCURRENT PROGRAMS - A method and system for detecting abnormal interleavings in a multi-threaded program includes generating an execution log in response to execution of the multi-threaded program. Based on the execution log, a list of allowable immediate interleavings is generated if the execution of the multi-threaded program resulted in no concurrency errors and a list of suspicious immediate interleavings is generated if the execution of the multi-threaded program resulted in one or more concurrency errors. The first and second lists are compared to generate a list of error-causing immediate interleavings. A replayable core is then generated and executed based on the list of error-causing immediate interleavings. | 11-07-2013 |
20130305102 | AUTOMATED TROUBLE TICKET GENERATION - Control over servers and partitions within a computer network may be automated to improve response to disaster events within the computer network. For example, a monitoring server may be configured to automatically monitor servers through remote communications sessions. A disaster event may be detected based on information received from the partitions and servers within the network. When a disaster event or events leading to a disaster event are detected, a trouble ticket may be generated. The trouble ticket may also generate an alert displayed to an administrator through a customized hierarchical graphical display. When the administrator is not logged in, messages may be generated to alert the administrator to the problem. The administrator may then log in remotely and respond to the alert. | 11-14-2013 |
20130311837 | PROGRAM-DISTURB MANAGEMENT FOR PHASE CHANGE MEMORY - Subject matter disclosed herein relates to a memory device, and more particularly to read or write performance of a phase change memory. | 11-21-2013 |
20130311838 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND DATA FORWARDING METHOD - An information processing apparatus connected to an inputting/outputting apparatus includes a storage apparatus configured to store data, a calculation processing apparatus configured to issue an order, and a data forwarding apparatus configured to generate, upon receiving a data forwarding order issued by the calculation processing apparatus, based on data stored by the storage apparatus, first error inspection data to detect an error of the data, forward the data and the first error inspection data to the inputting/outputting apparatus, generate, upon receiving an data inspection order issued by the calculating processing apparatus, based on data stored by the storage apparatus, second error inspection data to detect an error of the data, and report occurrence of an error to the calculation processing apparatus, when a result of comparison of the first error inspection data generated by another data forwarding apparatus and the second error inspection detail is a mismatch. | 11-21-2013 |
20130332781 | RECOVERY AFTER INPUT/OUPUT ERROR-CONTAINMENT EVENTS - Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for a computing device with a platform entity such as an interrupt handier configured to notify an operating system or virtual machine monitor executing on the computing device of an input/output error-containment event. In various embodiments, the interrupt handler may be configured to facilitate recovery of a link to an input/output device that caused the input/output error-containment event, responsive to a directive from the operating system or virtual machine monitor. | 12-12-2013 |
20130339807 | AUTOMATED QUALITY CONTROL OF A MEDIA ASSET - Some aspects of the disclosure relate to automated quality control of a media asset. The quality control can comprise testing automatically various facets of content reproduction. In one embodiment, three facets can be tested: (1) access to a rendering unit configured to reproduce content of the media asset; (2) rendering of at least a portion of visual content of the media asset; and (3) rendering at least a portion of the aural content of the media asset. In one aspect, testing the rendering of the visual content can be differential in that features of the rendering can be monitored at a plurality of instants during content reproduction and can be compared for two or more instants of the plurality of instants. In another aspect, based on the comparison, the media asset can be deemed to pass the quality control and thus be accepted for consumption. | 12-19-2013 |
20140019814 | ERROR FRAMEWORK FOR A MICROPROCESOR AND SYSTEM - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for implementing an error framework for a microprocessor and for a system having such a microprocessor. The error framework may alternatively be implemented by a hardware component, such as a peripheral device for integration into a system. In one embodiment, an error framework of a microprocessor or a hardware component includes an error detection unit to capture an error within the hardware component; a state detection unit to capture error context information when the error is detected within the hardware component; an error event definition unit to define a unique error event representing a combination of the error and the error context information; and a configuration unit to define an error event response based on the unique error event. The error context information may include, for example, a known state of a system at the time the error occurs or a known state of the hardware component or microprocessor within which the error is detected at the time the error occurs. | 01-16-2014 |
20140032981 | INTERMEDIATE DATABASE MANAGEMENT LAYER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for using an intermediate database management layer to manage communications between an application layer and a database layer. The database management layer can receive an initial communication from the application layer and transmit a subsequent communication to a particular database based upon a rule. The rules can specify the particular database based upon the initial communication and an availability status of the database. The rules specify criteria by which the initial communication is identified and logic specifying the particular database to receive the subsequent communication based upon the identification of the initial communication. The rules can specify a plurality of potential particular databases to receive the subsequent communication and an order in which to select one of the databases to receive the subsequent communication based upon the determined availability status of each of the potential particular databases. | 01-30-2014 |
20140032982 | Systems and Methods for Enhanced Media Defect Detection - Various embodiments of the present invention provide systems and methods for media defect detection. | 01-30-2014 |
20140040674 | SYSTEM AND METHOD FOR DETECTING ERRORS IN AUDIO DATA - An application programming interface (API) executed by a first processing unit combines audio data samples with error code values generated for those samples. The API then causes a data stream to be opened having sufficient bandwidth to accommodate combined samples made up of audio data samples and corresponding error code values. The combined samples are then transmitted to a decoder and validation unit within a second processing unit that receives the combined data, strips the error code values and validates the audio data based on the error code values. When the error code values indicate that the audio data has been compromised, the second processing unit terminates the output of sound derived from the audio data. | 02-06-2014 |
20140040675 | DATA PROCESSING METHOD AND APPARATUS - A method for processing a plurality of received copies of the same original data, the method comprising performing maximum ratio combining on equivalent data portions of the received copies to derive at least one further equivalent data portion. The received and the constructed copies are then divided into sub-portions and combinations of divided sub-portions are assembled to provide reconstructed data portions. An error rate assessment is performed on the reconstructed data portions; and on this basis one is selected as an output. | 02-06-2014 |
20140053030 | METHOD AND SYSTEM FOR PREVENTING LOSS OF TRIP DATA IN VEHICLE - Disclosed herein is a method for preventing a loss of trip data of a vehicle during a substantial instantaneous voltage drop in a vehicle cluster. In the method, the trip data calculated by a processor of a trip computer are stored in a clear region of a memory and the trip data stored in the clear region are backed up in a nonvolatile region of the memory when new trip data is generated. The processor collects the trip data backed up in the nonvolatile region to rewrite the trip data in the clear region after a substantially instantaneous voltage drop occurs. | 02-20-2014 |
20140068353 | Estimation of Hidden Variance Distribution Parameters - Methods for finding (i) the parameter var(σ | 03-06-2014 |
20140082432 | METHOD, NODE AND SYSTEM FOR DETERMINING FAULT INDICATION STATE - Receiving results of detecting whether each service node in a service node pool is faulty transmitted by service request nodes; and determining fault indication states of a service node itself and other service nodes according to the results of detecting; or expanding an echo request message which carries a result of detecting, by a service request node itself, whether each service node in a service node pool is faulty during a previous period of a current period; and transmitting the echo request message to each service node at the beginning of the current period to enable each service node to determine fault indication states of a service node itself and other service nodes according to the result of detecting. According to the foregoing solutions of the present invention, reliability of service node fault detection is improved. | 03-20-2014 |
20140122945 | VERIFICATION DEVICE, VERIFICATION METHOD AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a verification device includes an encoding rule generating unit, a test data generating unit, an error rule generating unit, a determined value generating unit, and a verifying unit. The encoding rule generating unit is configured to generate an encoding rule based on a definition document for a structured document. The test data generating unit is configured to generate test data in which all combinations of state transitions are expressed in bits in accordance with an encoding rule. The error rule generating unit is configured to add an error rule to the encoding rule. The determined value generating unit is configured to generate a determined value indicating whether a transition is normal. The verifying unit is configured to determine that a decoding device is not normal when the determined value and an output determined value resulting from inputting the test data to the decoding device are different. | 05-01-2014 |
20140149806 | ANOMALY DETECTION METHODS, DEVICES AND SYSTEMS - A method for detecting an anomaly in operation of a data analysis device, comprising: receiving present real-time readings of multiple sensors associated with the data analysis device, and maintaining a history of past real-time readings; determining which of said multiple sensors are correlated; computing a deviation between at least some of said present and at least some of said past real-time readings of said correlated sensors; and declaring an anomaly when said deviation exceeds a predetermined threshold. | 05-29-2014 |
20140245082 | IMPLEMENTING CLIENT BASED THROTTLED ERROR LOGGING - A method, system and computer program product are provided for implementing client based throttled error logging in a computer system. A log governor, controlled by a client of a log manager, prevents the flooding of the logs, identifies how many repetitive logs have been suppressed, and is tailored such that log suppression requirements are enabled to be specified for each individual log. A space required for the log governor features or log governing information is allocated in the client. | 08-28-2014 |
20140245083 | Method and Apparatus of Error Reporting - A method includes receiving an error signal from a client device receiving a video stream. A portion of the video stream associated with the error signal is detected. An error selection listing based on the portion of the video stream is transmitted. The client device receives a selection based on the error selection listing. The selection is stored as an error listing. | 08-28-2014 |
20140258791 | MONITORING METHOD AND SUBSYSTEM THAT DETECTS ABNORMAL SYSTEM STATES - The current application is directed to monitoring subsystems, and monitoring methods incorporated within the monitoring subsystems, that monitor operation of devices and systems in order to identify normal states and to quickly determine when a device or system transitions from a normal state to an abnormal state. The methods and monitoring components to which the current application is directed employ self-organizing maps and moving-average self-organizing maps to both characterize normal system behavior and to identify transitions to abnormal system behaviors. | 09-11-2014 |
20140281747 | Fault Handling at a Transaction Level by Employing a Token and a Source-to-Destination Paradigm in a Processor-Based System - A method for detecting errors in a processing device is disclosed. A data source unit of a processing device transmits data and a qualifier synchronously with the data, the qualifier to indicate the data is uncorrectable. At least one intermediate functional unit in the processing device receives the data and the qualifier. The at least one intermediate functional unit detects the data is uncorrectable based on the qualifier. The at least one intermediate functional unit transmits, without using, the data and the qualifier synchronously with the data to a data consumer unit of the processing device. The data consumer unit receives the data and the qualifier. The data consumer unit detects the data is uncorrectable based on the qualifier. The data consumer unit maintains, without using the data and the qualifier. | 09-18-2014 |
20140281748 | QUERY REWRITES FOR DATA-INTENSIVE APPLICATIONS IN PRESENCE OF RUN-TIME ERRORS - An aspect of error handling includes a parsing block for pre-processing a document indexing application, a filtering block for discarding irrelevant documents, a transformation block to clean up and annotate input data by identifying a document language, and a processor configured for grouping inputs to collect documents for a same entity in a single spot. The processor processes a query operation. An aspect of error handling also includes a data package including a data result component that includes data generated based on successful completion of at least a portion of the query operation. The data package also includes an error information data component based on one or more errors encountered during processing of the query operation. An indicator separates the error information data from the data result. The system also includes a memory associated with a distributed file system for storing a final write output relating to the query operation. | 09-18-2014 |
20140298115 | Program and Information Processing Apparatus - A non-transitory computer-readable medium has a program stored thereon and readable by a processor of an information processing apparatus configured to communicate with an image processing apparatus. The program, when executed by the processor, causes the information processing apparatus to perform: receiving a execution request to cause the image processing apparatus to perform the image processing, the execution request being corresponding to a job; acquiring status information indicating a status of the image processing apparatus; and notifying, during a notification time period, error information based on the status information when the status information is acquired during the notification time period, which starts at a time when the execution request is received. | 10-02-2014 |
20140304558 | TRANSIENT CONDITION MANAGEMENT UTILIZING A POSTED ERROR DETECTION PROCESSING PROTOCOL - In a data processing system, a memory subsystem detects whether or not at least one potentially transient condition is present that would prevent timely servicing of one or more memory access requests directed to the associated system memory. In response to detecting at least one such potentially transient condition, the memory system identifies a first read request affected by the at least one potentially transient condition. In response to identifying the read request, the memory subsystem signals to a request source to issue a second read request for the same target address by transmitting to the request source dummy data and a data error indicator. | 10-09-2014 |
20140331094 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information processing system includes a terminal apparatus an information processing apparatus. The terminal apparatus includes a first language information memory; a first display displaying a processing parameter option used in information processing in a first language; a first acceptance unit accepting a first instruction; a first generation unit generating first instruction data; an instruction data transmission unit; a notification data reception unit receiving notification data; and a first notification unit. The information processing apparatus includes a second language information memory; a second display displaying the processing parameter option in a second language; a second acceptance unit accepting a second instruction; a second generation unit generating second instruction data; an instruction data reception unit; an identification unit identifying the information processing; an execution unit executing the information processing; a notification data acquisition unit; a notification data transmission unit; and a second notification unit. | 11-06-2014 |
20140344631 | ELECTRONIC DEVICE AND METHOD FOR RELEASING ELECTRONIC DEVICE FROM NONFUNCTIONING STATE - An electronic device includes a CPU and an MCU intercommunicating with the CPU. The MCU sends an instruction to the CPU at a predetermined time interval. The MCU detects whether a response is received from the CPU within a predetermined time period after the instruction is sent, and determines that the CPU is nonfunctioning when no response is received from the CPU. The MCU restarts the CPU when the CPU is determined to be nonfunctioning. A method for releasing an electronic device from a nonfunctioning state is also provided. | 11-20-2014 |
20140344632 | METHOD, COMPUTER SYSTEM, AND APPARATUS FOR ACCESSING PERIPHERAL COMPONENT INTERCONNECT EXPRESS ENDPOINT DEVICE - Embodiments of the present invention relate to a peripheral component interconnect express endpoint device accessing method, a computer system, and an apparatus. A state of an access request sent by a processor is monitored, and a simulation response message for the access request is sent to the processor when it is determined that the PCIe endpoint device sends no response message for the access request. Therefore, according to the simulation response message, the processor can confirm completion of the procedure corresponding to the previously sent access request, and shut down a timer for timing the access request and clear the buffered access request, thereby keeping normal processing in the processor and avoiding the MCE resetting problem that arises from accumulation of access requests in the processor. | 11-20-2014 |
20140372811 | SERVER-BASED NOTIFICATION OF ALARM EVENT SUBSEQUENT TO COMMUNICATION FAILURE WITH ARMED SECURITY SYSTEM - A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is armed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay. | 12-18-2014 |
20150046758 | REDUNDANT TRANSACTIONS FOR SYSTEM TEST - A method for detecting errors in hardware including running a transaction on a plurality of cores, wherein each of the cores runs a respective copy of the transaction, synchronizing the transaction on the cores, comparing results of the transaction on the cores, and determining an error in one or more of the cores. | 02-12-2015 |
20150067412 | Providing Error Handling Support To Legacy Devices - In one embodiment, the present invention includes a method for handling a request received in an agent designed in accordance with a peripheral component interconnect (PCI) specification using PCI Express™ semantics. More specifically, responsive to determining that the agent does not support the request, an unsupported request detection register of the agent can be updated, and a response sent from the agent to indicate that the agent does not support the request. Other embodiments are described and claimed. | 03-05-2015 |
20150149836 | RECOVERABLE AND FAULT-TOLERANT CPU CORE AND CONTROL METHOD THEREOF - A recoverable and fault-tolerant CPU core and a control method thereof are provided. The recoverable and fault-tolerant CPU core includes first, second, and third arithmetic logic circuits configured to perform a calculation requested by the same instruction, a first selector configured to compare calculation values output from the first, second, and third arithmetic logic circuits by the same instruction, determine as a normal state when two or more of the calculation values are the same, and if not, determine as a fault state, and a register file configured to record the calculation value having the same value, when determining as the normal state in the first selector. | 05-28-2015 |
20150309859 | Apparatus and Method of Error Monitoring with a Diagnostic Module - A vehicle computer system configured to communicate with a mobile device, comprising a wireless transceiver configured to communicate with the mobile device. The vehicle computer system also includes a processor in communication with the wireless transceiver and memory. The processor is configured to monitor activity occurring at the wireless transceiver, receive a message from the wireless transceiver that includes information related to one or more software states of the wireless transceiver, determine an error has occurred at the wireless transceiver, save the information related to the one or more software states of the wireless transceiver in the memory, and send the information related to the one or more software states. | 10-29-2015 |
20150317195 | ERROR CONTROL USING THRESHOLD BASED COMPARISON OF ERROR SIGNATURES - A technique is provided for system reliability. An input is received, and a computation operation on the input is repeated to generate multiple output values. The multiple output values are stored in a table along with a number of hits for each distinct output value in the multiple output values, and the number of hits indicates a number of times each distinct output value was generated by the repeating. A reliability circuit checks whether the number of hits for any one distinct output value meets a confidence threshold. Based on meeting the confidence threshold for the number of hits, the any one distinct output value is output. Based on the number of hits for the any one distinct output value not meeting the confidence threshold, the computation operation is continuously repeated on the input until the number of hits for the any one distinct output value meets the confidence threshold. | 11-05-2015 |
20150339180 | APPLICATION AWARE SERVICE POLICY ENFORCEMENT AND AUTONOMOUS FEEDBACK-BASED REMEDIATION - A virtualization platform can discover capabilities of data devices connected in a virtual infrastructure. The virtualization platform allows a user (e.g., system administrator) to specify a policy profile for a virtual machine in terms of performance and data handling parameters. The virtualization platform can provision a virtual machine comprising data devices having a combined capability that matches the policy profile. Enforcement of a policy profile can be made when I/O is performed by a virtual machine. | 11-26-2015 |
20150378800 | STORAGE DEVICE AND STORAGE DEVICE CONTROL METHOD - The degree of deterioration of each physical storage area in a non-volatile memory is evaluated without interrupted operation of a storage device. The storage device includes a non-volatile memory configured to include a plurality of physical storage areas and a controller. The controller calculates the degree of deterioration of each of a plurality of specific physical storage areas by performing an evaluation process of evaluating the plurality of specific physical storage areas part by part over all of the plurality of specific physical storage areas and determines whether to use the corresponding physical storage areas based on the calculated degree of deterioration. In the evaluation process, the controller selects a part of the plurality of specific physical storage areas writes predetermined evaluation data on the physical storage area group, reads the evaluation data and calculates the degree of deterioration based on the read evaluation data. | 12-31-2015 |
20150378811 | DETECTING THE USE OF STALE DATA VALUES DUE TO WEAK CONSISTENCY - An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program. | 12-31-2015 |
20160011923 | ERROR HANDLING FOR FILES EXCHANGED OVER A NETWORK | 01-14-2016 |
20160019070 | METHOD FOR CONFIGURING STORAGE SYSTEM CONNECTION, DEVICE AND STORAGE SYSTEM - A method for configuring a connection in a storage system is provided. A configuring device determines that the configuring device cannot communicate with a first control board, and identifies route information related to the first control board in a route information table. The route information is route information between an adapter card and the first control board. The configuring device modifies the identified route information by changing an address of the first control board in the route information to an address of a second control board. | 01-21-2016 |
20160034332 | INFORMATION PROCESSING SYSTEM AND METHOD - An information processing system includes: a first system that includes a group of arithmetic units, a controller, and an external device; and a second system configured to execute calculation which is the same as calculation executed in the first system and compare calculation results to each other, wherein the controller is configured to: stop a plurality of arithmetic units when it is detected that an output request to the external device is output from one or more arithmetic units among the plurality of arithmetic units that execute first calculation in the group of arithmetic units, the plurality of arithmetic units including one or more arithmetic units that does not output the output request, transmit first comparison target data including a value output in response to the output request to the second system, and instruct the stopped one or more arithmetic units to execute second calculation. | 02-04-2016 |
20160043912 | MAKING MEMORY OF COMPUTE AND EXPANSION BLADE DEVICES AVAILABLE FOR USE BY AN OPERATING SYSTEM - Examples disclosed herein relate to making memory of compute and expansion blade devices available for use by an operating system (OS). Examples include making available, for use by an OS, a compute logical processor of the compute blade device, identified memory of the compute blade device, and identified memory of an expansion blade device. Examples further include making the expansion logical processor unavailable to the OS. | 02-11-2016 |
20160077908 | FAILURE INTERVAL DETERMINATION - For failure interval determination, a determination module determines a failure interval for transactions in a transaction queue based on a number of processed transactions. A transaction timeout module fails a first transaction in response to the first transaction not processing within the failure interval. | 03-17-2016 |
20160092295 | ADAPTIVE APPLICATION LOGGER - Embodiments of the invention provide systems and methods for logging of messages in a development environment. More specifically, embodiments of the present invention provide dynamically adaptive logging of runtime messages generated by an application. These embodiments provide a way to handle the volume of information stored in the logs by dynamically changing the severity associated with generated messages based on previous code path execution. Embodiments can use a set of metrics to replace the usual static log level associated with the code by the developer. For example, such metrics can include but are not limited to a cost-based (storage volume on disk), an exception-based (weight increase in catch block), and/or a crowd-based (community can vote down noise). As a result, embodiments can provide more detailed information when the error is recurring for a particular user but without generating so much information as to make the log difficult to use. | 03-31-2016 |
20160092320 | ELECTRONIC FAULT DETECTION UNIT - An electronic fault detection unit is provided that has a first register, a second register, a comparator circuit, and a timer circuit. The first and second register can be written from a first software portion, and a second software portion, respectively. The comparator circuit is arranged to detect that both the first and second register have been written, verify a relationship between first data written to the first register and second data written to the second register, and signal a fault upon said verification failing. The timer circuit is arranged to signal a fault if said verification of the comparator circuit does not occur within a time limit. | 03-31-2016 |
20160098325 | UNIFYING APPLICATION LOG MESSAGES USING RUNTIME INSTRUMENTATION - Unifying application log messages using runtime instrumentation includes capturing raw data associated as a log message from an application using an application monitoring module, determining if the raw data is to be filtered based on a filtering configuration, and constructing a log message based on the raw data. A system for unifying application log messages using runtime instrumentation includes a capture engine to capture raw data associated as a log message from an application using an application monitoring module, a determination engine to determine if the raw data is to be filtered based on a filtering configuration, a construction engine to construct a log message based on the raw data, and a log framework monitor engine to monitor an application program interface that invokes a writing action of the log message using at least one log framework to capture the log message in real time. | 04-07-2016 |
20160116953 | ELECTRONICS ENCLOSURE WITH REDUNDANT THERMAL SENSING ARCHITECTURE - Described herein is a system and method for downstream redundant thermal sensing in a computer system. The system may determine that a component temperature of a component of the computer system has surpassed a first temperature threshold. The system may determine a downstream thermal sensor that is downstream from the component, wherein downstream is based on airflow through the computer system. The system may determine a downstream temperature at the downstream thermal sensor. The system may determine whether the downstream temperature exceeds a second temperature threshold. In response to determining the downstream temperature exceeds the second temperature threshold, the system may determine whether other thermal sensors detect elevated operating temperatures. In response to determining the other thermal sensors do not detect elevated operating temperatures, the system may initiate cooling | 04-28-2016 |
20160124785 | SYSTEM AND METHOD OF SAFETY MONITORING FOR EMBEDDED SYSTEMS - The safety and integrity of an embedded computer system is monitored using an independent safety monitoring module in communication with the main controller module via a serial connection to a safety monitoring module proxy in the main controller module. The main controller module is monitored through the use of alive-telegram exchanges and computational challenges. The safety monitoring module also receives temperature information and supply voltage information about the main controller module. The monitored information may be evaluated using a prognostic model constructed using a simulation of failure modes off line. | 05-05-2016 |
20160124789 | COMMUNICATION SOFTWARE STACK OPTIMIZATION USING DISTRIBUTED ERROR CHECKING - A method of processing a request message begins when a first layer of a plurality of layers of a system stack receives the request message. In turn, the plurality of layers negotiate an agreement based on the request message, where the agreement indicates which layers will process particular error reply codes of an error reply code list. Then, a non-controller layer of the plurality of layers performs a first error check in accordance with the agreement and records a first error result in a communication interface based on the first error check; a controller layer of the plurality of layers performs a second error check in accordance with the agreement and records a second error result in the communication interface based on the second error check. Then a reply message responsive to the request message is outputted based on the first error check and the second error check. | 05-05-2016 |
20160154693 | METHOD FOR ERROR MONITORING, CONTROL AND DATA TRANSMISSION INSTALLATION AND CONTROL DEVICE | 06-02-2016 |
20160170828 | NON-LOCAL ERROR DETECTION IN PROCESSOR SYSTEMS | 06-16-2016 |
20160188394 | ERROR COORDINATION MESSAGE FOR A BLADE DEVICE HAVING A LOGICAL PROCESSOR IN ANOTHER SYSTEM FIRMWARE DOMAIN - Examples disclosed herein relate to an error coordination message for a blade device having a logical processor in another system firmware (SFW) domain. Examples include a partition of a blade system to run an operating system (OS) utilizing blade devices including respective logical processors operating in different SFW domains. Examples further include an error coordination message made available to one of the blade devices by another of the blade devices. | 06-30-2016 |
20160196175 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM | 07-07-2016 |
20160202914 | SYSTEM AND METHOD FOR MEMORY COMMAND QUEUE MANAGEMENT AND CONFIGURABLE MEMORY STATUS CHECKING | 07-14-2016 |
20160255006 | Semantic Deduplication | 09-01-2016 |