34th week of 2020 patent applcation highlights part 44 |
Patent application number | Title | Published |
20200264942 | MESSAGE MANAGEMENT METHOD AND DEVICE, AND STORAGE MEDIUM - A message management method is performed at a computing device, the method including: storing received messages into a plurality of cache queues according to priorities of the received messages; extracting messages from the plurality of cache queues, and storing the extracted messages into a uniform cache queue, wherein the uniform cache queue includes multiple entries, each entry corresponding to a respective one of the plurality of cache queues; scheduling the stored messages in the uniform cache queue to a plurality of outputting scheduling queues according to their respective priorities ; and transmitting the stored messages from the scheduling queues to respective terminals by using a transmit channel corresponding to the scheduling queues . | 2020-08-20 |
20200264943 | Memory Controller With Error Detection And Retry Modes Of Operation - A memory system includes a link having at least one signal line and a controller. The controller includes at least one transmitter coupled to the link to transmit first data, and a first error protection generator coupled to the transmitter. The first error protection generator dynamically adds an error detection code to at least a portion of the first data. At least one receiver is coupled to the link to receive second data. A first error detection logic determines if the second data received by the controller contains at least one error and, if an error is detected, asserts a first error condition. The system includes a memory device having at least one memory device transmitter coupled to the link to transmit the second data. A second error protection generator coupled to the memory device transmitter dynamically adds an error detection code to at least a portion of the second data. | 2020-08-20 |
20200264944 | DETECTION AND MITIGATION FOR SOLID-STATE STORAGE DEVICE READ FAILURES DUE TO WEAK ERASE - Weak erase detection and mitigation techniques are provided that detect permanent failures in solid-state storage devices. One exemplary method comprises obtaining an erase fail bits metric for a solid-state storage device; and detecting a permanent failure in at least a portion of the solid-state storage device causing weak erase failure mode by comparing the erase fail bit metric to a predefined fail bits threshold. In at least one embodiment, the method also comprises mitigating for the permanent failure causing the weak erase failure mode for one or more cells of the solid-state storage device. The mitigating for the permanent failure comprises, for example, changing a status of the one or more cells to a defective state and/or a retired state. The detection of the permanent failure causing the weak erase failure mode comprises, for example, detecting the weak erase failure mode without an erase failure. | 2020-08-20 |
20200264945 | SYSTEM MONITOR - At least some aspects of the disclosure provide for a system. In at least some examples, the system includes a microcontroller, an energy storage element, a monitoring circuit, and a communication bridge. The monitoring circuit is coupled to the energy storage element and configured to determine whether a fault associated with the energy storage element is present, generate an indication of the fault when the fault with the energy storage element is present, and transmit the indication of the fault. The communication bridge is configured to receive the indication of the fault and assert a fault signal and transmit the fault signal to the microcontroller. | 2020-08-20 |
20200264946 | FAILURE SIGN DETECTION DEVICE, FAILURE SIGN DETECTION METHOD, AND RECORDING MEDIUM IN WHICH FAILURE SIGN DETECTION PROGRAM IS STORED - A failure sign detection device is provided with: an issuing unit that issues an access request for inspection of a storage device at a predetermined first timing, and at a second timing later than the first timing; a collection unit that collects, for each access request for inspection, information representing operating characteristics at a time when the storage device operates, in response to the access request for inspection; a storage unit that stores first operating characteristic information representing operating characteristics at the first timing and second operating characteristic information representing operating characteristics at the second timing; and a generation unit that determines a difference between the first operating characteristic information and the second operating characteristic information, thereby generating degradation information representing a state of degradation of the storage device, and thus detecting a failure sign with high accuracy before the storage device fails. | 2020-08-20 |
20200264947 | REMOTE MONITORING AND ERROR CORRECTING WITHIN A DATA STORAGE SYSTEM - Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a plurality of elements that perform data operations and a reporting manager or monitor agent which monitors the elements and data operations. Upon detection of hardware or software problems, the reporting manager or monitor agent automatically communicates with elements affected by the problem to gather selected hardware, software, and configuration information, analyzes the information to determine causes of the problem, and issues a problem report containing at least a portion of the selected information. The problem report is communicated to a remote monitor that does not possess access privileges to the elements, allowing automated, remote monitoring of the elements without compromising security of the computer network or elements. | 2020-08-20 |
20200264948 | MEMORY SYSTEM AND OPERATING METHOD THEREOF - A memory system includes a controller configured to transfer first data for a program operation, and a memory device configured to perform an error check operation for determining whether second data received from the controller are equal to the first data and the program operation for storing the first data. | 2020-08-20 |
20200264949 | ACCESS METHOD - An access method is provided, which is applied to a memory device. The memory device is coupled to a host device, the host device is configured to provide a data, the memory device includes a SSD controller and a volatile memory, the volatile memory is coupled to the SSD controller, and the volatile memory includes a data storage area. The access method includes: the SSD controller receiving the data, the SSD controller generating a corresponding cyclic redundancy check code according to the data, and the SSD controller sequentially storing the data and the cyclic redundancy check code into the data storage area. | 2020-08-20 |
20200264950 | MEMORY DEVICE WITH CONFIGURABLE ERROR CORRECTION MODES - Methods, systems, and apparatus to selectively implement single-error correcting (SEC) operations or single-error correcting and double-error detecting (SECDED) operations, without noticeably impacting die size, for information received from a host device. For example, a host device may indicate that a memory system is to implement SECDED operations using one or more communications (e.g., messages). In another example, the memory system may be hardwired to perform SECDED for certain options. The memory system may adapt circuitry associated with SEC operations to implement SECDED operations without noticeably impacting die size. To implement SECDED operations using SEC circuitry, the memory system may include some additional circuitry to repurpose the SEC circuitry for SECDED operations. | 2020-08-20 |
20200264951 | MEMORY SYSTEM AND METHOD OF CONTROLLING NON-VOLATILE MEMORY - A memory system of an embodiment includes a memory controller and a non-volatile memory. The memory controller executes error correction encoding on user data received from a host to generate first encoded data, adds the first encoded data to each of one or more pieces of second encoded data, obtained by performing error correction encoding on each of one or more pieces of predetermined data, to generate one or more pieces of third encoded data, obtained by executing error mitigation encoding on the first encoded data, and selects any one piece of encoded data from the first encoded data and the one or more pieces of third encoded data. The non-volatile memory stores the selected encoded data. | 2020-08-20 |
20200264952 | DEVICE AND METHOD FOR CONTROLLING THE DATA REFRESH CYCLES IN REPROGRAMMABLE NON-VOLATILE MEMORIES - A method for controlling the refresh of data in reprogrammable nonvolatile memories includes a plurality of memory pages for storing data. The method performs the steps of: identifying with an error correction code errors in a read memory page; computing among the identified errors the number of retention errors and of non-retention errors, the non-retention errors especially comprising repeated read or programming errors; computing the retention age of the read memory page; estimating the remaining retention time for the read memory page depending on the parameters number of retention errors, number of non-retention errors and retention age computed beforehand; comparing the estimated value of the remaining retention time to a predefined value corresponding to a maximum time interval between two successive operations of reading a memory page; and determining whether the read memory page must be refreshed or not depending on the results of the comparison determining whether the page must be refreshed or not depending on the estimated value of the remaining retention time. | 2020-08-20 |
20200264953 | ERROR CORRECTION IN DATA STORAGE DEVICES - Systems and methods are disclosed for error correction in data storage devices. In some implementations, a method is provided. The method includes obtaining configuration data indicating a logical arrangement for a set of blocks. The logical arrangement includes rows and columns of blocks. The configuration data also indicates a number of row parity blocks in a set of row parity blocks and a number of diagonal parity blocks in a set of diagonal parity blocks. The method also includes configuring a set of storage devices based on the configuration data, wherein a first number of data blocks in the set of diagonal parity blocks is less than a second number of data blocks in a column. | 2020-08-20 |
20200264954 | METHOD AND APPARATUS FOR CONSISTENT AND HIGHLY AVAILABLE DATA STORAGE USING LOCAL AND FABRIC ATTACHED NON-VOLATILE MEMORY STORAGE DEVICES - A server computer is configured to write a first copy of a block of data to a first namespace on a first non-volatile memory-based cache drive and a second copy of the block of data to a RAID controller for de-staging of the data to hard disk drives of a RAID array. Acknowledgment of hardening of the data on the hard disk drives initiates purging of the first copy of the block of data from the cache drive. High availability is enabled by writing a third copy of the block of data to a second server to store the block of data in a second namespace on a second non-volatile memory-based cache drive. Restoring of data after power loss accesses the data on the first non-volatile memory-based cache drive. | 2020-08-20 |
20200264955 | USING FILE SYSTEM EXTENDED ATTRIBUTES TO UPDATE DATABASES IN HIERARCHICAL FILE SYSTEMS - Systems and methods are disclosed for reconstructing a file hierarchy by scanning attributes of stored files. Stored files can have a file hierarchy that is maintained in a database stored on a storage device. The files can be stored as objects on the device using a flat file structure. The file database provides the file hierarchy. The systems and methods disclosed herein store information in file system extended attributes for individual storage files such that the database can be reconstructed by scanning the storage files, using values in the extended attributes to recreate the hierarchical database. | 2020-08-20 |
20200264956 | RECOVERY SUPPORT TECHNIQUES FOR STORAGE VIRTUALIZATION ENVIRONMENTS - Recovery support techniques for storage virtualization environments are described. In one embodiment, for example, a method may be performed that comprises defining, by processing circuitry, a storage container comprising one or more logical storage volumes of a logical storage array of a storage system, associating the storage container with a virtual volume (vvol) datastore, identifying metadata for a vvol of the vvol datastore, and writing the metadata for the vvol to the storage system. Other embodiments are described and claimed. | 2020-08-20 |
20200264957 | PERFORMING A DATABASE BACKUP BASED ON AUTOMATICALLY DISCOVERED PROPERTIES - Properties of one or more databases of nodes of a database system are automatically discovered. The automatically discovered properties for at least one of the databases include a database architecture and a corresponding failover role for each of at least some of the nodes. Based at least in part on the discovered properties, a corresponding one of the nodes as a corresponding backup source node is selected for each of the one or more databases. One or more database backups are allowed to be performed via the one or more selected backup source nodes. | 2020-08-20 |
20200264958 | SECURE AND ENCRYPTED LOGGING SYSTEMS AND METHODS WITH DATA RECOVERY - Secure logging systems and methods using cryptography and/or encryption with crash recovery. In some embodiments, the secure logging system includes an initialization module to initialize cells of a logging database, including inserting a pseudorandom number into each cell of the logging database. In some embodiments, the secure logging system includes an addition module to encrypt new log messages and add them to the logging database in a given number of pseudorandom cells of the logging database. In some embodiments, the secure logging system includes a listing module to determine where in the logging database the log message was stored and then to decrypt the encrypted log messages. These systems and methods improve computer related technology including by improving crash reconstruction, root cause analysis, network systems security, and logging system encryption and security. | 2020-08-20 |
20200264959 | STORAGE DEVICE AND METHOD OF OPERATING THE SAME - Provided herein may be a memory controller configured to control a memory device. The memory controller may include: a sudden power off (SPO) sensing unit configured to sense an SPO event and generate sensing information based on the SPO event, an SPO level determination unit configured to determine an SPO level based on the sensing information, a system data control unit configured to determine system data to be written based on the SPO level, and a write time point at which the system data is written, and generate a command for storing the system data at the determined write time point, and a system data storage configured to store the system data. The system data storage may include a nonvolatile memory. | 2020-08-20 |
20200264960 | DETERMINING MEMBERSHIP AMONG STORAGE SYSTEMS SYNCHRONOUSLY REPLICATING A DATASET - Determining active membership among a set of storage systems synchronously replicating a dataset, where determining active membership includes: determining that a membership event corresponds to a change in membership to the set of storage systems synchronously replicating the dataset; applying, in dependence upon the membership event, one or more membership protocols to determine a new set of storage systems to synchronously replicate the dataset; and for one or more I/O operations directed to the dataset, applying the one or more I/O operations to the dataset synchronously replicated by the new set of storage systems. | 2020-08-20 |
20200264961 | INJECTION OF SIMULATED HARDWARE FAILURE(S) IN A FILE SYSTEM FOR ESTABLISHING FILE SYSTEM TOLERANCE-TO-STORAGE-FAILURE(S) - A computer-implemented method according to one embodiment includes determining a location within a file system that is potentially vulnerable to hardware failures, and injecting one or more simulated hardware failures into the determined location within the file system. The method further includes determining whether the file system was damaged as a result of injecting the simulated hardware failure(s). In response to determining that the injection of the simulated hardware failure(s) resulted in damage to the file system, it is determined whether the damage is repairable. Based on whether the file system was damaged as a result of injecting the simulated hardware failure(s) and/or based on whether or not the damage is determined to be repairable, a tolerance-to-storage-failure score is assigned to the file system. | 2020-08-20 |
20200264962 | DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD, AND RECORDING MEDIUM ON WHICH DISPLAY CONTROL PROGRAM IS RECORDED - Provided is, for example, a display control apparatus that generates display information with which an event having occurred in an information processing system can be easily determined. This display control apparatus | 2020-08-20 |
20200264963 | COMMIT WINDOW MOVE ELEMENT - A trace module has monitoring circuitry for monitoring processing of instructions by processing circuitry, and trace output circuitry for outputting a sequence of elements indicative of outcomes of the processing of instructions by the processing circuitry. The trace module supports output of a commit window move element indicating that a commit window, representing a portion of the trace stream comprising at least one speculative element representing at least one speculatively executed instruction, should move while the oldest remaining speculative element of the trace stream remains uncommitted. This can be useful for tracing of transactional memory functionality within program code. | 2020-08-20 |
20200264964 | A METHOD AND DEVICE FOR EVALUATING IO PERFORMANCE OF CACHE SERVERS - A method for evaluating IO performance of cache servers includes: collecting basic data of all to-be-evaluated cache servers, where the basic data includes at least service data, disk configuration, load data, and performance data; filtering the basic data of all the to-be-evaluated cache servers, and classifying cache servers whose basic data have the same data characteristics into one category; statistically analyzing basic data of cache servers of each category, to obtain evaluation indexes for the cache servers of each category; and determining, according to the evaluation indexes for the cache servers of each category, disk IO configuration requirements for the cache servers of each category, where the disk IO configuration requirements include at least a disk capacity configuration requirement and a disk load algorithm configuration requirement. | 2020-08-20 |
20200264965 | PROCESSES AND SYSTEMS THAT DETECT OBJECT ABNORMALITIES IN A DISTRIBUTED COMPUTING SYSTEM - Computational processes and systems are directed to detecting abnormally behaving objects of a distributed computing system. An object can be a physical or a virtual object, such as a server computer, application, VM, virtual network device, or container. Processes and systems identify a set of metrics associated with an object and compute an indicator metric from the set of metrics. The indicator metric is used to label time stamps that correspond to outlier metric values of the set of metrics. The metrics and outlier time stamps are used to compute rules by machine learning. Each rule corresponds to a subset or combination of metrics and represents specific threshold conditions for metric values. The rules are applied to run-time metric data of the metrics to detect run-time abnormal behavior of the object. | 2020-08-20 |
20200264966 | SYSTEMS AND METHODS FOR PERFORMANCE MONITORING - Data storage systems monitor the performance of data storage operations on a granular level and compile the information for presenting to a user. The system measures the time of execution for individual granular stages of the storage operation and in response to the monitoring results, automatically adjust parameters to optimize performance. Further, the system performs a performance test by simulating the data storage operation, but may not actually write the data to the secondary storage medium. | 2020-08-20 |
20200264967 | EXTENSIBLE DEVICE DRIVER VERIFICATION - Interaction between operating system components and device drivers via device driver function call addresses is monitored. Each device driver is configured to interface with at least one hardware component of a computing system. One or more verification functions of an extended device driver verification component are registered for at least one of the device driver function call addresses, each defining a predetermined verification condition. A device driver function call to one of the device driver function call addresses is intercepted and evaluated against the predetermined verification condition of the verification function registered for the device driver function call address of the intercepted device driver function. A result of executing the intercepted device driver function, responsive to satisfaction of the predetermined verification condition or terminated, responsive failure to satisfy the predetermined verification condition of the verification function registered for the device driver function call address of the intercepted device driver function. | 2020-08-20 |
20200264968 | SCRIPT DEBUGGING METHOD, DEVICE, AND COMPUTER STORAGE MEDIUM - A script debugging method, a device, and a computer storage medium. The method includes: obtaining, by a device, a debugging instruction, where the debugging instruction carries a to-be-debugged target line breakpoint, and the target line breakpoint includes at least line information used to indicate a line of code in which a breakpoint location is located in a script file requested to be debugged; and displaying a debugging result when determining that a breakpoint debugging condition is met, where the debugging result includes information obtained by the debugger when the device performs breakpoint processing on the line of code corresponding to the target line breakpoint, and the breakpoint debugging condition includes at least that identification information corresponding to a target interface breakpoint is consistent with identification information corresponding to a target local variable. | 2020-08-20 |
20200264969 | MACHINE LEARNING MODEL FULL LIFE CYCLE MANAGEMENT FRAMEWORK - A method and apparatus are provided that includes, in a same framework, storing an artificial intelligence (AI) model, loading the AI model into a serving platform, loading and testing a test unit against the AI model loaded into the serving platform, and collecting reports from results of storing the AI model, loading the AI model into the serving platform and testing the test unit. | 2020-08-20 |
20200264970 | MEMORY MANAGEMENT SYSTEM - A computer system manages the allocation of memory to an application program using a dependency tree. The dependency tree informs a memory manager of data inputs, data outputs, and intermediate values associated with execution of the application program. The memory manager allocates a single heap structure within a physical memory. Data associated with each node of the dependency tree is allocated to the heap structure so that data input values are allocated in a contiguous block, and intermediate values are allocated separately. In various examples, as execution of the application program proceeds, the separation of intermediate values from non-intermediate values within the heap reduces memory fragmentation providing improved performance of the computer system as a whole. | 2020-08-20 |
20200264971 | STORAGE SYSTEM AND COMPRESSION METHOD - A storage system including a storage controller for compressing a data from a host and a plurality of nonvolatile memory drives for writing the compressed data. The storage controller provides the host with a first logical address space as a logical storage area and includes a plurality of first physical address spaces corresponding to the first logical address space and manages storage areas of the plurality of nonvolatile memory drives. Each of the plurality of nonvolatile memory drives includes a second physical address space that manages a physical storage area of the nonvolatile memory and a second logical address space that corresponds to the second physical address space and to each of the plurality of first physical address spaces. The second logical address spaces and the first logical address space are managed with a common size and a common management size, and leading addresses are aligned with the management size. | 2020-08-20 |
20200264972 | MEMORY CONTROLLER AND METHOD OF OPERATING THE SAME - A memory controller includes a mapping data control unit configured to interrupt the generation of the additional mapping data, when during generation of additional mapping data, an operation for an address identical to a logical block address in the additional mapping data is performed, and to generate dummy mapping data. The additional mapping data may include mapping information indicating a mapping relationship between a logical block address and a physical block address. | 2020-08-20 |
20200264973 | METHOD AND APPARATUS FOR MANAGING MAP DATA IN MEMORY SYSTEM - A memory system includes a memory device including a plurality of memory elements, and suitable for storing L2P map data, and a controller suitable for controlling the memory device by storing at least a portion of the L2P map data and state information of the L2P map data, wherein the controller determines validity of a first physical address received together with an unmap request from an external device, and performs an unmap operation on the valid first physical address. | 2020-08-20 |
20200264974 | DECODING OF HIGH-DENSITY MEMORY CELLS IN A SOLID-STATE DRIVE - A solid-state drive (SSD) comprises densely packed memory cells that experience inter-cell interference (ICI) of voltage across memory cells. An ICI block decoder is trained to remove ICI from the voltage stored at memory cells when the SSD is calibrated and retrained periodically as the memory cells degrade. The ICI block decoder learns to predict true bit values (i.e. true voltage values without ICI) at each cell based on measured bit values for nearby cells. In response to read operations for the SSD, the trained ICI block decoder robustly reads memory and recovers the true bit values. | 2020-08-20 |
20200264975 | MEMORY SYSTEM - A memory system include: a plurality of first memory devices each coupled to a first channel and including a plurality of first memory blocks; a plurality of second memory devices each coupled to a second channel and including a plurality of second memory blocks; a first access controller suitable for controlling an access to the first memory blocks; a second access controller suitable for controlling an access to the second memory blocks; and a bad block controller suitable for: selecting one between the first and second access controllers by comparing bad physical addresses corresponding to bad blocks included in each of the first and second memory devices with first and second physical addresses respectively corresponding to the first and second memory blocks, and transferring one of the first and second physical addresses and substitute physical address that replace the bad physical addresses. | 2020-08-20 |
20200264976 | DATA PROCESSING SYSTEM HAVING MEMORY PROTECTION AND METHOD THEREFOR - A data processing system and method for protecting a memory from unauthorized accesses are provided. The data processing system includes a system bus, a memory coupled to the system bus through a memory controller, and a processing core including a cache system. The memory controller is coupled to the system bus for controlling accesses to the memory that are requested by the processing core. A memory protection circuit is coupled to the system bus and to the processing core. The memory protection circuit uses one or more memory safety violation (MSV) indicators stored in out-of-bounds areas of the memory for detecting when the processing core attempts to access an out-of-bounds area of the memory. The processing core generates an error signal, such as an interrupt, when an attempt to access the out-of-bounds area is detected. The out-of-bounds area may be an unallocated area of the memory. The MSV indicator may be written to the memory by executing a flush instruction of the cache system and may include the same number of bits as a cache line of the cache system. A data value of the MSV indicator may be a secret data value. | 2020-08-20 |
20200264977 | SIMULTANEOUS, NON-ATOMIC REQUEST PROCESSING WITHIN AN SMP ENVIRONMENT BROADCAST SCOPE FOR MULTIPLY-REQUESTED DATA ELEMENTS USING REAL-TIME PARALLELIZATION - Provided are systems, methods, and media for simultaneous, non-atomic request processing of snooped operations of a broadcast scope within a SMP system. An example method includes detecting, by a first controller, based on a set of coherency resolution conditions, whether there are coherency resolution problems between two snooped operations. The method includes in response to detecting, by the first controller, that coherency resolution problems will not result, transmitting, from the first controller to a second controller, an indication signal indicating that coherency resolution problems will not result from the operation. The set of coherency resolution conditions includes: (a) detecting that a second operation of the two snooped operations operation is of a predetermined type, (b) detecting at time of snooping of the second operation that a directory state does not allow for exclusive data, and (c) detecting that the first controller has started committing to an update. | 2020-08-20 |
20200264978 | METHOD AND SYSTEM FOR FACILITATING A DISTRIBUTED STORAGE SYSTEM WITH A TOTAL COST OF OWNERSHIP REDUCTION FOR MULTIPLE AVAILABLE ZONES - One embodiment facilitates data placement in a storage device. During operation, the system receives, from a host, a request to read data. The system determines that the data is not available in a read cache. The system issues the read request to a solid state drive and a first hard disk drive. In response to unsuccessfully reading the requested data from the solid state drive and successfully reading the requested data from the first hard disk drive, the system sends the requested data to the host. In response to unsuccessfully reading the requested data from both the solid state drive and the first hard disk drive: the system issues the read request to a second hard disk drive; and the system sends the requested data to the host. | 2020-08-20 |
20200264979 | In-Memory Distributed Cache - A method for an in-memory distributed cache includes receiving a write request from a client device to write a block of client data in random access memory (RAM) of a memory host and determining whether to allow the write request by determining whether the client device has permission to write the block of client data at the memory host, determining whether the block of client data is currently saved at the memory host, and determining whether a free block of RAM is available. When the client device has permission to write the block of client data at the memory host, the block of client data is not currently saved at the memory host, and a free block of RAM is available, the write request is allowed and the client is allowed to write the block of client data to the free block of RAM. | 2020-08-20 |
20200264980 | APPARATUS AND METHOD OF HANDLING CACHING OF PERSISTENT DATA - An apparatus and method are provided for handling caching of persistent data. The apparatus comprises cache storage having a plurality of entries to cache data items associated with memory address in a non-volatile memory. The data items may comprise persistent data items and non-persistent data items. Write back control circuitry is used to control write back of the data items from the cache storage to the non-volatile memory. In addition, cache usage determination circuitry is used to determine, in dependence on information indicative of capacity of a backup energy source, a subset of the plurality of entries to be used to store persistent data items. In response to an event causing the backup energy source to be used, the write back control circuitry is then arranged to initiate write back to the non-volatile memory of the persistent data items cached in the subset of the plurality of entries. By constraining the extent to which the cache storage is allowed to store persistent data items, taking into account the capacity of the backup energy source, the persistence of those data items can then be guaranteed in the event of the backup energy source being triggered, for example due to removal of the primary energy source for the apparatus. | 2020-08-20 |
20200264981 | Data Storage Devices and Data Processing Methods - A data storage device includes a memory device and a memory controller. The memory controller selects a predetermined memory block to receive data and records multiple logical addresses in a first mapping table. The first mapping table records which logical page the data stored in each physical page of the predetermined memory block is directed to. A bit table is stored in a buffer memory and includes multiple fields. Each field records a bit value. When the memory controller writes data of a logical page that corresponds to a first logical address into the predetermined memory block, the memory controller records the first logical address in the first mapping table, converts the first logical address according to a predetermined function to generate a first field index of the bit table and sets the bit value corresponding to the first field index as a first value in the bit table. | 2020-08-20 |
20200264982 | MEMORY CONTROLLER AND METHOD OF OPERATING THE SAME - Provided herein may be a memory controller configured to control a memory device. The memory controller may include: a mapping data determination unit configured to receive, from a memory device, bitmap information indicating whether a map segment, corresponding a bit included in the bitmap information and including a plurality of pieces of extended mapping data, has been stored in the memory device and a mapping data management unit configured to output information about generation of the plurality of pieces of extended mapping data based on the bitmap information. Each of the plurality of pieces of extended mapping data may include mapping information between a logical block address and a physical block address. | 2020-08-20 |
20200264983 | ADDRESS TRANSLATION IN A DATA PROCESSING APPARATUS - An apparatus comprises address translation circuitry ( | 2020-08-20 |
20200264984 | PARTIAL CACHING OF MEDIA ADDRESS MAPPING DATA - An entry is read from a first memory component, the entry associated with a first logical address. The first entry includes a first physical address to a segment of a logical-to-physical address map in a second memory component and an indication of whether the segment of the logical-to-physical address map is stored in the first memory component. The segment of the logical-to-physical address map includes a second entry associated with the first logical address. A second physical address is written to the second entry in the first memory component based on a determination from the indication that the segment of the logical-to-physical address map is stored in the first memory component. | 2020-08-20 |
20200264985 | METHOD AND APPARATUS FOR MANAGING MAP DATA IN A MEMORY SYSTEM - A memory system includes a memory device suitable for storing L2P map data including a logical address of an external device and a physical address of a memory device corresponding to the logical address, and a controller suitable for storing at least a portion of the L2P map data and state information of the L2P map data, and controlling data input/output of the memory device, wherein, when a write request, write data and a first physical address with a first logical address are received from an external device, the controller performs a write operation for the write request on a second physical address to which a logical address is not assigned, and invalidates the first physical address, and the controller transmits a first acknowledgement, which does not include the second physical address, to the external device, after completely performing the write operation. | 2020-08-20 |
20200264986 | METHODS AND APPARATUSES FOR MANAGING PAGE CACHE IN VIRTUALIZATION SERVICE - Provided are a method and an apparatus for managing a page cache in a virtualization service and a method for managing a page cache in a virtualization service according to an exemplary embodiment of the present disclosure includes: comparing a weight value of a container and a weight variable of a page possessed by a process operated by the container in the virtualization service with each other, changing the weight variable of the page based on a comparison result, and managing pages of the page cache using the changed weight variable of the page. | 2020-08-20 |
20200264987 | OBJECT CACHE CANDIDATE FILTER - A system and method for an object cache candidate filter comprising identifying a first portion and a second portion of an object signature, determining a bucket of a candidate data structure to associated with the object signature based on a first portion of the object signature, comparing the second portion of the object signature to each of a plurality of entries of the determined bucket of the candidate data structure, and, in response to determining no entry of the plurality of entries matches the second portion of the signature, the candidate filter storing the second portion of the object signature in an open entry of the determined bucket. | 2020-08-20 |
20200264988 | APPARATUS, SYSTEM AND METHOD TO DEFINE MEMORY INFORMATION LEAK ZONES IN A COMPUTING SYSTEM - An apparatus of a computing system, a computer-readable medium, a method and a system. The apparatus comprises processing circuitry including a core, and a communication controller coupled to the core to communicate with a memory of the computing system, wherein the memory is to define a leak zone corresponding to a plurality of memory addresses including data therein, the leak zone having an identifier; and the processing circuitry is to: decode instructions including a starting leak barrier, an ending leak barrier, and a sequence of code between the starting and ending leak barriers, the sequence of code including the identifier for the leak zone, the identifier to indicate the sequence of code is to be executed only on the data within the leak zone; and execute the sequence of code only on the data within the leak zone based on the leak barriers and on the identifier | 2020-08-20 |
20200264989 | Embedded USB2 (eUSB2) Repeater Operation - A method of operating an embedded USB2 (eUSB2) repeater includes receiving a downstream packet at a USB2 port and transitioning a USB transmitter from an idle state to a standby state responsive to receiving the downstream packet. The method further includes transitioning the USB transmitter from the standby state to an active state if an upstream packet is received at an eUSB2 port within a first time period of receiving the downstream packet and transmitting the upstream packet. The method also includes transitioning the USB transmitter from the active state to the standby state after transmission of the upstream packet. The method also includes transitioning the USB transmitter from the standby state to the idle state if more upstream packets are not received at the eUSB2 port within a second time period. | 2020-08-20 |
20200264990 | SOCKET INTERCONNECTOR WITH COMPRESSIBLE BALL CONTACTS FOR HIGH PAD COUNT MEMORY CARDS - A memory card socket interconnector is disclosed including a pair of cavities configured to receive a pair of memory cards. The cavities include patterns of memory card interconnect pads. A second surface of the socket interconnector includes socket interconnect pads, distributed across the second surface of the socket interconnector, which are electrically coupled to the memory card interconnect pads. The memory card socket interconnector may further include electrically conductive balls provided between the memory card pads and the memory card interconnect pads in each cavity to enable good electrical contact between the memory card pads and the memory card interconnect pads. | 2020-08-20 |
20200264991 | TRACE LENGTH ON PRINTED CIRCUIT BOARD (PCB) BASED ON INPUT/OUTPUT (I/O) OPERATING SPEED - A wireline communications system is described. The wireline communications system includes a printed circuit board (PCB). The wireline communications system also includes a system on chip (SoC) die on the PCB. The wireline communications system further includes an external memory device coupled to a memory interface of the SoC die. The external memory device is coupled to the memory interface of the SoC die through a PCB trace. A length of the PCB trace is configured according to an operating speed of the memory interface. | 2020-08-20 |
20200264992 | DIRECTED INTERRUPT VIRTUALIZATION - An interrupt signal is provided to a guest operating system executed using one or more processors of a plurality of processors. One or more bus connected modules are operationally connected with the plurality of processors via a bus and a bus attachment device. The bus attachment device receives an interrupt signal from one of the bus connected modules with an interrupt target ID identifying one of the processors assigned for use by the guest operating system as a target processor for handling the interrupt signal. The bus attachment device translates the received interrupt target ID to a logical processor ID of the target processor using a mapping table comprised by the bus attachment device and forwards the interrupt signal to the target processor for handling. The logical processor ID of the target processor is used to address the target processor directly. | 2020-08-20 |
20200264993 | DIRECTED INTERRUPT FOR MULTILEVEL VIRTUALIZATION - An interrupt signal is provided to a first guest operating system. A bus attachment device receives an interrupt signal from a bus connected module with an interrupt target ID identifying a processor assigned for use by the guest operating system as a target processor for handling the interrupt signal. The bus attachment device checks whether the target processor is scheduled for usage by the guest operating system. If the target processor is not scheduled for usage, the bus attachment device forwards the interrupt signal using broadcasting and updates a forwarding vector entry stored in a memory section assigned to a second guest operating system hosting the first guest operating system. The update is used for indicating to the first operating system that there is a first interrupt signal addressed to the interrupt target ID to be handled. | 2020-08-20 |
20200264994 | DIRECTED INTERRUPT FOR MULTILEVEL VIRTUALIZATION WITH INTERRUPT TABLE - An interrupt signal is provided to a first guest operating system. A bus attachment device receives an interrupt signal from a bus connected module with an interrupt target ID identifying a processor assigned for use by the guest operating system as a target processor for handling the interrupt signal. The bus attachment device translates the received interrupt target ID to a logical processor ID of the target processor using an interrupt table entry stored in a memory section assigned to a second guest operating system hosting the first operating system and forwards the interrupt signal to the target processor for handling. The logical processor ID of the target processor is used to address the target processor directly. | 2020-08-20 |
20200264995 | DIRECTED INTERRUPT VIRTUALIZATION WITH BLOCKING INDICATOR - An interrupt signal is provided to a guest operating system. A bus attachment device receives an interrupt signal from a bus connected module with an interrupt target ID identifying a processor assigned for use by the guest operating system as a target processor for handling the interrupt signal. The bus attachment device checks whether the target processor is blocked from receiving interrupt signals using an interrupt blocking indicator provided by an interrupt table entry stored in a memory operationally connected with the bus attachment device. If the target processor unblocked, the bus attachment device forwards the interrupt signal to the target processor for handling. A translation of the interrupt target ID to a logical processor ID of the target processor is used to address the target processor directly. | 2020-08-20 |
20200264996 | GENERATION OF PROCESSOR INTERRUPTS USING AVERAGED DATA - In an embodiment, a processor includes at least one execution unit to execute instructions, and an interrupt generation unit. The interrupt generation unit may be to: receive a plurality of values indicating thermal status values for a memory unit at multiple points in time across a first time window; determine a running average value based on the plurality of values indicating thermal status values in the memory unit; and in response to a determination that the running average value has exceeded a high thermal status threshold value, generate a thermal interrupt indicating a high thermal status event in the processor. Other embodiments are described and claimed. | 2020-08-20 |
20200264997 | DELIVERING INTERRUPTS TO USER-LEVEL APPLICATIONS - Systems and methods for delivering interrupts to user-level applications. An example processing system comprises: a memory configured to store a plurality of user-level APIC data structures and a plurality of user-level interrupt handler address data structures corresponding to a plurality of user-level applications being executed by the processing system; and a processing core configured, responsive to receiving a notification of a user-level interrupt, to: set a pending interrupt bit flag having a position defined by an identifier of the user-level interrupt in a user-level APIC data structure associated with a user-level application that is currently being executed by the processing core, and invoke a user-level interrupt handler identified by a user-level interrupt handler address data structure associated with the user-level application, for a pending user-level interrupt having a highest priority among one or more pending user-level interrupts identified by the user-level APIC data structure. | 2020-08-20 |
20200264998 | Emulated Telemetry Interfaces For Fabric-Coupled Computing Units - Disaggregated computing architectures, platforms, and systems are provided herein. In one example, a method of operating compute units is presented that includes forming compute units among a plurality of physical computing components coupled over a Peripheral Component Interconnect Express (PCIe) fabric configured to communicatively couple the plurality of physical computing components and isolate the compute unit using logical partitioning within the PCIe fabric. The method also includes initiating a software component deployed to at least associated CPUs within the compute units, reporting telemetry to the management processor related to operation of the compute unit, and emulating operation of at least one among an Ethernet and InfiniB and interface to an operating system of the associated CPU for transfer of communications comprising at least the telemetry to the management processor over the PCIe fabric. | 2020-08-20 |
20200264999 | VALUE DOCUMENT HANDLING APPARATUS HAVING A DATA COMMUNICATION SYSTEM AND METHOD FOR DISTRIBUTING SENSOR DATA IN A VALUE DOCUMENT HANDLING APPARATUS - Methods involve distributing a data stream in a value-document processing apparatus from at least one sensor to at least one processing unit and a system for distributing sensor data. The value-document processing apparatus has a distributing device and at least one processing unit. The distributing device comprises at least two data interfaces. A sensor data packet is created and comprises the sensor data and a target address. The target address describes a physical memory address of the at least one processing unit. The sensor data packet is sent to one of the data interfaces of the distributing device. The distributing device receives the sensor data packet at a further data interface. The sensor data packet is relayed by the distributing device to the at least one processing unit. | 2020-08-20 |
20200265000 | INFORMATION PROCESSING SYSTEM - An information processing system according to one embodiment includes platforms and a relay device including an expansion bus that connects between the platforms. Each platform includes a memory that stores transmit data to another platform through transactions occurring in the platform concerned; a controller that reads first transmit data from the memory, and transmits the first transmit data to the another platform through a first transaction among the transactions via the expansion bus; determines whether a second transaction higher in priority than the first transaction is occurring in the platform after completion of transmission of each packet of the first transmit data; and in response to the second transaction, reads second transmit data from the memory, transmits the second transmit data to the another platform through the second transaction via the expansion bus, and interrupts transmission of the first transmit data until completion of transmission of the second transmit data. | 2020-08-20 |
20200265001 | COMMUNICATION METHOD USING INPUT/OUTPUT INTERFACE, AND APPARATUS THEREFOR - An electronic device is disclosed. The electronic device comprises: a housing, an input/output interface, which includes a plurality of pogo pins exposed through a portion of the housing, and can be connected to an external device by a wire, an identification circuit, which is electrically connected to the input/output interface to identify the external device, a processor electrically connected to the identification circuit, and a booster electrically connected to the input/output interface to supply power to the external device. In addition, various embodiments understood from the specification are possible. | 2020-08-20 |
20200265002 | FORWARDING ELEMENT INTEGRATED CIRCUIT CHIP WITH SEPARATE I/O AND SWITCHING TILES - Some embodiments of the invention provide a novel method and chip design for a forwarding chip, that decouples input-output (IO) technology requirements from the technology used in a high bandwidth switching ASIC. In some embodiments, a main die including a latest generation switching chip is coupled to a set of IO dies (e.g., SerDes dies). The main die, in some embodiments, uses a latest technology (e.g., 7 nm nodes) while the IO dies, in some embodiments, use a more mature technology (e.g., 16 nm nodes). Some embodiments provide multiple IO dies that each provide connectivity to external components to the high bandwidth switching ASIC (e.g., a core ASIC die). The multiple dies are mounted on a silicon interposer, in some embodiments, using microbumps to make the connections between the dies and the silicon interposer. Additional connections to the pad are made from each die including to general purpose input-output (GPIO) connections. In some embodiments, the main die and the IO dies make all connections through microbumps on the silicon interposer and some microbumps connect to external components using through-silicon vias (TSVs). The microbumps of the main die, in some embodiments, are arranged so that they are mirrored on either side of the main die and rotationally invariant under a 180 degree rotation. IO dies, in some embodiments, are mounted in a first orientation to connect to a first side of the main die and a second rotated (by 180 degrees) orientation to connect to a second opposite side of the main die. | 2020-08-20 |
20200265003 | CONCATENATED TWO-WIRE DATA BUS - Disclosed is a light module and a matching housing for a bus node. The light module is provided to be used in a data bus system for transmitting data for light-emitting components via a differential two-wire data bus. The data bus transmits data between a bus master and at least two bus nodes. The data bus is divided by the bus nodes into at least two two-wire data bus sections. The housing comprises at least two rows of connections arranged opposite each other. Each row comprises one negative supply voltage connection and one positive supply voltage connection, which are arranged to be connected in pairs without intersection. The two connections for each of the respective two-wire data bus sections are arranged between the connections for the supply voltages in each row. A light-emitting component is arranged in a recess of the housing. | 2020-08-20 |
20200265004 | SERIAL CONNECTION BETWEEN MANAGEMENT CONTROLLER AND MICROCONTROLLER - An example computing system includes a baseboard management controller (BMC), a motherboard, and a daughterboard communicatively coupled to the motherboard. The BMC includes a serial interface. The daughterboard includes a universal asynchronous receiver/transmitter (UART) terminal, a bridging chip, and a microcontroller communicatively coupled to the BMC via the bridging chip. The BMC establishes a serial connection, through the serial interface and the UART terminal, with the microcontroller. | 2020-08-20 |
20200265005 | NETWORK TRAFFIC ROUTING IN DISTRIBUTED COMPUTING SYSTEMS - Distributed computing systems, devices, and associated methods of packet routing are disclosed herein. In one embodiment, a method includes receiving, from a computing network, a packet at a packet processor of a server. The method also includes matching the received packet with a flow in a flow table contained in the packet processor and determining whether the action indicates that the received packet is to be forwarded to a NIC buffer in the outbound processing path of the packet processor instead of the NIC. The method further includes in response to determining that the action indicates that the received packet is to be forwarded to the NIC buffer, forwarding the received packet to the NIC buffer and processing the packet in the NIC buffer to forward the packet to the computer network without exposing the packet to the main processor. | 2020-08-20 |
20200265006 | PERFORMANCE- AND COST-EFFICIENT ARCHIVING OF SMALL OBJECTS - A method includes receiving a plurality of files where each file represents an object. The method further combines selected files of the plurality of files into an aggregation file and stores the aggregation file on low-latency storage media, such as disk storage media. The method represents the aggregation file with a single inode that is stored on the low-latency storage media. The method migrates the aggregate file to high-latency storage media, such as tape storage media. By collecting files into larger aggregation files, the number of files archived is significantly reduced and the files archived are of larger size. The reduced number of files and increased size of the files improves archival and retrieval performance due to reduced metadata operation overhead. A corresponding system and computer program product are also disclosed. | 2020-08-20 |
20200265007 | Cloud-native global file system with direct-to-cloud migration - A cloud-native global file system used to provide primary file storage for enterprise data is augmented to provide “direct-to-cloud” (D2C) migration of an initial data set. In addition to providing a filer, the service provider configures a direct-to-cloud migration tool, typically as a downloadable virtual machine (VM), that is executed in association with the hardware of the enterprise filesystem whose data set is being migrated. The migration tool reads the existing filesystem, transforms the data into a format consistent with that done by a filer, and pushes the result (a single version) directly to an object store in the cloud. In a first pass (run), typically a large bulk of the data is moved and, depending on how the migration tool is configured, one or more additional passes may then be carried out. When migration is complete (or substantially complete), the filer then is activated to complete the migration (if need be) and take over the go-forward operations. | 2020-08-20 |
20200265008 | CONVERTING STORAGE OBJECTS BETWEEN FORMATS IN A COPY-FREE TRANSITION - A copy-free transition tool converts storage objects from a source format associated with a source storage system to a destination format associated with a destination storage system. The transition tool exports configuration information associated with the source storage system to the destination storage system and brings the storage objects offline. Once the transition tool determines that the storage devices containing the storage objects are physically connected to the destination storage system, the tool can convert file systems from the source format to the destination format while leaving data and file layout unchanged. The tool can also modify metadata associated with each of the storage objects to conform to the destination format and store the modified metadata with the destination storage system. | 2020-08-20 |
20200265009 | BLOCKCHAIN-BASED DATA MIGRATION METHOD AND APPARATUS - A latest block associated with a blockchain is received at a blockchain node device, where the blockchain node device includes a first storage system and a second storage system, and where the second storage system is interconnected with the first storage system. The latest block is stored at the blockchain node device and in the first storage system. Whether a migration trigger event for block data stored in the first storage system is detected determining by the blockchain node device. The block data stored in the first storage system and exists prior to a migration reference time is migrated to the second storage system. | 2020-08-20 |
20200265010 | ELECTRONIC DEVICE AND METHOD FOR MANAGING DATABASE - An electronic device for managing a database is provided. The electronic device includes a storage configured to store a database, a memory, and a processor operably connected to the storage and the memory. The memory stores instructions that, when executed, cause the processor to identify the state of a first file that is at least temporarily stored data stored in the database, the first file related to a first operation mode of the database, in response to identifying the first file in a first state that allows reading data included in a file, identify the state of a second file that stores information indicating a portion of the database to store information stored in the first file, perform transactions related to data stored in the database using the first file, based at least in part on the identified state of the second file, and in response to identifying the first file in a second state different from the first state, perform the transactions, based on a second operation mode different from the first operation mode. | 2020-08-20 |
20200265011 | AUTOMATED CONTENT-BASED AND CONTEXT-BASED FILE ORGANIZATIONAL STRUCTURING - A method, computer program product, and a system where a processor(s), subject to obtaining permission, monitors browsing activity of an application browsing sources, including analyzing the sources to identify keywords and calculate densities of the keywords in content accessed at the sources. The processor(s) retains the keywords and the densities of the keywords in the content accessed at the sources in an historical record. The processor(s) downloads a resource of data and metadata from a source. The processor(s) updates the metadata of the resource based on keywords and densities of the keywords in the resource and source. The processor(s) determines a destination for the downloaded resource, based on selecting the destination comprising a highest percentage of attributes matching the updated metadata. | 2020-08-20 |
20200265012 | DATA CONVERSION AND DISTRIBUTION SYSTEMS - Systems and methods for improved data conversion and distribution are provided. A data subscription unit is configured to receive data and information from a plurality of data source devices. The data subscription unit is in communication with a virtual machine that includes backtesting utility configured to generate backtesting data using one or more statistical models and one or more non-statistical models. The backtesting utility may translate the backtesting results into one or more interactive visuals, and generate a graphical user interface (GUI) for displaying the backtesting results and the one or more interactive visuals on a user device. The backtesting utility may update one or more of the displayed backtesting results and the one or more interactive visuals without re-running the modeling steps. | 2020-08-20 |
20200265013 | INLINE DOCUMENT CONVERSATION SYSTEM - Systems and methods for managing an inline conversation area within a document are provided. In example embodiments, a collaboration system causes presentation of a user interface displaying a document that is being collaboratively edited by a plurality of users. The collaboration system receives an indication to present an inline conversation area within the document. In response, the inline conversation area is displayed within the document on the user interface, whereby the inline conversation area is visually distinguished from content of the document. The collaboration system receives, via the inline conversation area, input from the plurality of users. The input comprises comments being exchanged between the plurality of users and draft content. The inputs are displayed in the inline conversation area within the document on the user interface. | 2020-08-20 |
20200265014 | TECHNOLOGIES FOR INTEGRATING CLOUD CONTENT ITEMS ACROSS PLATFORMS - Systems and methods for integrating cloud-based and cloud-backed content items with a content management system are provided. In some examples, a method can include receiving a request to access a canonical content item stored at a content management system, the canonical content item representing a cloud-based content item or a cloud-backed content item having features designed for access through a native online application associated with a cloud content provider; in response to the canonical content item being invoked, sending, from a local application to the cloud content provider, a request for the features of the content item; receiving, at the local application and from the cloud content provider, metadata for enabling the features of the content item; and based on the metadata, providing, on the local application, the features and a content of the content item as part of a rendered instance of the canonical content item. | 2020-08-20 |
20200265015 | TECHNOLOGIES FOR INTEGRATING CLOUD CONTENT ITEMS ACROSS PLATFORMS - Systems and methods for integrating cloud-based and cloud-backed content items with a content management system are provided. In some examples, a method can include receiving a request to access a canonical content item stored at a content management system, the canonical content item representing a cloud-based content item or a cloud-backed content item having features designed for access through a native online application associated with a cloud content provider; in response to the canonical content item being invoked, sending, from a local application to the cloud content provider, a request for the features of the content item; receiving, at the local application and from the cloud content provider, metadata for enabling the features of the content item; and based on the metadata, providing, on the local application, the features and a content of the content item as part of a rendered instance of the canonical content item. | 2020-08-20 |
20200265016 | MANAGING STRUCTURED DATA IN A DATA STORAGE SYSTEM - According to certain aspects, a client computing system can be configured to map stored database data into a plurality of second data units having a second level of granularity larger than first data units; store a mapping of the second data units to the first data units; monitor writes to the database data by the database application; identify of the writes changed first data units of the first data units which have changed as a result of the writes; use the mapping to identify changed second data units of the second data units which each include at least one of the changed first data units; maintain a table listing the changed second data units; and in response to instructions to create a secondary copy of the database data, consult the table to identify the changed second data units, and forward the changed second data units to secondary storage controller computer(s). | 2020-08-20 |
20200265017 | SYNCHRONIZATION OF CLIENT MACHINES WITH A CONTENT MANAGEMENT SYSTEM REPOSITORY - A synchronization queuing service associated with a content management system repository can record file events occurring to content items maintained at the content management system repository. The synchronization queuing service can receive a file synchronization request for information identifying a content item to which a client machine is subscribed. The synchronization queuing service can determine consistency or inconsistency of a client machine state of the content item relative to the content item at the content management system repository and can respond to client machine with a file event summary comprising information usable by the client machine to identify actions necessary to synchronize the client machine state of the content item the content item. | 2020-08-20 |
20200265018 | DATA SYNCHRONIZATION - One or more techniques and/or computing devices are provided for data synchronization. For example, an in-flight log may be maintained to track storage operations that are received by a first storage node, but have not been committed to both first storage of the first storage node and second storage of a second storage node that has a replication relationship, such as a disaster recovery relationship, with the first storage node. A dirty region log may be maintained to track regions within the first storage that have been modified by storage operations that have not been replicated to the second storage. Accordingly, a catchup synchronization phase (e.g., asynchronous replication by a resync scanner) may be performed to replicate storage operations (e.g., replicate data within dirty regions of the first storage that were modified by such storage operations) to the second storage until the first storage and the second storage are synchronized. | 2020-08-20 |
20200265019 | ON DEMAND FILE SYNC - Disclosed are various examples for downloading data objects by enforcing a threshold amount of allocated data. In one example, among others, an application downloads a first subset of the files from a remote file management system. A user interface displays file system entries that represent the first subset of downloaded files and a second subset of undownloaded files from the remote file management system. The application detects an event for a respective file system entry associated with a respective file from the second subset of undownloaded files. The respective file is downloaded from the remote management system. | 2020-08-20 |
20200265020 | STORAGE SYSTEM GARBAGE COLLECTION AND DEFRAGMENTATION - Metadata of each file of a group of files of a storage and chunk file metadata are analyzed to identify one or more file segment data chunks that are not referenced by the group of files of the storage. Fragmented chunk files to be combined together are identified based at least in part on the one or more identified file segment data chunks. The chunk file metadata is updated with an update that concurrently reflects the removal of at least a portion of the one or more file segment data chunks that are not referenced by the group of files and the combination of the identified fragmented chunk files. | 2020-08-20 |
20200265021 | APPARATUS, SYSTEMS, AND METHODS FOR CRYPTO-ERASING DEDUPLICATED DATA - Methods that can crypto-erase deduplicated data are disclosed herein. One method includes encrypting, by a processor, each data chunk on a storage device with a unique first encryption key that is different from each other first encryption key and encrypting each storage object on the storage device with a unique second encryption key that is different from each first encryption key and each other second encryption key in which each second encryption key encrypts a first encryption key for a data chunk. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein. | 2020-08-20 |
20200265022 | Intent Signaling with Collaborators - A collaborator creates a personal work space within a document or project space and signals intent to other collaborators regarding the activity being performed in the personal work space. The personal work space may include a note space for the collaborator to add text signaling intent of the collaborator in modifying the document or project in the personal work space. For example, the note space may include an indication of a time when the collaborator started work in the personal work space and/or an indication that the collaborator is actively working in the personal work space or that the collaborator has completed work in the personal work space. The collaborator also may modify the viewability of the personal work space to permit the personal work space to be viewed by all collaborators, no collaborators, or one or more specified collaborators by assigning other collaborators permissions to the personal work space. | 2020-08-20 |
20200265023 | SYSTEM FOR TRANSITION FROM A HIERARCHICAL FILE SYSTEM TO AN OBJECT STORE - Techniques are provided for transitioning from a hierarchical file system to an object store. A request is received to change file metadata of a hierarchical file system. In response to the request: in-cache file metadata of the hierarchical file system is modified. The in-cache file metadata includes a directory structure of the hierarchical file system and file metadata of the hierarchical file system. Additionally, an in-store metadata journal entry is generated. The in-store metadata journal entry indicates an update to in-store file metadata. The in-store file metadata includes the directory structure of the hierarchical file system and file metadata of the hierarchical file system and is stored in an object store. The in-store metadata journal entry is stored in the object store. Furthermore, in-store file metadata and in-store metadata journal entry may be used to reconstruct the in-cache file metadata on another node. | 2020-08-20 |
20200265024 | SYSTEMS AND METHODS FOR RULE-BASED VIRTUAL MACHINE DATA PROTECTION - A data storage system backs up or protects virtual machines. For instance, the system identifies the different virtual machines executing in the system and provides a number of factors that can be used to create a backup policy. The system further creates specific rules for virtual machine backup policies using a user interface with drop down boxes of relevant criteria and Boolean operators. A preview of included virtual machines allows the rule to be refined. Particular virtual machines can be excluded during the preview. The system further dynamically updates the list of virtual machines satisfying the rules at time of backup. | 2020-08-20 |
20200265025 | METHODS AND SYSTEMS FOR MAPPING FLATTENED STRUCTURE TO RELATIONSHIP PRESERVING HIERARCHICAL STRUCTURE - A method and a system for mapping a flattened data structure into a relation preserving data structure is disclosed. The method includes receiving a flattened schema comprising a plurality of columns. The method includes receiving a plurality of user inputs from a user. The plurality of user inputs comprises a plurality of identifiers. The method includes defining a sample target hierarchical schema based on user inputs. The method includes preparing a nested hierarchical structure corresponding to the sample target hierarchical schema in a User Interface (UI) representation. The nested hierarchical structure comprises a plurality of nodes with corresponding identifiers and relationships of the plurality of nodes. The method includes performing an Artificial Intelligence (AI) based mapping of columns of the flattened schema to respective nodes of the plurality of nodes of the nested hierarchical structure. The method further includes generating a target hierarchical schema based on AI based mapping. | 2020-08-20 |
20200265026 | MIGRATING A MULTI-LEVEL SECURED DATABASE - In an approach for migrating database content with row-level security from a source database with row-level security to a target database without row-level security, a computer determines a type of the source database to be migrated, and upon determining that a source table of the source database is maintained using multi-level security attributes, creating a data structure for a source table of the source database for storing meta-data comprising the multi-level security attributes, determining all dimensions of the multi-level security attributes, adding columns to a target table of the target database relating to the source table, the added columns representing the multi-level security attributes of the source table. | 2020-08-20 |
20200265027 | PROPERTY-BASED DELETION OF DIGITAL DATA - In one embodiment, a computer-implemented method comprises receiving, from a second computing device at a first computing device that is communicatively coupled to the second computing device, a request to store a first entity data object, the first entity data object including a first property key-value pair; using the first computing device, storing the first entity data object in one or more digital data repositories in response to the request; receiving, from the second computing device at the first computing device, a delete command that specifies the first property key-value pair to delete by; in response to the delete command that specifies the first property key-value pair to delete by, deleting the first entity data object in the one or more digital data repositories. | 2020-08-20 |
20200265028 | METHOD AND SYSTEMS FOR MAPPING OBJECT ORIENTED/FUNCTIONAL LANGUAGES TO DATABASE LANGUAGES - In a pipeline of operations having a terminating operation and a source operation, a builder is built corresponding to the terminating operation. The builder may also correspond to one or more intermediate operations. A database query is generated corresponding to the builder and is sent to a database or a data source for efficient access to the database. | 2020-08-20 |
20200265029 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM RECORDING INFORMATION PROCESSING PROGRAM - An information processing apparatus includes: a memory configured to store data generated in a manufacturing line where a product is manufactured in a state in which the data is linked to information in a tree structure in which elements related to manufacture of the product assigned as nodes; and a processor configured to: determine, when data of a prototype is stored to the memory, whether information of an element out of the elements corresponding to an uppermost node out of the nodes is linked to the data of the prototype; link, when the information of the element corresponding to the uppermost node is not linked, as the information of the element corresponding to the uppermost node of the data of the prototype, information distinguishable from information of the element corresponding to the uppermost node linked to the data of the product; and store the data of the prototype. | 2020-08-20 |
20200265030 | DISTRIBUTED INDEXING ARCHITECTURE FOR DATABASES - A data storage device that includes a memory operable to store a data table and an indexing engine implemented by a processor. The indexing engine is configured to receive data and to store the data in the data table. The indexing engine is further configured to determine an index key and data location information for the stored data and to determine a set of index table references based on the index key. Each index table reference identifies an index table that links index keys with data location information. The indexing engine is further configured to identify a set of index tables corresponding with the set of index table references and to store the index key and the data location information for the stored data in one or more index tables from the set of index tables. | 2020-08-20 |
20200265031 | HYBRID CENTRALIZED AND DECENTRALIZED ENTERPRISE SYSTEM - Implementations of the present disclosure include receiving, by the centralized sub-system, change data representing a change to an electronic document stored in the centralized sub-system, the change data identifying a user that submitted the change, transmitting, by the centralized sub-system, the change to the decentralized sub-system, recording, by the decentralized sub-system, the change in a change log recorded in a blockchain that is maintained within the decentralized sub-system, the blockchain being stored in multiple nodes of the decentralized sub-system, and editing, by the centralized sub-system, the electronic document based on the change to provide an edited electronic document that is stored in the centralized sub-system. | 2020-08-20 |
20200265032 | SYSTEM AND METHODS FOR DATA MODEL DETECTION AND SURVEILLANCE - A computer system is provided for monitoring and detecting changes in a data generating processes, which may be under a multi-dimensional and unsupervised setting. A target dataset is split into paired subgroups by a separator and one or more detectors are applied to detect changes, anomalies, inconsistencies, and the like between the paired subgroups. Metrics may be generated by the detector(s), which are then passed to an evaluating system. | 2020-08-20 |
20200265033 | METHOD AND APPARATUS FOR GENERATING FAULT DIAGNOSIS INFORMATION BASE OF NUMERICAL CONTROL MACHINE TOOL - The present invention related to the technical field of industrial automation, in particular to a method and apparatus for generating a fault diagnosis database of a CNC machine tool, intended to conveniently provide comprehensive fault diagnosis information. The method comprises: setting a fault condition of the CNC machine tool; running a simulation model of the CNC machine tool under each set fault condition to generate fault, and recording a fault phenomenon of the fault; backtracking a possible fault generating each fault phenomenon, to establish an association between the fault phenomenon and a possible fault generating the fault phenomenon; generating a fault diagnosis database of the CNC machine tool according to the association established. Due to the fact that what is being run is a simulation model of the CNC machine tool, various fault conditions can be conveniently set. The fault diagnosis database established by the method has the advantage of comprehensive coverage of fault situations and abundant fault diagnosis information. The result of performing fault diagnosis on the basis of such a fault diagnosis database is more accurate. | 2020-08-20 |
20200265034 | DATA DEDUPLICATION ACCELERATION - Techniques for data deduplication may include: receiving write operations that write first data; partitioning the first data into a plurality of data portions; generating, using a first hash function, a plurality of data deduplication hash values for the plurality of data portions, wherein a first data deduplication hash value of the plurality of data deduplication hash values is produced by said generating for a first of the plurality of data portions; performing first processing using a Bloom filter to determine whether the first data deduplication hash value has a corresponding first entry in a data store of deduplication hash values; and responsive to the first processing determining the first data deduplication hash value does not have the corresponding first entry in the data store of deduplication hash values, performing second processing, said second processing including adding the corresponding first entry in the data store of deduplication hash values. | 2020-08-20 |
20200265035 | CROSS VERIFICATION OF DATA CAPTURED BY A CONSUMER ELECTRONIC DEVICE - A system for cross verification of data captured by a consumer electronic device is disclosed. Primary data, for example, a photograph, is captured by a mobile capture device, and metadata including the time and location of the capture is associated with the primary data. Environmental data, for example, pressure, temperature, visible WiFi networks, visible cell towers, is also measure by the mobile capture device. Other capture devices are identified in the vicinity and those other devices also measure environmental data. The measurements of environmental data can then be compared in order to calculate a confidence level in the position metadata associated with the primary data. | 2020-08-20 |
20200265036 | TECHNIQUE FOR GLOBAL DEDUPLICATION ACROSS DATACENTERS WITH MINIMAL COORDINATION - A system and method for global data de-duplication in a cloud storage environment utilizing a plurality of data centers is provided. Each cloud storage gateway appliance divides a data stream into a plurality of data objects and generates a content-based hash value as a key for each data object. An IMMUTABLE PUT operation is utilized to store the data object at the associated key within the cloud. | 2020-08-20 |
20200265037 | BLOCKCHAIN-BASED SYSTEMS AND METHODS FOR COMMUNICATING, STORING AND PROCESSING DATA OVER A BLOCKCHAIN NETWORK - A computer-implemented method for transmitting and/or submitting digital content such as feedback for an entity to a blockchain is disclosed. This may be, for example, the Bitcoin blockchain. The method, which is implemented at a first node, includes: submitting, to the blockchain, a first transaction (T | 2020-08-20 |
20200265038 | MUTUAL DATA RESOLUTION SYSTEM AND PROCESS THEREFOR - A customer profiling system and process are described. The system comprises a receiver for receiving event trigger data in response to a customer interacting with an environment; a processor configured to: uniquely determine customer identifier data associated with the event trigger data; and to associate the event trigger data with a customer profile associated with the unique customer identifier. | 2020-08-20 |
20200265039 | ADAPTIVELY UPDATING DATABASES OF PUBLISH AND SUBSCRIBE SYSTEMS USING OPTIMISTIC UPDATES - An example system includes a processor to receive updates for a database of a publish and subscribe system. The processor is to generate an optimistic update based on the received updates. The processor is also to adaptively update the database using the optimistic update. In some examples, the processor generates a bulk optimistic update based on the optimistic update and adaptively updates the database using the bulk optimistic update or a read-modify-write sequence. | 2020-08-20 |
20200265040 | INTELLIGENT CONTENT AND FORMATTING REUSE - A system configured intelligently reusing content and format is provided. The system receives a selection of data to be copied and an indication to copy the selected data and copies the selected data. The system receives an indication to paste the selected data at a second location. The selected data is analyzed to determine one or more options available for the paste, whereby each of the options being selectable to change an aspect of the selected data being pasted. The one or more options and an image of a placeholder representing the selected data are presented at the second location. The system receives a selection of an option from the one or more options. In response to receiving the selection of the option, the system causes presentation of the selected data in place of the image of the placeholder based on the selected option. | 2020-08-20 |
20200265041 | BLOCKCHAIN-BASED DATA STORAGE AND QUERY METHOD AND DEVICE - A blockchain node receives a service request, where the service request comprises one or more data types and respective service data corresponding to the one or more data types that are stored in a blockchain. At least one of a service type or identification information is determined corresponding to the service request. The service request is parsed to obtain each data type of the service request and service data corresponding to each data type. Based on a mapping relationship between a data type and service data, the service data that is obtained through parsing in a relational database corresponding to the blockchain node is stored. | 2020-08-20 |