Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


05th week of 2021 patent applcation highlights part 46
Patent application numberTitlePublished
20210034375ELECTRICALLY PROGRAMMABLE APPLICATION-SPECIFIC INTEGRATED CIRCUIT INITIALIZATION ENGINE - A method of initializing an application-specific integrated circuit (ASIC), the method including reading, by a boot microcode engine integrated with the ASIC, microcode from an electrically programmable non-volatile memory (EP-NVM) integrated on a same die as the ASIC. The method further includes writing the microcode onto internal memories of a micro-controller of the ASIC and initializing the micro-controller by the boot microcode engine. The method also includes loading, by the micro-controller, a full boot image from an additional storage device distinct from the EP-NVM onto the internal memories of the micro-controller and initializing the ASIC by the micro-controller based on the full boot image.2021-02-04
20210034376BOOT PERSONALITY FOR NETWORK DEVICE - Embodiments described herein may relate to methods, systems, and/or instructions stored on non-transitory computer readable mediums for managing a boot personality of a network device. Managing a boot personality may include, while executing a first operating system on a network device in a first boot personality using a first processor, executing a command to modify a configuration of a hardware component of the network device to cause the network device to be configured in a second boot personality. The method may also include rebooting the network device; initializing, based on the configuration of the hardware component, a second processor before the first processor; and executing, after the initialization, a second operating system while the network device is in the second boot personality.2021-02-04
20210034377APPLICATION INTERFACE AND DATABASE STRUCTURES TO REMOTELY MANAGE BIOS SETTINGS OF AUTOMATED TELLER MACHINES - A method for controlling at least one setting of a basic input output system (BIOS) of at least one automated transaction machine (ATM) can include provisioning features of an active management technology system of a first computing device associated with an ATM. The method can also include establishing an initial trust between the first computing device and a second computing device that is remote from the first computing device, over a serial-over-lan (SOL) connection that is a feature of the active management technology system. The method can also include configuring the setting of the BIOS of the first computing device and storing a schedule for changing the setting of the BIOS. The method can also include reconfiguring the setting of the BIOS in response to the schedule stored on the database over the SOL.2021-02-04
20210034378LOCATION-BASED MOBILE APPLICATION PROCESSING - A mobile device includes an originally downloaded mobile application. When a location of the mobile device is detected within a configured distance of a target enterprise store location, configuration data for the target enterprise's mobile application and services are obtained and automatically sent to the mobile device. The configuration data is applied to the original mobile application. When the user launches the original mobile application from the mobile device, the executing instance of the mobile application is transformed into the target enterprise's mobile application connected to the target enterprise's mobile application services server. The executing instance of the mobile application includes the branding, design, features, and workflow of the target enterprise's mobile application.2021-02-04
20210034379Object-Oriented Memory for Client-to-Client Communications - Systems and corresponding methods employ an object-oriented (OO) memory (OOM) to effect inter-hardware-client (IHC) communication among a plurality of hardware clients included in same. A system comprises a centralized OOM and the plurality of hardware clients communicate, directly, to the centralized OOM device via OO message transactions. The centralized OOM device effects IHC communication among the plurality of hardware clients based on the OO message transactions. Another system comprises a plurality of OO memories (OOMs) capable of inter-object-oriented-memory-device communication. A hardware client communicates, directly, to a respective OOM device via OO message transactions. The inter-object-oriented-memory-device communication effects IHC communication among the plurality of hardware clients based on the OO message transactions.2021-02-04
20210034380Object-Oriented Memory Client - A hardware client and corresponding method employ an object-oriented memory device. The hardware client generates an object-oriented message associated with an object of an object class. The object class includes at least one data member and at least one method. The hardware client transmits the object-oriented message generated to the object-oriented memory device via a hardware communications interface. The hardware communications interface couples the hardware client to the object-oriented memory device. The object is instantiated or to-be instantiated in at least one physical memory of the object-oriented memory device according to the object class. The at least one method enables the object-oriented memory device to access the at least one data member for the hardware client.2021-02-04
20210034381Device Re-Configuration for Security - In accordance with some embodiments, an apparatus that controls device re-configuration for security is provided. The apparatus includes a storage storing a first firmware image for a re-configurable data communication device. In some embodiments, the first firmware image provides one or more operating parameter configurations for the re-configurable data communication device. The apparatus also includes a controller, which is coupled to the storage and the re-configurable data communication device and operable to manage transport of data by the re-configurable data communication device, including obtaining the first firmware image from the storage and loading the first firmware image to the re-configurable data communication device. The apparatus additionally includes a housing at least partially supporting the storage and the controller.2021-02-04
20210034382METHOD AND SYSTEM CREATING AND USING SUB-DATA CONFIDENCE FABRICS - In general, in one aspect, the invention relates to a method for managing data. The method includes obtaining, by a local data manager, a first data confidence fabric (DCF) configuration file, where the first DCF configuration file is associated with a first DCF pipeline and a first workload. The method further includes registering the first DCF pipeline in a DCF pipeline registry, obtaining a data set, identifying the first DCF pipeline using the DCF pipeline registry, and processing the data set based on the first DCF pipeline to obtain first processed data.2021-02-04
20210034383METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR STORAGE MANAGEMENT - Techniques perform storage management. In accordance with such techniques, in response to determining that there is an abnormal process in a process group of an application, and a first size of storage space occupied by the abnormal process exceeds a first threshold, an abnormal process is terminated. A second size of storage space occupied by other processes than the abnormal process in the process group after the abnormal process is terminated is determined. In response to the second size exceeding a second threshold, at least one process in the process group to reduce the second size is terminated, where the at least one process is different from the abnormal process.2021-02-04
20210034384Electronic Devices and Corresponding Methods for Switching Between Normal and Privacy Modes of Operation - An electronic device includes a user interface, a wireless communication device, and one or more processors. The wireless communication device establishes a paired communication connection with at least one companion electronic device. The wireless communication device receives one or more electronic communications from the at least one companion electronic device. The one or more processors determine, from the one or more electronic communications, whether an environment of the electronic device is a public environment or a private environment. Where the environment is the private environment, the one or more processors cause the user interface of the electronic device to enter a normal mode of operation. Where the environment is the public environment, the one or more processors cause the user interface of the electronic device to enter a privacy mode of operation.2021-02-04
20210034385LOGGING USER INTERFACE ACTIVITY WITH CONTROL PLACEMENT AND ACTIVITY INFORMATION - The described technology is generally directed towards logging activity of a user interface in a web application. According to an embodiment, a system can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, that include receiving user interface information describing a user interface of the web application. The operations can further include receiving activity information corresponding to operation of the user interface, and the activity information can comprise an indication of a user interface event comprising placement information for a user interface control of the user interface that triggered the user interface event. The operations can further include combining the user interface information with the activity information, resulting in a log of the operation of the user interface.2021-02-04
20210034386MIXED-GRAINED DETECTION AND ANALYSIS OF USER LIFE EVENTS FOR CONTEXT UNDERSTANDING - Techniques for resolving multiple user requests from multiple user accounts by an interactive interface are described. An interactive interface can obtain a first multi-dimensional context graph for a first user account and a second context graph for a second user account. Each graph comprises correlated contexts related to the user account. The interface can also receive a first user request associated with the first user account and a second user request associated with the second user account; determine, based on the first graph, a first current context and one or more first previous contexts for the first user request; determine, based on the second graph, a second current context and one or more second previous contexts for the second user request; determine one or more interrelationships between the first and the second graphs; and resolve the user requests based on the contexts and the interrelationships.2021-02-04
20210034387Methods and Device for Task Mobilization - A method for task mobilization is disclosed. The method may include a server receiving a plurality of user inputs from a desktop application. Each user input may correspond to a respective function performed by a user on the desktop application. The processor may identify the respective functions of the plurality of user inputs. Further, the method may include translating the respective functions into respective mobile view functions. Based on the respective mobile view functions, the processor may generate a mobile application and provide the mobile application to a mobile user device.2021-02-04
20210034388USER INTERFACE ADVISOR - A server system, the server system including: a memory processor including memory; a communication link, a first program designed to construct a list of end-goals for a software tool, where the memory includes a plurality of prior user interface experience records, and where each of the plurality of prior user interface experience records represent a user interaction with a plurality of user interface screens of the software tool; a second program designed to build a user experience graph based on the plurality of prior user interface experience records, where the construct a list of end-goals for a software tool includes at least one end-goal; and a third program designed to use the list of end-goals to communicate to at least one user of the software tool suggestion notes based on popular paths along the user experience graph leading towards the end-goal to help the at least one user interface with the software tool.2021-02-04
20210034389DESKTOP VIRTUALIZATION WITH LINKED POWER MANAGEMENT TO CLIENT DEVICES - A computer system includes a client device that includes a physical power control input to change the client device between on/off states, and a virtual server running virtual machines, with the client device accessing one of the virtual machines. The computer system includes a computing platform that interfaces with the client device and the virtual server to map the client device to the virtual machine being accessed by the client device, and receive at least one power control signal from the client device based on selection of the physical power control input. The computing platform initiates, in response to the received at least one power control signal and the client device being mapped to the virtual machine, a change in an on/off state of the virtual machine to match a change in the on/off state of the client device so as to reboot the virtual machine.2021-02-04
20210034390DYNAMIC ASSIGNMENT OF INTERRUPTS BASED ON INPUT/OUTPUT METRICS - A system and method dynamically assign interrupts to a virtual machine from an input/output (I/O) adapter based on I/O metrics of the I/O adapter. An interrupt manager monitors I/O adapter traffic flow metrics such as latency of data transfers, usage levels, and transfers per unit of time. The interrupt manager determines when a traffic flow metric for a virtual machine meets a predetermined performance threshold and updates virtual interrupt assignments in a logical interrupt table to improve performance of the system. The interrupt manager uses hint data provided by the device driver to make the interrupt assignments.2021-02-04
20210034391SYSTEM AND METHOD FOR ENABLING DYNAMIC CONFIGURATION OF VIRTUAL HARDWARE - A method, computer program product, and computer system for detecting, by a computing device, a desired configuration of a virtual machine (VM) for a plurality of devices. It may be detected that a current state of the plurality of devices does not match the desired configuration of the VM for the plurality of devices, wherein the current state of the plurality of devices may identify that at least one device of the plurality of devices is not present. The desired configuration of the VM may be modified to exclude the at least one device of the plurality of devices that is not present.2021-02-04
20210034392SELECTIVE CODE SEGMENT COMPILATION IN VIRTUAL MACHINE ENVIRONMENTS - This disclosure provides a solution for improving performance in a virtual machine. In this method, a platform independent intermediate representation of a code segment in an application is obtained from a first virtual machine which is operating on a first platform. The platform independent intermediate representation is generated through a run-time compilation by the first virtual machine. Native code is generated based on the platform independent intermediate representation, in which at least one piece of the native code corresponds to a second platform which is different from the first platform. The at least one piece of the native code is distributed to a second virtual machine which is operating on the second platform.2021-02-04
20210034393DATA CORRELATION USING FILE OBJECT CACHE - Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.2021-02-04
20210034394DATA CORRELATION USING FILE OBJECT CACHE - Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a tile system.2021-02-04
20210034395ASYNCHRONOUS INPUT AND OUTPUT FOR SNAPSHOTS OF VIRTUAL MACHINES - A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.2021-02-04
20210034396ASYNCHRONOUS INPUT AND OUTPUT FOR SNAPSHOTS OF VIRTUAL MACHINES - A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.2021-02-04
20210034397ASYNCHRONOUS INPUT AND OUTPUT FOR SNAPSHOTS OF VIRTUAL MACHINES - A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.2021-02-04
20210034398STREAMING DATABASE CLONING USING CLUSTER LIVE MOUNTS - A database can be instantly cloned from a source device to a target device by a cluster mapped to a database to be cloned. Nodes of the cluster are mapped over channels to directories of the database. Scripts are generated from one or more templates that specify the order and values to be executed to perform a database job, such as cloning the database to the target device using the mappings. To clone the database, a template can be executed that generates and populates scripts, which can be executed on the target device to provide a functioning cloned database using the mapped cluster.2021-02-04
20210034399COLLABORATION ACROSS ISOLATED VIRTUAL ENVIRONMENTS - A system can allow collaboration between two or more tenants in a multi-tenant system. Each tenant can share a common access to a processing space and a data storage device. Each tenant can be assigned to a virtual environment having a dedicated portion of the data storage device. The system can create a database record in a first dedicated portion assigned to the first tenant. The database record can be displayed on a user interface of the first tenant and include a collaboration tool component embedded within the database record. The database record can be transmitted to a database and transmitted from the database to a second dedicated portion of the data storage device. The second dedicated portion can be assigned to a second tenant of the multi-tenant system.2021-02-04
20210034400METHOD AND SYSTEM FOR INSTANT RECOVERY OF APPLICATION DATA USING VIRTUAL MACHINE BACKUPS - A method for recovering data includes obtaining a recovery request for application data, identifying a backup associated with the recovery request, generating a placeholder disk associated with the backup, generating a template virtual machine associated with the placeholder disk, generating an application-based virtual disk based on the placeholder disk, generating a file extent map based on the recovery request, populating the application-based virtual disk using the backup, the placeholder disk, and the file extent map to obtain a populated application-based virtual disk, replacing the placeholder disk with the populated application-based virtual disk, and after replacing the placeholder disk with the populated application-based virtual disk, initiating a migration of the template virtual machine.2021-02-04
20210034401CROSS-HYPERVISOR VIRTUAL MACHINE CONVERSION - Cross-hypervisor virtual machine conversion. A set of disk images that define a source virtual machine (VM) in a source host computing environment is determined. For each respective disk image, a corresponding overlay image that references the respective disk image is generated. The overlay image that corresponds to a boot disk image is altered to enable a target VM process to be booted from the overlay image on a target host computing device that utilizes a second type of hypervisor. A target VM process that boots from the overlay image that corresponds to the boot disk image is initiated, and the target VM process is configured to access the set of disk images indirectly via the corresponding overlay images.2021-02-04
20210034402SYSTEM AND METHOD FOR NATIVE AND NON-NATIVE REPLICATION FOR VIRTUAL VOLUME BASED MACHINES - A method, computer program product, and computer system for creating, with a first replication product, one or more groups of a plurality of groups that is empty in a storage array. A protection policy may be applied to the one or more groups on the first replication product, wherein the protection policy may include a replication rule. A policy profile may be created by the second replication product, wherein the replication rule may be included to the policy profile. The protection policy may be applied to a virtual machine (VM). The policy profile may be applied to the VM. The first replication product may replicate one or more virtual volumes of the VM on a remote system based upon, at least in part, the replication rule.2021-02-04
20210034403VIRTUAL MACHINE MANAGEMENT METHOD - Provided is a virtual machine (VM) management method of simulating a change in deployment of VMs deployed on physical servers including a first physical server and a second physical server physically separated from the first physical server and scheduling deployment of VMs and predicting workload of VMs.2021-02-04
20210034404ARCHITECTURE FOR IMPLEMENTING A VIRTUALIZATION ENVIRONMENT AND APPLIANCE - An improved architecture is provided which enables significant convergence of the components of a system to implement virtualization. The infrastructure is VM-aware, and permits scaled out converged storage provisioning to allow storage on a per-VM basis, while identifying I/O coming from each VM. The current approach can scale out from a few nodes to a large number of nodes. In addition, the inventive approach has ground-up integration with all types of storage, including solid-state drives. The architecture of the invention provides high availability against any type of failure, including disk or node failures. In addition, the invention provides high performance by making I/O access local, leveraging solid-state drives and employing a series of patent-pending performance optimizations.2021-02-04
20210034405SIGNALS TO I/O DEVICES BASED ON VIRTUAL COMPUTER MESSAGES - A computer-readable medium may store machine-readable instructions for execution by a processor. There may be a connection between the processor and a virtual computer. The processor may establish a first data channel between the processor and the virtual computer based on the connection between the processor and the virtual computer. The connection may comprise a second data channel to transfer input/output (I/O) data between the processor and the virtual computer. The processor may receive an output message from the virtual computer via the first data channel. The processor may identify an I/O device coupled to the processor based on the output message. The processor may provide an output signal to the I/O device, the output signal based on the output message.2021-02-04
20210034406RDMA WITH VIRTUAL ADDRESS SPACE - Techniques are disclosed for implementing direct memory access in a virtualized computing environment. A memory access policy of the virtualized computing environment is applied to a direct memory access connection request received from a first virtual machine via an exception path. The request is flagged to indicate that the request has been processed and the request is forwarded to a network interface device configured to execute offloaded network functions for one or more virtual machines. A memory access policy of the virtualized computing environment is applied to a direct memory access connection reply received from a second virtual machine on the exception path. The reply is flagged to indicate that the reply has been processed and the reply is forwarded to the network interface device. A direct memory access connection is established between first and second virtual machines in accordance with the request.2021-02-04
20210034407Virtual Machine Scheduling Method and Apparatus - A method and an apparatus for scheduling a virtual machine are disclosed in. The method includes predicting resource data required by a virtual machine in a next time period to obtain a prediction result; obtaining used resource data and available resource data of candidate host machines; adding the prediction result to used resource data of each candidate host machine to obtain a superimposition result of each candidate host machine; and separately comparing the superimposition result of each candidate host machine with available resource data of each host machine, and selecting a target host machine corresponding to the virtual machine from the candidate host machines. The present disclosure solves the technical problem of a large waste of resources caused by the needs of a host machine to reserve resources for respective peaks of each virtual machine in the existing technologies.2021-02-04
20210034408BUILDING A RESILIENT OPERATING SYSTEM BASED ON DURABLE SERVICES WITH KERNEL SUPPORT - In one embodiment, a method includes generating a handle that references a checkpoint for a service, sending the handle to the service, wherein the handle is configured to be used by the service to store one or more states of the service in the checkpoint, determining that the service needs to be restarted, restarting the service, accessing the handle for the checkpoint, and sending the handle for the checkpoint to the restarted service, wherein the handle for the checkpoint is configured to be used by the restarted service to restore the one or more states.2021-02-04
20210034409SYSTEM AND METHOD FOR PRIORITY ORCHESTRATION AND SCHEDULING OF DIFFERENT BACKGROUND OPERATIONS - A method, computer program product, and computer system for receiving an indication about an amount of background IOs a background scheduler is capable of performing on a plurality of applications, wherein the indication may be based upon, at least in part, one of host IO latency and a rate of the host IO latency being at one of a plurality of levels. One or more applications of the plurality of applications on which to perform the background IOs may be determined. The background IO applications to be performed on the one or more applications of the plurality of applications may be scheduled based upon, at least in part, one of the host IO latency and the rate of the host IO latency being at one of the plurality of levels.2021-02-04
20210034410SYSTEM AND METHOD FOR SORTING AND SCHEDULING WORKFLOWS - In general, embodiments of the invention relate to processing backup jobs. The processing of backup jobs includes ordering a first plurality of jobs in a priority queue, where the first plurality of jobs is associated with a first workflow, ordering a second plurality of jobs in the priority queue, where the second plurality of jobs is associated with a second workflow, where the first workflow is associated with a higher weight than the second workflow, where the first plurality of jobs is scheduled to be serviced before the second plurality of jobs, and initiating servicing of the first plurality of jobs.2021-02-04
20210034411RULE-DRIVEN SERVICE MANAGEMENT USING ENTANGLED QUBITS IN QUANTUM COMPUTING SYSTEMS - Rules-driven service management using entangled qubits in quantum computing systems is disclosed. In one example, a first quantum computing device maintains a first qubit entangled with a corresponding second qubit of a second quantum computing device. Upon detecting an occurrence of a trigger condition, the first quantum computing device identifies a quantum operation corresponding to the trigger condition. The first quantum computing device then performs the quantum operation corresponding to the trigger condition on the first qubit. Concurrently with the first quantum computing device performing the quantum operation, the second quantum computing device observes a quantum state of the second qubit. The second quantum computing device identifies a responsive action that corresponds to the quantum state of the second qubit, and performs the responsive action. In this manner, the entangled state between the first and second qubits provides a rules propagation mechanism between the first and second quantum computing devices.2021-02-04
20210034412AHEAD OF TIME SCHEDULING PROCESS FOR AUTONOMOUS VEHICLES - A method of scheduling a plurality of tasks in an autonomous vehicle system (AVS) includes, by a processor, prior to runtime of an autonomous vehicle, identifying a plurality of tasks to be implemented by the AVS of the autonomous vehicle, for each of the tasks, identifying at least one fixed parameter and at least one variable, and developing a schedule for each of the tasks. The schedule includes an event loop that minimizes an overall time for execution of the tasks. The method includes compiling the schedule into an execution plan, and saving the execution plan to a memory of the autonomous vehicle. During runtime of the autonomous vehicle, the processor receives data corresponding to the variables of the tasks, and uses the variables to implement the execution plan on the autonomous vehicle.2021-02-04
20210034413SYSTEM AND METHOD FOR DISTRIBUTION OF DEPENDENT BUILDS ACROSS ORCHESTRATION JOB SCHEDULER SLAVES - A method, computer program product, and computer system for obtaining an input for a build. An initial orchestration job scheduler object may be obtained based upon the input for the build. A directed acyclic graph (DAG) may be determined based upon, at least in part, a dependency engine preprocessing. The DAG may be stored in a format. An array of steps may be built based upon, at least in part, the object, wherein the DAG may be translated from the object into a format readable by an initial orchestration job scheduler to build the array of steps. The array of steps may be executed to perform the build.2021-02-04
20210034414TRIGGERED QUEUE TRANSFORMATION - Methods and systems disclosed herein relate generally to evaluating resource loads to determine when to transform queues and to specific techniques for transforming at least part of queues so as to correspond to alternative resources2021-02-04
20210034415INFORMATION PROCESSING DEVICE, STORAGE SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING SCHEDULING PROGRAM - An information processing device includes; a plurality of threads, each of the plurality of threads being configured to process any of a plurality of tasks, the plurality of tasks being obtained by dividing a job; and a control circuit configured to execute processing when designating a next task in scheduling for the plurality of threads, the processing including inquiring of an assignment destination thread out of the plurality of threads as to whether the next task is to be completed by a scheduled time, and preferentially assigning a task supposed to be completed by the scheduled time in the assignment destination thread, as the next task from among the plurality of tasks.2021-02-04
20210034416METHODS AND APPARATUS FOR CACHE-AWARE TASK SCHEDULING IN A SYMMETRIC MULTI-PROCESSING (SMP) ENVIRONMENT - An apparatus is configured to collect information related to a first activity and analyze the collected information to determine decision data. The information is stored in a first list of the source processing core for scheduling execution of the activity by a destination processing core to avoid cache misses. The source processing core is configured to transmit information related to the decision data using an interrupt, to a second list associated with a scheduler of the destination processing core, if the destination processing core is currently executing a second activity having a lower priority than the first activity.2021-02-04
20210034417COMPUTER-IMPLEMENTED METHOD OF INTERACTION AMONG OPERATING SYSTEM COMPONENTS AND TASKS BY MEANS OF AN INTERFACE BUS - This invention relates to computer engineering and operating system architecture, in particular, it discloses a new method of interaction among operating system components and tasks by means of an interface bus. It introduces OS' interface bus element being part of kernel and acting in similar way as known standard device interface bus but for all OS' components and tasks. Besides, the invention further expands the bus functions by possibility of simultaneous execution of components created for different generations of OS and its microkernels, providing for applications compatibility with any OS and microkernel versions without recompilation, saving user investments, reducing application developer software maintenance costs, and providing for OS component reuse.2021-02-04
20210034418PEER-TO-PEER DISTRIBUTED COMPUTING SYSTEM FOR HETEROGENEOUS DEVICE TYPES - Described is a framework (or technique or method) and system for providing a distributed computing network including different types of devices. The framework allows peer devices to transmit “packages” of information (e.g. messages) throughout the network as conceptual units of a job or data. The framework allows portable code, which is used to perform one or more jobs, to be transportable between peer devices. A device may transmit portable code describing a computation to another device, and the receiving device may then compile the code into executable form that is compatible with the architecture of the particular device. The compiled code may execute functions to perform one or more computations to fulfill job requests as part of a distributed computing protocol.2021-02-04
20210034419SETTING CORE ALLOCATIONS - Allocating CPU cores to a thread running in a system that supports multiple concurrent threads includes training a first model to optimize core allocations to threads using training data that includes performance data, initially allocating cores to threads based on the first model, and adjusting core allocations to threads based on a second model that uses run time data and run time performance measurements. The system may be a storage system. The training data may include I/O workload data obtained at customer sites. The I/O workload data may include data about I/O rates, thread execution times, system response times, and Logical Block Addresses. The training data may include data from a site that is expected to run the second model. The first model may categorize storage system workloads and determine core allocations for different categories of workloads. Initially allocating cores to threads may include using information from the first model.2021-02-04
20210034420Operation for Generating Workload Recommendations - A system, method, and computer-readable medium are disclosed for facilitating a sale of an asset used in a complex asset environment via a sales facilitation operation. In various embodiments the sales facilitation operation includes: identifying a plurality of assets within a complex asset environment; collecting information regarding the plurality of assets within the complex asset environment, the information regarding each of the plurality of assets comprising information from a plurality of data sources; performing a workload-based asset recommendation operation, the workload-based asset recommendation operation analyzing the information regarding each of the plurality of assets to generate a workload-based asset recommendation; and, performing the sales facilitation operation using the information regarding each of the plurality of assets within the complex asset environment and the workload-based asset recommendation.2021-02-04
20210034421METHOD AND APPARATUS FOR BALANCING LOADS, AND COMPUTER-READABLE STORAGE MEDIUM - Embodiments of the present disclosure relate to a method and apparatus for balancing loads, and a computer-readable storage medium. The method includes: for each data processing unit in a set of data processing units in a data processing system, acquiring current input data of the data processing unit for a current clock cycle and next input data of the data processing unit for a next clock cycle; and determining a first metric value indicating changes in input data of said data processing unit in the next clock cycle based on a comparison between the current input data and the next input data. The method further includes controlling an operating state of the set of data processing units in the next clock cycle based on the first metric value determined for the set of data processing units.2021-02-04
20210034422DYNAMIC MEMORY MANAGER - A method comprising: allocating a first memory pool and a second memory pool, the first memory pool being allocated to a first application, and the second memory pool being allocated to a second application; receiving a first request for additional memory, the first request being submitted by the second application; assigning a portion of the first memory pool to the second application, the portion of the first memory pool including a set of memory chunks that are part of the first memory pool, the assigning of the portion including updating a first data structure portion to associate the second application with set of memory chunks; and notifying the second application that the portion of the first memory pool has been assigned to the second application.2021-02-04
20210034423CONTAINER ORCHESTRATION IN DECENTRALIZED NETWORK COMPUTING ENVIRONMENTS - A computer-implemented method for deploying containers in a decentralized network computing environment includes: registering a predetermined amount of computing resources reserved by a plurality of computing devices for utilization as a worker node for running containers; receiving a request from a consumer node to provide services for deployment of a container workload; selecting at least a first computing device from the plurality of computing devices to serve as the worker node for deployment of the container workload; obtaining unidirectional control over a portion of the predetermined amount of computing resources reserved by at least the first computing device; and deploying the container workload on at least the first computing device. A corresponding computer system and computer program product are also disclosed.2021-02-04
20210034424Object-Oriented Memory - A system and corresponding method employ an object-oriented memory device. The object-oriented memory device includes at least one physical memory and a hardware controller. The hardware controller is coupled intra the object-oriented memory device to the at least one physical memory. The hardware controller (i) decodes an object-oriented message received from a hardware client of the object-oriented memory device and (ii) performs an action for the hardware client based on the object-oriented message received and decoded. The object-oriented message is associated with an object instantiated or to-be-instantiated in the at least one physical memory. The action is associated with the object. The object-oriented memory device alleviates the hardware client(s) from having to manage structure of respective data stored in the at least one physical memory, obviating duplication of code among the hardware clients for managing same and efforts for design and verification thereof.2021-02-04
20210034425METHOD AND SYSTEM FOR INTELLIGENTLY PROVISIONING RESOURCES IN STORAGE SYSTEMS - A method and system for intelligently provisioning resources in storage systems. Specifically, the method and system disclosed herein entail throttling the allocation of resources aiding in the performance of background service tasks on a backup storage system. That is, throughout a predicted span of a background service task, resources may be dynamically allocated towards the performance of the background service task at discrete time intervals within the predicted span, thereby improving overall system utilization.2021-02-04
20210034426SYSTEM AND METHOD FOR EXPORTING LOGICAL OBJECT METADATA - Systems and methods for exporting logical object metadata. In one example, the system includes an electronic processor configured to receive a first input from a user. The first input includes a logical object location and at least one metadata export option. The electronic processor is also configured to create an export job based upon the first input. The electronic processor is also configured to store the export job in a job queue, determine when a computing resource is available to execute the export job, and execute the export job when the computing resource is available. The electronic processor is also configured to store a job manifest in a memory location. In one example, the job manifest includes metadata for each logical object located in the logical object location.2021-02-04
20210034427SYSTEM AND METHOD FOR MANAGING LOW COMPUTING RESOURCE STATE - A network device includes computing resources for utilization by processes hosted by the network device and a computing resources manager. The computing resources manager automatically instantiate a new instance of a first process of the processes upon termination of the first process; makes a determination that the network device has entered an out of computing resources state; and in response to the determination: performs an action set to increase a quantity of the computing resources that are available for allocation to the processes.2021-02-04
20210034428ESTIMATING DEVICE AND ESTIMATING METHOD - An estimation device is capable of estimating the number of CPU cores allocated to modules of an information processing device, which employs a micro-service architecture, and performance. A number-of-cores calculation unit 2021-02-04
20210034429SYSTEM AND METHOD FOR VALIDATING VIRTUAL STORAGE APPLIANCE DEPLOYMENT - A method, computer program product, and computing system for generating a virtual storage appliance configuration file. A storage system may be queried for physical configuration information associated with deploying a virtual storage appliance based upon, at least in part, the virtual storage appliance configuration file. One or more virtual storage appliance deployment vulnerabilities associated with the storage system may be identified based upon, at least in part, the virtual storage appliance configuration file and the physical configuration information. A notification including the identified one or more virtual storage appliance deployment vulnerabilities may be generated.2021-02-04
20210034430SYSTEM AND METHOD FOR ADDRESS SPACE SLICING WITH STRONG CPU CORE AFFINITY - A method, computer program product, and computer system for partitioning, by a computing device, resources between a plurality of central processing unit (CPU) cores. A logical block address (LBA) space of a user may be divided into a slice with an affinity to a CPU core of the plurality of CPU cores. IO flow processing may be processed by the CPU core of the plurality of CPU cores associated with the LBA space divided into the slice.2021-02-04
20210034431DISCOVERY AND MAPPING OF A PLATFORM-AS-A-SERVICE ENVIRONMENT - A system includes persistent storage configured to store data on behalf of a managed network and a discovery application configured to perform operations. An application system hosts software applications on behalf of the managed network. The operations include obtaining a service identifier for the application system and, based thereon, determining partitions into which the application system is divided. The operations also include determining, within each respective partition, spaces between which the software applications of the managed network are distributed, and determining, within each respective space, one or more software applications of the software applications of the managed network. The respective space provides an isolated computing environment for execution of the one or more software applications therein. The operations further include determining a mapping that indicates a distribution of (i) the spaces among the partitions and (ii) the software applications among the spaces, and storing, in the persistent storage, the mapping.2021-02-04
20210034432VIRTUAL SYSTEMS MANAGEMENT - An apparatus and method for automatic configuration management of a network are provided. The apparatus and method may provide a virtualization system that has an inventory that includes physical resources and virtual assets managed by a virtualization layer running on the physical resources; wherein virtual assets are software instantiations of computer systems, receive a virtual asset provisioning request that specifies parameters to be considered for the virtual asset provisioning request and receive data on inventory available in the virtualization system. The apparatus and method may automatically provision a particular virtual asset to a particular physical resource in the virtualization system that matches the parameters in the virtual asset provisioning request, assign the provisioned virtual asset to the virtual asset provisioning request and provide user access to the provisioned virtual asset.2021-02-04
20210034433AUTOMATIC QUERY ROUTING - A data request that references an external data environment object (foreign object) is identified. A Data Manipulation Language (DML) statement for accessing the object is traversed in a defined order to identify foreign servers having the foreign object. Connections are attempted to foreign servers in the defined order and a selection to one of the foreign servers is made based on server and/or data conditions. The selected server is used for the request to process the portion of the request that includes the foreign object, In an embodiment and during execution of data request, the server and/or the data conditions can be dynamically overridden to change selection criteria for the selected server.2021-02-04
20210034434DISTRIBUTION OF COMPONENTS OF DISPLAYED DATA BETWEEN A SERVER AND A CLIENT BASED ON SERVER AND CLIENT LOAD FACTORS - A determination is made of values for measures that affect processing of data in a computing environment comprising a client communicatively coupled to a server, wherein the measures include data factors, client factors, and server factors. A determination is made as to whether a load on the client is greater than the load on the server by calculating a load on the client and a load on the server based on the data factors, the client factors and the server factors, and then comparing the load on the client to the load on the server. In response to determining that the load on the client is greater than the load on the server, the data is stored at a location in the server, and an indication is made in a data structure in the client of a pointer to the location in the server.2021-02-04
20210034435METHOD AND SYSTEM OPTIMIZING THE USE OF SUB-DATA CONFIDENCE FABRICS - In general, in one aspect, the invention relates to a method for managing data, the method includes obtaining, by a data management system, a first resource usage of a local data system associated with a first data confidence fabric (DCF) pipeline, wherein the first DCF pipeline is associated with a first workload, obtaining second resource usage of the local data system associated with a second DCF pipeline, wherein the second DCF pipeline is associated with a second workload, analyzing the first resource usage and the second resource usage to obtain a workload ranking, and performing an action set based on the workload ranking.2021-02-04
20210034436Virtual Machine Scheduling Method and System - A method and a system for scheduling a virtual machine are disclosed. The method includes: obtaining energy consumption data of a rack and energy consumption data of host computers, wherein the rack is used to place the host computers; determining power consumption data of a virtual machine; determining a target host computer corresponding to the virtual machine according to the energy consumption data of the rack, the energy consumption data of the host computers, and the power consumption data of the virtual machine; and dispatching the virtual machine to the target host computer. The present disclosure solves the technical problems of unbalanced power consumption scheduling caused by virtual machine scheduling methods that are implemented only according to CPU parameters in the existing technologies.2021-02-04
20210034437SYSTEM AND METHOD FOR MULTIDIMENSIONAL SEARCH WITH A RESOURCE POOL IN A COMPUTING ENVIRONMENT - In accordance with an embodiment, a system enables multidimensional search within a resource pool, to support complex borrow operations such as, for example, specifying ranges for particular connection properties. As threads access the pool, attempting to borrow connections having particular connection properties, one or more skipped pool elements can be represented as skip lists within a k-dimensional tree (KD-tree) or other data structure that enables searching across multiple dimensions. In response to receiving a request to borrow a connection having particular connection properties, a multidimensional search can be performed within the KD-tree to determine the availability of a connection having the requested properties.2021-02-04
20210034438CONTROLLER ADDRESS CONTENTION ASSUMPTION - Embodiments of the present invention are directed to a computer-implemented method for controller address contention assumption. A non-limiting example computer-implemented method includes a shared controller receiving a fetch request for data from a first requesting agent, the receiving via at least one intermediary controller. The shared controller performs an address compare using a memory address of the data. In response to the memory address matching a memory address stored in the shared controller, the shared controller acknowledges the at least one intermediary controller's fetch request, wherein upon acknowledgement, the at least one intermediary controller resets. In response to release of the data by a second requesting agent, the shared controller transmits the data to the first requesting agent.2021-02-04
20210034439PARALLEL CLONED WORKFLOW EXECUTION - Provided is a system and method which enables a workflow to be tested while keeping the workflow active by cloning a copy of an underlying job and executing the cloned job in parallel with the underlying job. In one example, the method may include executing an original job on data in a production environment, where the original job comprises machine-readable code of a predefined flow, in response to receiving a simulation request, creating a clone of the original job which comprises an independent execution state from the original job, executing the cloned job for a limited number of runs on one or more events, and storing the processing results of the cloned job.2021-02-04
20210034440EVENT INFORMATION PROCESSING SYSTEM - The method includes receiving event information for a plurality of events from a plurality of data sources; normalizing the event information for each event of the plurality of events into a desired format by at least one of changing a field name of the event information or transforming at least one value in the event information into a recognized value; enriching the event information for each event of the plurality of events by adding additional data points associated with the event information to the event information; and/or transmitting the event information to a data recipient.2021-02-04
20210034441SYSTEM AND METHOD CAPABLE OF REMOTELY CONTROLLING ELECTRONIC APPARATUS TO EXECUTE PROGRAM - The invention provides a system capable of remotely controlling electronic apparatus to execute program. The system comprises a cloud management platform and at least one electronic apparatus. The electronic apparatus comprises a data storage device and a program execution management device. The data storage device comprises a plurality of flash memories and a controller. The program execution management device comprises a microprocessor having a network communication function. When the cloud management platform wants the electronic device to execute a specific operation or collect a specific information, it will send a specific operation instruction to the program execution management device. The microprocessor of the program execution management device wants that the controller of the data storage device executes a corresponding operation program according to the specific operation instruction to generate an execution message related to the specific operation, and then transmits the execution message to the cloud management platform.2021-02-04
20210034442INTER-PROCESSOR COMMUNICATION - A semiconductor integrated-circuit device comprises two processing subsystems, each comprising a respective processor, set of local peripherals, and bridge unit, all connected to a respective local bus. An electrical interconnect joins the respective bridge units. The first bridge unit comprises a task register, accessible over the first local bus, and can be configured to detect a write to the task register, and respond by sending an event signal over the interconnect to the second bridge unit. The second bridge unit can be configured to receive the event signal, and respond by sending an interrupt signal to the second processor.2021-02-04
20210034443SYSTEM AND METHOD FOR THE REMOTE EXECUTION OF ONE OR MORE ARBITRARILY DEFINED WORKFLOWS - A system for the remote execution of one or more arbitrarily defined workflows comprises a workflow engine operative to perform one or more functions defined in a given workflow on customer computing infrastructure and a workflow administrator with access to a workflow database that maintains metadata defining the state of the given workflow, the workflow administrator remote from the workflow engine and not running on the customer computing infrastructure. A workflow administrator agent polls the workflow administrator to identify when the given workflow is scheduled for execution and, when scheduled, issues a command to the workflow engine to retrieve the given workflow from a workflow registry and perform the one or more functions defined in the given workflow on the customer computing infrastructure. The workflow administrator agent transmits state information regarding execution of the given workflow to the workflow administrator for storage in the workflow database.2021-02-04
20210034444SYSTEM MANAGEMENT METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING SYSTEM MANAGEMENT PROGRAM, AND SYSTEM MANAGEMENT DEVICE - A method includes: acquiring, based on status information, a failure risk of each of a plurality of devices including physical devices and virtual machines, each of the virtual machines being operated on any of the physical devices, the status information indicating the statuses of the plurality of devices; acquiring an influence range based on route information indicating a link in a range affected by a failure; acquiring a first influence risk based on a failure risk acquired for a first device, the first physical device being any of the physical devices; acquiring a second influence risk based on a failure risk of a second device, the second influence risk indicating a possibility of a target device being affected by a failure in another device; and determining the second physical devices as a destination candidate of the target device when the second influence risk is lower than the first influence risk.2021-02-04
20210034445SYSTEMS AND METHODS FOR MONITORING AND RESPONDING TO BUS BIT ERROR RATIO EVENTS - A computer system includes a bus interface having error correction capability. The bus interface includes an error register that is configured to provide error information related to correctable errors. System software within the computer system is configured to obtain the error information from the error register and calculate a bit error metric based on the error information. A baseboard management controller within the computer system is configured to take an action in response to obtaining the bit error metric from the system software and determining that a condition related to the bit error metric has been satisfied.2021-02-04
20210034446HOST SYSTEM AND COMPUTING SYSTEM INCLUDING THE HOST SYSTEM - A memory system suitable for counting the number of errors occurring in each memory location, and a host system suitable for detecting a defective memory location based on the number of the errors occurring in each memory location and controlling a repair operation for the defective memory location based on a current amount of data being processed between the host system and the memory system, wherein the memory system repairs the defective memory location using the redundant memory area.2021-02-04
20210034447OPERATING SYSTEM-BASED SYSTEMS AND METHOD OF ACHIEVING FAULT TOLERANCE - A method and apparatus of performing fault tolerance in a fault tolerant computer system comprising: a primary node having a primary node processor; a secondary node having a secondary node processor, each node further comprising a respective memory; a respective checkpoint shim; each of the primary and secondary node further comprising: a respective non-virtual operating system (OS), the non-virtual OS comprising a respective; network driver; storage driver; and checkpoint engine; the method comprising the steps of: acting upon a request from a client by the respective OS of the primary and the secondary node, comparing the result obtained by the OS of the primary node and the secondary node by the network driver of the primary node for similarity, and if the comparison of indicates similarity less than a predetermined amount, the primary node network driver informs the primary node checkpoint engine to begin a checkpoint process.2021-02-04
20210034448PREDICTIVE DISASTER RECOVERY SYSTEM - A method, system and computer program product includes receiving data including parameters affecting recovery point objectives for a disaster recovery plan, analyzing the parameters and determining responsible factors behind recovery point objective deviation based on the analyzing.2021-02-04
20210034449INTEGRATED MODEL FOR FAILURE DIAGNOSIS AND PROGNOSIS - A method for prognostic modeling includes obtaining probability values for possible health states of a system or component part using one or more data driven models and one or more physics failure models. A probabilistic network is built using a plurality of observed and latent variables. The probable outcomes from the one or more physics of failure models and the one or more data driven models are combined to create an integrated model for failure prognosis. A health state of the system or system component is predicted using the integrated model and the probabilistic network.2021-02-04
20210034450METHOD AND SYSTEM FOR RELIABLY FORECASTING STORAGE DISK FAILURE - A method and system for reliably forecasting storage disk failure. Specifically, the method and system disclosed herein entail predicting whether one or more storage disks may fail within a future time period. Further, the storage disk failure forecasts may rely on machine learning classification coupled with prediction reliability scoring.2021-02-04
20210034451METHOD FOR COLLECTING PERFORMANCE DATA IN A COMPUTER SYSTEM - First information for a first event of a computer system is captured, including first event parameters. A first event key is generated, based on the first event parameters. The first information and first key are both stored as a first event in a storage structure, in which the first event key indexes the first event and the captured first information. When second information is captured for a second event, a second event key is generated based on second event parameters of the captured second event. If the second event key matches the first event key, then the first event stored in the event collection system is dynamically updated to store the second event information as part of the first event, to minimize additional storage space needed in the storage structure for the second event.2021-02-04
20210034452DISPLAYING PRE-BOOT ERROR MESSAGES - In some examples, a computing device may include a plurality of components, an embedded controller, and a read-only memory (ROM) to store a basic input output system (BIOS). A display device connected to the computing device may include a display panel and a timing controller. The embedded controller may be configured with instructions to determine that a power-on has been initiated, determine that a particular component of the plurality of components of the computing device has an issue that prevents booting the BIOS, and send a message from the embedded controller to the timing controller. The message may instruct the timing controller to display, on the display panel and before the CPU begins execution, one or more error messages associated with the particular component that has the issue preventing booting the BIOS. In some cases, a logo may be displayed along with the one or more error messages.2021-02-04
20210034453DETECTION OF AN ERROR GENERATED WITHIN AN ELECTRONIC DEVICE - An error in content generated by a first electronic device can be detected by a second electronic device. The second electronic device receives, in one or more messages, first message content and second message content generated by integrated circuit logic within the first electronic device. The second electronic device compares the first message content with predetermined message content. Based on detecting a mismatch between the first message content and the predetermined message content, the second electronic device initiates error recovery for the one or more messages. Initiating error recovery can include, for example, logging an error in the integrated circuit logic, requesting for the first electronic device to regenerate the first message content and second message content, or initiating execution of a program that detects and corrects programming errors in the integrated circuit logic.2021-02-04
20210034454FAULT CLUSTERING FOR REMEDIAL ACTION ANALYSIS - Systems, methods, and non-transitory computer readable media are provided for facilitating improved analysis of remedial actions for faults. Fault information may be obtained. The fault information may characterize a fault of a device. The fault may be clustered into a fault type based on the fault information. A set of remedial actions taken for the fault type may be identified. A set of remedial effects of the set of remedial actions for the fault type may be determined. A timeline view of the fault type may be generated based on the set of remedial actions and the set of remedial effects. The timeline view may include a visual representation of effectiveness of the set of remedial actions. An interface, through which the timeline view of the fault type is accessible, may be provided.2021-02-04
20210034455METHOD, APPARATUS AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED TRANSACTION CONSENSUS PROCESSING - A method for blockchain-based transaction consensus processing is provided. Node devices in a blockchain include at least one primary node device and several secondary node devices, the primary node device fragments proposed transaction data into a specified number of data fragments based on an erasure code algorithm, and the method includes: receiving a data fragment of the transaction data that is sent by the primary node device in a unicast mode, where respective data fragments sent by the primary node device to individual node devices in a unicast mode are different from one another; broadcasting the received data fragment to other node devices in the blockchain, and receiving data fragments of the transaction data that are broadcast by the other node devices; determining whether the number of received data fragments of the transaction data reaches an erasure code recovery threshold; and if so, performing data recovery on the received data fragments based on an erasure code reconstruction algorithm to obtain original content of the transaction data, to complete consensus processing with respect to the original content of the transaction data.2021-02-04
20210034456FLASH MEMORY CONTROLLER, STORAGE DEVICE AND READING METHOD THEREOF - A flash memory controller used to access a flash memory includes a read-only memory, a processor, and an error correction code unit. The read-only memory is used to store a code. The processor executes the code to control access to the flash memory. The error correction code unit includes a control module and a decoder. The control module respectively calculates a first correlation between innate bad-column information and a plurality of trapping sets of a plurality of preset LDPC (low-density parity check) codes and uses the preset LDPC code which has the lowest first correlation as a selected LDPC code. The decoder decodes read information obtained from the flash memory according to the selected LDPC code.2021-02-04
20210034457MEMORY SYSTEMS AND WRITING METHODS OF THE MEMORY SYSTEMS - A memory system includes a host error correction code (ECC) encoder and a memory module. The host ECC encoder performs a host ECC encoding operation of write data to output host ECC encoded data, and the memory module includes a memory medium receiving the host ECC encoded data and a module controller controlling the memory medium. The module controller includes a parity remover and a module ECC decoder. The parity remover removes parity data from the host ECC encoded data to generate parity-removed data and performs a first write operation for writing the parity-removed data into the memory medium. The module ECC decoder performs a module ECC decoding operation of the host ECC encoded data to generate module ECC decoded data and performs a second write operation for writing the module ECC decoded data into the memory medium.2021-02-04
20210034458Devices and Methods for Data Storage - In an embodiment, a storage device includes a multiplicity of data value memory cells and a multiplicity of check value memory cells, where at least one of the multiplicity of data value memory cells is assigned to two of the check value memory cells, and where at least one of the multiplicity of check value memory cells is assigned to two of the data value memory cells, and a correction circuit which is configured to output a corrected data value when reading out a selected data value memory cell of the at least one of the multiplicity of data value memory cells, based on a content of the selected data value memory cell and based on contents of the two check value memory cells assigned to the selected data value memory cell.2021-02-04
20210034459METHOD AND SYSTEM FOR A PROACTIVE HEALTH CHECK AND RECONSTRUCTION OF DATA - In general, the invention relates to a method for managing data. The method includes identifying a first chunk to be health-checked in a fault domain using storage metadata stored in the fault domain, obtaining the chunk from the fault domain, generating, after obtaining the chunk, a first chunk identifier using the first chunk, making a determination that the first chunk identifier does not match a second chunk identifier stored in the storage metadata, and in response to the determination: obtaining a plurality of chunks associated with the first chunk from a plurality of fault domains, wherein the fault domain is not part of the plurality of fault domains, regenerating the first chunk using the plurality of chunks to generate a new first chunk, and storing the new first chunk in the fault domain.2021-02-04
20210034460SHARED BLOCKCHAIN DATA STORAGE BASED ON ERROR CORRECTION CODE - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing blockchain data. One of the methods includes determining, by a blockchain node, one or more blocks that are infrequently visited; performing error correction coding of the one or more blocks to generate one or more encoded blocks; dividing, based on one or more predetermined rules, each of the one or more encoded blocks to a plurality of data sets; selecting one or more data sets from the plurality of data sets of each of the one or more encoded blocks based on the one or more predetermined rules; hashing the one or more data sets to generate one or more hash values corresponding to the one or more data sets; storing the one or more hash values; and deleting the one or more data sets.2021-02-04
20210034461PROGRESSIVE LENGTH ERROR CONTROL CODE - Devices and methods may be used to append a scalable (1) of parity bits in a data packet that scales with a number of data bits in a payload of the data packet. The parity bits may be generated utilizing a table of entries. In some examples, each entry in the table corresponds to a number of the data bits to be included in the payload; and each column of the table may be used to generate a corresponding parity bit of the one or more parity bits.2021-02-04
20210034462SIMPLE AND EFFICIENT TECHNIQUE TO SUPPORT DISK EXTENTS OF DIFFERENT SIZES FOR MAPPED RAID - A technique is directed to storing data on a plurality of storage devices of a data storage array. The technique involves, on each storage device of the plurality of storage devices, providing large disk extents and small disk extents for allocation to RAID extents. The technique further involves forming, from the large disk extents, a user-data RAID extent to store user data for the data storage array. The technique further involves forming, from the small disk extents, an internal-metadata RAID extent to store internal metadata for the data storage array. In some arrangements, spare space is reserved on one or more storage devices between large and small disk extents.2021-02-04
20210034463STORAGE SYSTEM RESOURCE REBUILD BASED ON INPUT-OUTPUT OPERATION INDICATOR - An apparatus comprises a storage system comprising at least one processing device and a plurality of storage devices. The at least one processing device is configured to obtain a given input-output operation from a host device and to determine that the given input-output operation comprises an indicator having a particular value. The particular value indicates that the given input-output operation is a repeat of a prior input-output operation. The at least one processing device is further configured to rebuild at least one resource of the storage system that is designated for servicing the given input-output operation based at least in part on the determination that the given input-output operation comprises the indicator having the particular value.2021-02-04
20210034464SYSTEMS AND METHODS FOR CHECKPOINTING IN A FAULT TOLERANT SYSTEM - A method and system of checkpointing in a computing system having a primary node and a secondary node is disclosed. In one embodiment the method includes the steps of determining by the primary node to initiate a checkpoint process; sending a notification to the secondary node, by the primary node, of an impending checkpoint process; blocking, by the primary node, I/O requests from the Operating System (OS) that arrive at the primary node after the determination to initiate the checkpoint process; completing, by the primary node, active I/O requests for data received from the OS prior to the determination to initiate the checkpoint process, by accessing the primary node data storage; and upon receiving, by the primary node, a notice of checkpoint readiness from the secondary node, initiating a checkpoint process to move state and data from the primary node to the secondary node.2021-02-04
20210034465SYSTEMS AND METHODS FOR APPLYING CHECKPOINTS ON A SECONDARY COMPUTER IN PARALLEL WITH TRANSMISSION - The disclosure relates to a method of checkpointing. The method may include determining, by the primary computer, when to initiate a checkpoint point operation; dividing, at the primary computer, checkpoint data into two or more groups, wherein each group includes one or more pages of memory; transmitting a first group to the secondary computer; upon receiving, by the secondary computer, the first group, correlating memory pages in the first group with pages in memory on the secondary computer; determining, at the secondary computer, which bytes of memory pages of the first group differ from the correlated pages stored in memory in the secondary computer; and applying data from the first group by swapping differences between the memory pages of the first group and the correlated memory pages stored in the secondary computer. Where at least some of these multiple operations are performed in parallel during a subset of the overall checkpoint operation. The simultaneous performance of various memory manage checkpoint operations is advantageous in various fault tolerant systems. The differences may be N-byte differences such as 8-byte differences.2021-02-04
20210034466SYSTEM AND METHOD FOR AUTOMATED RESTORATION OF RECOVERY DEVICE - A method, computer program product, and computer system for performing, by a computing device, a check on an internal secondary device on a first node during a boot software stack initialization. It may be determined that the internal secondary device is corrupt based upon, at least in part, the check. The first node may access a recovery operating system and an image repository of an internal secondary device on a second node. The internal secondary device on the first node may be rebuilt based upon, at least in part, the recovery operating system and the image repository of the internal secondary device on the second node.2021-02-04
20210034467TECHNIQUES FOR DUPLICATING INODE STATE TO PREVENT LOSS OF INODE METADATA - Techniques for performing processing to recover metadata may include: shadow top structures, and performing processing that uses the shadow top structures to recover information for an index node associated with an object of a file system having a file system logical address space. One of the shadow top structures is created for each metadata (MD) top node of a MD mapping structure used to determine storage locations of data stored at corresponding logical addresses in the file system logical address space. Each MD top node is used in determining storage locations for a specified subrange of logical addresses of the file system logical address space. Each shadow top structure corresponding to a MD top node describes each file system object mapped to a logical address included in the specified subrange of logical addresses of the file system address space associated with the corresponding MD top node.2021-02-04
20210034468METHOD AND SYSTEM FOR REDUNDANT DISTRIBUTION AND RECONSTRUCTION OF STORAGE METADATA - In general, the invention relates to a method for managing data, the method includes obtaining data from a host, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of deduplicated data chunks and the at least one parity chunk, storing the storage metadata in an accelerator pool, storing, across a plurality of fault domains, the plurality of deduplicated data chunks and the at least one parity chunk, and initiating storage metadata distribution on the storage metadata across the plurality of fault domains.2021-02-04
20210034469OPTIMIZING SNAPSHOT IMAGE PROCESSING - Systems, methods, and machine-storage mediums for optimizing snapshot image processing are described. The system receives a first read request to read data from optimized snapshot information including snapshot information and cached snapshot information. The first read request includes a first offset identifying a first storage location and a first length. The snapshot information includes a full snapshot and at least one incremental snapshot. The system identifies a first portion of the data is stored in the snapshot information responsive to identifying the first portion of the data is not stored in the cache snapshot information. The system identifies a second portion of data is stored in the optimized snapshot information, reads the first portion of data and the second portion of data from the optimized snapshot information, and communicates the data, including the first and second portions of the data, to the job.2021-02-04
20210034470DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - A data processing device (2021-02-04
20210034471STREAMING DATABASE BACKUP USING CLUSTER LIVE MOUNTS - A database can be backed up and recovered by a cluster mapped to the database. Nodes of the cluster are mapped over channels to directories of the database. Scripts are generated. from one or more templates that specify the order and values to be executed to perform a database job, such as database backup or recovery. To initiate a given database job, a template can be executed that generates and populates scripts, which are processed on the host of the database to perform the database job in a nearly instant manner using the mapped nodes of the cluster.2021-02-04
20210034472METHOD AND SYSTEM FOR ANY-POINT-IN-TIME RECOVERY WITHIN A CONTINUOUS DATA PROTECTION SOFTWARE-DEFINED STORAGE - A method for managing data includes obtaining data from a host, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of deduplicated data chunks and the at least one parity chunk, generating an object entry associated with the plurality of deduplicated data chunks and the at least one parity chunk, storing the storage metadata and the object entry in an accelerator pool, storing, across a plurality of fault domains, the plurality of deduplicated data chunks and the at least one parity chunk, and initiating metadata distribution on the storage metadata and the object entry across the plurality of fault domains.2021-02-04
20210034473DISTRIBUTED FRAMEWORK FOR TASK SPLITTING AND TASK ASSIGNMENTS IN A CONTENT INDEXING SYSTEM - An improved content indexing (CI) system is disclosed herein. For example, the improved CI system may include a distributed architecture of client computing devices, media agents, a single backup and CI database, and a pool of servers. After a file backup occurs, the backup and CI database may include file metadata indices and other information associated with backed up files. Servers in the pool of servers may, in parallel, query the backup and CI database for a list of files assigned to the respective server that have not been content indexed. The servers may then request a media agent to restore the assigned files from secondary storage and provide the restored files to the servers. The servers may then content index the received restored files. Once the content indexing is complete, the servers can send the content index information to the backup and CI database for storage.2021-02-04
20210034474STREAMING DATABASE RECOVERY USING CLUSTER LIVE MOUNTS - A database can be instantly recovered by a cluster mapped to the database. Nodes of the cluster are mapped over channels to directories of the database. Scripts are generated from one or more templates that specify the order and values to be executed to perform a database job, such as database recovery. To recover the database, a template is executed that generates and populates scripts, which are processed on the host of the database to recover the database in a nearly instant manner without transferring data files.2021-02-04
Website © 2025 Advameg, Inc.