37th week of 2015 patent applcation highlights part 41 |
Patent application number | Title | Published |
20150254096 | MANAGEMENT OF INTER-DEPENDENT CONFIGURATIONS OF VIRTUAL MACHINES IN A CLOUD - A server computer system determines that configuring a first virtual machine in a cloud depends on a configuration result of configuring a second virtual machine. The server computer system configures the second virtual machine in the cloud and configures the first virtual machine in the cloud using the configuration result of the second virtual machine. | 2015-09-10 |
20150254097 | CONSTRUCTING AND DEPLOYING PATTERNS OF FLOWS - A flow pattern is generated from a single flow, in which the flow pattern describes a plurality of flows that are structurally similar to one another and perform similar tasks. End users are then capable of exploring the different flows of the pattern and selecting one or more flows based on high-level goals. | 2015-09-10 |
20150254098 | TRANSACTION PROCESSING APPARATUS AND DISTRIBUTED PROCESSING SYSTEM - A storage stores target data to be processed. A first and second processing apparatuses makes a request to process the target data. The first processing apparatus includes a processor and an interface. The processor makes a request for the storage to perform a first updating process on the target data. The interface transmits a request signal to the second processing apparatus after the first updating process ends, the request signal being for making a request to start a second updating process indivisible from the first updating process. After a request to perform the second updating process is made, when the processor obtains information indicating that the target data has been subjected to a process that the first processing apparatus has made a request to perform, the processor makes a request for the storage to return the target data to a state before the first updating process. | 2015-09-10 |
20150254099 | Software Enabled Network Storage Accelerator (SENSA) - Hardware Real Time Operating System (RTOS) Optimized for Network-Storage Stack applications - A Software Enabled Network Storage Accelerator (SENSA) system includes a number of SENSA components. The components can be implemented individually or in combination for a variety of applications, in particular, data base acceleration, disk caching, and event stream processing applications. Hardware (HW) real time operating system (RTOS) optimization for network storage stack applications such as event processing avoids conventional CPU usage by processing the payload, or internal data, of a packet using an array of at least two event processing elements (EPEs), each EPE in the array configured for: receiving events, each of the events having a task corresponding to the event; and processing the task in run-to-completion manner by operating on some portions of the task and offloading other portions of the task. | 2015-09-10 |
20150254100 | Software Enabled Network Storage Accelerator (SENSA) - Storage Virtualization Offload Engine (SVOE) - A storage virtualization offload engine (SVOE) optimizes network storage stack applications, providing an innovative implementation for network storage event processing. The current embodiment is particularly suited for distributed storage servers, offloading storage related functions from CPU to a co-processor. The SVOE improves system performance and power consumption by executing heavy operations (such as wide vector computations) by dedicated hardware engines. Thus, the SVOE avoids the significant overhead and overall task latency of a CPU using system calls in the middle of software thread to offload processing. A system includes two or more event processing elements (EPEs). Each EPE is configured for receiving events that include respective tasks and for processing only data access portions of the tasks. | 2015-09-10 |
20150254101 | SYSTEM FOR FORMULATING TEMPORAL BASES FOR PROCESS COORDINATION IN A GENETICS RELATED PROCESS ENVIRONMENT - Analytical methods and devices for detection of molecular processes, especially in genetics related environments are faced with the challenge of having to operate with the lack of coherent temporal frameworks that incorporate microscopic to macro-scopic scale operations. Drawbacks in overcoming these challenges have resulted in substantial underutilization of resources and below optimum outcome as well. The present innovation as its technical solution to the problem outlined above discloses a computing based generic approach that facilitates incorporating operation of such processes as quantifiable entities in terms of a common temporal scale, thus establishing a coherent framework for coordinating operation of different processes that have varied temporal scales, namely, those occurring in temporal extents shorter as well as longer than its variable operational step enabling its adoption in a wide range of practical applications bringing multiple advantages. | 2015-09-10 |
20150254102 | COMPUTER-READABLE RECORDING MEDIUM, TASK ASSIGNMENT DEVICE, TASK EXECUTION DEVICE, AND TASK ASSIGNMENT METHOD - A master server assigns a first process to each of a plurality of slave servers. When the master server receives one or more completion notifications of one or more first tasks of a first process related to a second task of a second process that is assigned to each of the plurality of slave servers and that is executed by using one or more execution results of the one or more first tasks, the master server estimates a processing amount of the second task. The master server sends information related to the estimated processing amount to the slave servers to each of which the second task is assigned. | 2015-09-10 |
20150254103 | INSTANT XVMOTION USING A PRIVATE STORAGE VIRTUAL APPLIANCE - Techniques for migrating a virtual machine (VM) from a source host system to a destination host system, where the VM is associated with a source virtual disk file (VMDK) residing in a local storage component of the source host system, are provided. In one embodiment, a virtual infrastructure (VI) server in communication with the source and destination host systems can create a shell directory in the local storage component of the source host system, where the shell directory includes a symbolic link to the source VMDK. The VI server can further promote the shell directory to a private virtual storage appliance (PSVA) running on the source host system. The VI server can then cause an execution state of the VM to be transferred from the source host system to the destination host system, without transferring the source VMDK between the host systems. | 2015-09-10 |
20150254104 | METHOD AND SYSTEM FOR WORK SCHEDULING IN A MULTI-CHIP SYSTEM - According to at least one example embodiment, a multi-chip system includes multiple chip devices configured to communicate to each other and share hardware resources. According to at least one example embodiment, a method of processing work item in the multi-chip system comprises designating, by a work source component associated with a chip device, referred to as the source chip device, of the multiple chip devices, a work item to a scheduler for scheduling. The scheduler then assigns the work item to a another chip device, referred to as the destination chip device, of the multiple chip devices for processing, the scheduler is one of one or more schedulers each associated with a corresponding chip device of the multiple chip devices. | 2015-09-10 |
20150254105 | DATA PROCESSING SYSTEM, DATA PROCESSING METHOD, AND PROGRAM - Disclosed are a data processing system, etc., whereby total processing time of a data process including a parallel process and a serial process is optimized. This data processing system comprises: a task segmenting means for receiving a plurality of tasks which execute, upon a record set which is a set of a plurality of records, a data process which includes parallel processes which a plurality of computers are capable of executing in parallel and serial processes which are post-processes of the parallel processes and is executed by one computer, and, for a parallel process which is the pre-process of a serial process, among the serial processes which are included in the task, which is envisioned as requiring more time to process than another serial process, by subdividing the record set which is to be processed in the parallel process, segmenting the parallel process into a plurality of sub-tasks; and an assignment means for assigning the plurality of sub-tasks to the plurality of computers, such that the plurality of sub-tasks are executed prior to a task other than the task which includes the parallel processes being executed. | 2015-09-10 |
20150254106 | NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM RECORDING PROCESSING PROGRAM, PROCESSING APPARATUS, AND PROCESSING METHOD - The present processing apparatus includes an extraction unit and a control unit. The extraction unit extracts a job group including an extraction job and a subsequent job from a plurality of scheduled jobs, the plurality of scheduled jobs being included in a second operation, the second operation being scheduled in a second period which is after a first period in which a first operation is scheduled, the extraction job extracting a data group and being included in the plurality of scheduled jobs, and the subsequent job processing on the data group within a range of the data group. The control unit executes jobs in the extracted job group in the first period. Accordingly, the second operation can be completed by the start of the first operation. | 2015-09-10 |
20150254107 | INFORMATION DISPLAY FOR DISPLAYING DIFFERENT TYPES OF PERFORMANCE DATA USING A SINGLE INTEGRATED VISUAL INDICATOR - Exemplary embodiments display different types of performance-related data on an information display having a range of units for one type of measured data. Aspects of exemplary embodiment include presenting, by at least one software component executed by a processor, a rate of resource consumption in a visual indicator; and using the visual indicator as a pointer on the information display to a current unit of the measured data. | 2015-09-10 |
20150254108 | DYNAMIC RESOURCE MANAGEMENT FOR MULTI-PROCESS APPLICATIONS - Techniques are described that enable an application executing on a computing device to dynamically control how an allocated portion of a resource of the computing device is to be divided among multiple processes associated with the application. For example, an application executing on the computing device may interact with an operating system of the computing device to dynamically control how an allocated portion of a resource of the computing device is to be divided among a foreground process associated with the application and one or more background processes associated with the application. | 2015-09-10 |
20150254109 | SYSTEM, METHOD, AND APPARATUS FOR COORDINATING DISTRIBUTED ELECTRONIC DISCOVERY PROCESSING - The present invention relates to a method, system, and apparatus for coordinating distributed electronic discovery processing. The method may comprise the steps of receiving electronic discovery data comprising a plurality of electronic files, determining, with at least one processor, a plurality of discrete tasks for processing the electronic discovery data, determining, with at least one processor, a coordinated distribution of the plurality of discrete tasks to a plurality of computers, and assigning at least a portion of the plurality of discrete tasks to the plurality of computers based on the coordinated distribution such that at least one discrete task is assigned to each computer at any given time or during any given time period. A system and apparatus configured to perform the method is also disclosed. | 2015-09-10 |
20150254110 | VIRTUAL MACHINE TRIGGER - A computing system includes a parent partition, child partitions, a hypervisor, shared memories each associated with one of the child partitions, and trigger pages each associated with one of the child partitions. The hypervisor receives a system event signal from one of the child partitions and, in response to receiving the system event signal, accesses the trigger page associated with that child partition. The hypervisor determines whether the trigger page indicates whether data is available to be read from the shared memory associated with the child partition. The hypervisor can send an indication to either the parent partition or the child partitions that data is available to be read from the shared memory associated with the child partition if the hypervisor determines that the trigger page indicates that data is available to be read from the shared memory associated with the child partition. | 2015-09-10 |
20150254111 | ACCELERATION PREDICTION IN HYBRID SYSTEMS - Predicting acceleration in a hybrid system may comprise determining a number of cross system calls in a first host-accelerator computer architecture running a workload. Host machine overhead and accelerator overhead in the first host-accelerator computer architecture associated with each of the cross system calls may be determined. Communication delay associated with each of the cross system calls in the first host-accelerator computer architecture running a workload may be determined. An application response time may be predicted for a candidate application to be run in a second host-accelerator computer architecture, based at least on the determined host machine overhead, the accelerator overhead, and the communication delay associated with each of the cross system calls in the first host-accelerator computer architecture running a workload. | 2015-09-10 |
20150254112 | Methods, Systems, and Media for Protecting Applications from Races - Methods, systems, and media for protecting applications from races are provided. In some embodiments, methods for protecting applications from races are provided, the methods comprising: adding to at least one cycle of the application an update check to determine when an update to the application is to be made; adding an update engine to the application, wherein the update engine is configured to: receive an update plan that is based on an execution filter that specifies how operations of the application are to be synchronized; and cause synchronization operations to be added to the application based on the update plan that prevent the race from occurring. | 2015-09-10 |
20150254113 | Lock Spin Wait Operation for Multi-Threaded Applications in a Multi-Core Computing Environment - A method, system and computer-usable medium are disclosed for a lock-spin-wait operation for managing multi-threaded applications in a multi-core computing environment. A target processor core, referred to as a “spin-wait core” (SAC), is assigned (or reserved) for primarily running spin-waiting threads. Threads operating in the multi-core computing environment that are identified as spin-waiting are then moved to a run queue associated with the SAC to acquire a lock. The spin-waiting threads are then allocated a lock response time that is less than the default lock response time of the operating system (OS) associated with the SAC. If a spin-waiting fails to acquire a lock within the allocated lock response time, the SAC is relinquished, ceding its availability for other spin-waiting threads in the run queue to acquire a lock. Once a spin-waiting thread acquires a lock, it is migrated to its original, or an available, processor core. | 2015-09-10 |
20150254114 | PROVIDING A RECOVERY PLACEHOLDER WITHIIN AN APPLICATION - Embodiments described herein provide recovery placeholders within an application. Specifically, one approach includes providing an application operating on a client device, and generating a recovery placeholder that defines a current state of the application by analyzing a queue containing a set of messages, and identifying one or more selected events corresponding to the application from the queue. In one approach, the current state defines, at the time the recovery placeholder is generated, at least one of: a position within a window of the application, a current activity of the application, a position of the window within a display of a display device, and a placement order of the window of the application in relation to a stack of other cascaded windows. At a later point in time, the application may then be restored to the current state by accessing the recovery placeholder to replay the one or more selected events. | 2015-09-10 |
20150254115 | DISPLAY INFORMATION GENERATING DEVICE, PROGRAM-EXECUTION STATUS DISPLAY SYSTEM, PROGRAM-EXECUTION STATUS DISPLAY METHOD, AND COMPUTER PROGRAM PRODUCT - A system according to an embodiment is configured to display program execution results with respect to a common axis. The system includes a first unit that acquires event information about two or more events, acquires reference-event identification information to be used in identifying reference events, and generates event objects which represent the events, and a second unit that acquires axis information which represents information about the common axis. The event information contains timing information indicating positions of the events. The first unit sets the reference events as references for the program execution results based on the acquired reference-event identification information, determines display positions of the reference events with respect to the common axis to be same position based on timing information in event information about the reference events, and generates event objects representing the reference events based on the determined display positions with respect to the common axis. | 2015-09-10 |
20150254116 | DATA PROCESSING APPARATUS FOR PIPELINE EXECUTION ACCELERATION AND METHOD THEREOF - Disclosed herein are a data processing apparatus for pipeline execution acceleration and a method thereof. According to an exemplary embodiment of the present invention, the data processing apparatus for pipeline execution acceleration includes: a processor configured to sequentially execute a first application program and a second application program reading or writing a specific file; and a file system configured to complete a write for a file data for the specific file to a data block previously allocated from the first application program and provide the file data for the specific file to the second application program prior to executing a close call for the specific file from the first application program, when executing a read call for the specific file from the second application program. | 2015-09-10 |
20150254117 | APPARATUS AND METHOD FOR EXECUTING AGENT - Methods for processing a one-directional message transmitted by a currently running agent for an agent transaction context (ATC) are presented, the ATC configured to process a transaction utilizing any of a number of active agents in a multiagent system using a computing device including: causing the computing device to determine whether a destination agent designated as a destination for the one-directional message is present in an agent list corresponding with the ATC, where the agent list includes the active agents required for executing a number of threads; and if the destination agent is present in the agent list, storing the one-directional message in an intramessage queue, where the intra-transaction message queue corresponds with the ATC and is configured to store a number of one-directional messages, and where the number of one-directional messages are associated with the transaction. | 2015-09-10 |
20150254118 | VIRTUALIZED COMMUNICATION SOCKETS FOR MULTI-FLOW ACCESS TO MESSAGE CHANNEL INFRASTRUCTURE WITHIN CPU - A message channel optimization method and system enables multi-flow access to the message channel infrastructure within a CPU of a processor-based system. A user (pcode) employs a virtual channel to submit message channel transactions, with the message channel driver processing the transaction “behind the scenes”. The message channel driver thus allows the user to continue processing without having to block other transactions from being processed. Each transaction will be processed, either immediately or at some future time, by the message channel driver. The message channel optimization method and system are useful for tasks involving message channel transactions as well as non-message channel transactions. | 2015-09-10 |
20150254119 | APPLICATION DEHYDRATION AND REHYDRATION DURING APPLICATION-TO-APPLICATION CALLS - Methods, systems, and computer program products are provided that enable a first application (i.e., a caller application) to call a second application (i.e., a callee application) to perform a function in a manner such that the first application may be dehydrated during the call. In such case, the second application may be active while the first application is no longer present. The second application is enabled to respond to the call, causing the first application to be rehydrated. The first application continues execution at a location where the first application was dehydrated, and receives the response to the response to the call. | 2015-09-10 |
20150254120 | ELECTRONIC SYSTEM COMPRISING ELECTRONIC DEVICES, CIRCUIT BREAKER COMPRISING SUCH A SYSTEM, METHOD FOR GENERATING A DEVIATION INDICATOR IN THE EVENT OF INCOMPATIBILITY BETWEEN DEVICES AND ASSOCIATED COMPUTER PROGRAM PRODUCT - Electronic system comprising electronic devices, circuit breaker comprising such a system, method for generating a deviation indicator in the event of incompatibility between devices and associated computer program product | 2015-09-10 |
20150254121 | COMMAND EXECUTION RESULTS VERIFICATION - A computer program product for command result verification is configured to receive a command and an expected result from a command line interface, execute the command, receive one or more result codes resulting from the execution of the command, determine whether the one or more result codes satisfy the expected result, and send a response to the command line interface in response to determining whether the one or more result codes satisfy the expected result. | 2015-09-10 |
20150254122 | ANALYTICS OUTPUT FOR DETECTION OF CHANGE SETS SYSTEM AND METHOD - A method, computer program product, and computer system for receiving, at a computing device, logs and traces from one or more sources. The logs and traces are analyzed for problem imprints associated with an error. A set of one or more candidate lists is generated from the logs and traces. A change set from the set of one or more candidate lists that caused the error is identified. | 2015-09-10 |
20150254123 | Symmetric Multi-Processor Arrangement, Safety Critical System, And Method Therefor - A symmetric multi-core processor arrangement for a safety critical system, including: a symmetric multi-processor having at least two cores and a memory shared for the at least two cores; and a hypervisor connected to the symmetric multi-processor, and configured to organize access to the at least two cores for at least a diagnostic application checking the safety critical system; wherein, during use, the diagnostic application is configured to read from and write to the memory, and the hypervisor is configured to read only from the memory. | 2015-09-10 |
20150254124 | ANALYTICS OUTPUT FOR DETECTION OF CHANGE SETS SYSTEM AND METHOD - A method, computer program product, and computer system for receiving, at a computing device, logs and traces from one or more sources. The logs and traces are analyzed for problem imprints associated with an error. A set of one or more candidate lists is generated from the logs and traces. A change set from the set of one or more candidate lists that caused the error is identified. | 2015-09-10 |
20150254125 | INFORMATION PROCESSING SYSTEM MONITORING APPARATUS, MONITORING METHOD, AND MONITORING PROGRAM - Provided is a method of detecting a warning sign indicating the occurrence of a system failure targeting a plurality of varied information processing systems. A system for monitoring a plurality of monitored systems receives measured values regarding a plurality of indexes, designates, from a plurality of prediction models, a prediction model for predicting a future measured value from the measured value that was received regarding a reference index, predicts a predicted value of the reference index based on the designated prediction model, generates or updates a Bayesian network targeting the reference index and a target index, and calculates a probability that a measured value of the target index will become a predetermined value or fall within a predetermined value range. | 2015-09-10 |
20150254126 | Systems and Methods for Storage of Data in a Virtual Storage Device - In accordance with the concepts described herein, a system for providing data storage includes at least one virtual server comprising at least one virtual storage device; at least one physical server comprising at least one physical storage device; a data structure, stored on each of the at least one physical storage devices, the data structure comprising: at least one table of contents, the table of contents configured to map storage locations within the virtual storage device to node structures that provide pointers to corresponding storage locations within the physical storage device; a tree structure having a predetermined number of hierarchical levels, each level containing node structures, the node structures containing pointers that point to other node structures or to data locations on the physical storage device; and one or more core software modules executed by one or more virtual machines, one or more physical machines or both and configured to receive requests to access data in the storage locations within the virtual storage device and, in response to the requests, traverse the data structure to access data in the corresponding storage locations within the physical storage device. | 2015-09-10 |
20150254127 | MACHINE ERROR AND FAILURE MITIGATION - In one embodiment, a method comprising receiving, at a machine, a first message; operably connecting the machine to a device that comprises a temporary update; loading the update from the device; and mitigating the first message with the update before receiving a more permanent solution to the first message. | 2015-09-10 |
20150254128 | STORAGE APPARATUS, STORAGE SYSTEM, AND DATA MANAGEMENT METHOD - The storage apparatus has a control unit that includes: an identification unit that is configured to determine that a first data element contained in the data is incorrect, when a first restoration calculation first data element, which is restored from the first data element using other data elements of the data excluding the first data element and a new redundancy code obtained from the data by a first calculation method, coincides with a second restoration calculation first data element, which is restored from the first data element using the other data elements and a new redundancy code obtained from the data by a second calculation method; and a restoration unit that is configured to correct the first data element in the storage devices that is determined to be incorrect by the identification unit, to either the first restoration calculation first data element or the second restoration calculation first data element. | 2015-09-10 |
20150254129 | Error Checking and Correction for NAND Flash Devices - Mechanisms are provided, in a Not AND (NAND) flash memory device, for providing hybrid error correction management. A NAND flash memory module and a node controller coupled to the NAND flash memory module are provided along with a hardware logic implemented error correction code (ECC) engine associated with the node controller. The node controller is configured to determine whether an error count is less than or equal to a first threshold number of error bits and, in response to the error count being less than or equal to the first threshold number of error bits, performing correction of the error bits by the hardware logic implemented ECC engine associated with the node controller. The node controller is also configured to forward uncorrected data to a software logic implemented ECC engine, in response to the error count being greater than the first threshold number of error bits. | 2015-09-10 |
20150254130 | ERROR CORRECTION DECODER - According to an embodiment, an error correction decoder includes a first calculation circuit and a second calculation circuit. The first calculation circuit and the second calculation circuit perform the column processing based on the second reliability information corresponding to variable nodes belonging to each of one or more valid blocks arranged in a first row group and the row processing based on the first reliability information corresponding to variable nodes belonging to one or more valid blocks arranged in a second row group whose processing order is later than that of the first row group in parallel. | 2015-09-10 |
20150254131 | MEMORY CONTROLLER, STORAGE DEVICE AND MEMORY CONTROL METHOD - According to one embodiment, there is provided a memory controller that controls nonvolatile memory of K bits/cell, first and second bits of the K bits corresponding to first and second pages, the memory controller including an encoder configured to encode unit data to write in a first page to generate a parity; and a decoder configured to perform an error correction process using the readout unit data and the parity; where readout of the first page is carried out using 2 | 2015-09-10 |
20150254132 | SEMICONDUCTOR MEMORY DEVICE - A semiconductor memory device includes: a memory array; a data-maintaining component, maintaining data read from the memory array or maintaining data used for writing to the memory array; an external input/output terminal; an error correction component, coupling the data-maintaining component and performing error-detection or correcting the data input to the data-maintaining component or output data from the data-maintaining component; a compressing component, coupling between the external input/output terminal and the error correction component and compressing or extending data. The compressing component compresses data provided by the external input/output terminal, provides the compressed data to the error correction component, extends the data provided by the error correction component, and provides the extended data to the external input/output terminal. | 2015-09-10 |
20150254133 | MEMORY CONTROLLER, STORAGE APPARATUS, INFORMATION PROCESSING SYSTEM, AND CONTROL METHOD THEREFOR - There is provide a memory controller, which substitutes a substitution page for an error page in a block including a plurality of pages in a non-volatile memory and secures a substitution block to substitute a page in the secured substitution block for the error page when the substitution page is insufficient in a block to which the error page belongs, the substitution page being assigned to the block to which the error page belongs, the substitution block being different from the block to which the error page belongs. | 2015-09-10 |
20150254134 | MEMORY CONTROLLER, MEMORY SYSTEM, AND MEMORY CONTROL METHOD - According to one embodiment, a memory controller includes a writing destination management unit which determines a writing destination of user data, an encoding unit which generates a parity of the user data, and an ECC management unit which measures a fatigue degree of each certain memory area of a nonvolatile memory, selects an encoding method to instruct the encoding unit to be performed according to the encoding method, and changes the encoding method to an encoding method having a high error correction capability in a case where the fatigue degree corresponding to the writing destination is equal to or higher than a threshold and a total sum of parities is equal to or less than a predetermined amount. | 2015-09-10 |
20150254135 | ERROR CORRECTION WITH ON-DEMAND PARITY SECTORS IN MAGNETIC DATA STORAGE DEVICES - Data storage devices are described with an ECC system that generate additional on-demand ECC information for a previously written track to provide for correction of data errors in the track and thereby avoid having to rewrite the track. Embodiments of the invention address the squeeze-error problem that arises when writing the next (second) track in a sequence causes errors to be introduced in the adjacent previously written (first) track. In alternative embodiments the existence of the data errors in the first track can be detected by reading the track or by estimating the number of likely errors using head position data measured while writing the first and second tracks. The additional on-demand ECC information can be written on any track that is available. | 2015-09-10 |
20150254136 | MEMORY DEVICE - According to one embodiment, an encoder generates a write data parity from write data to memory elements. A decoder corrects an error of read data from the memory elements using a read data parity for the read data and a check matrix. An inverter maintains or inverts all bits of a received input. Calculation by the decoder using the read data, the read data parity, and the check matrix produces a first result when an error is not included in the read data, a second result when an error is included in the read data, a third result when an error is not included in the read data and all bits of the read data are inverted, and a fourth result when an error is included in the read data and all bits of the read data are not inverted. | 2015-09-10 |
20150254137 | METHODS AND APPARATUS FOR MULTI-PHASE RESTORE - Methods and apparatus to identify at least a first portion and a second portion of resources to restore to a device are described. The first portion of the resources may be restored atomically to the device before the second portion of the resources. The device may not respond to at least one user input during the restoration of the first portion of the resources. If the restoring of the first portion is successful, the second portion of the resources may be restored. The device may respond to the user input during the restoring of the second portion of the resources. | 2015-09-10 |
20150254138 | DYNAMIC MONITORING OF COMMAND LINE QUERIES - A method for dynamic monitoring of command line queries. The method includes receiving a command that includes a query and one or more parameters, mapping the command to a system resource, monitoring for a state change event pertaining to the system resource or a terminal event until a detection of the terminal event, and retrieving one or more characteristics of the system resource in response to detecting the state change event pertaining to the system resource. The system resource has a plurality of characteristics, each characteristic having a name and a value. A state change event corresponds to a change in one or more characteristics of a system resource. | 2015-09-10 |
20150254139 | REDUNDANCY PROCESSING METHOD AND SYSTEM, AND INFORMATION PROCESSING APPARATUS THEREOF - In this method, a first information processing apparatus in a first system identifies a second system that performs a first processing on behalf of the first system when an abnormality occurs in the first system, and transmits a first request that includes data concerning resources used to perform the first processing to a second information processing apparatus in the second system. Upon detecting an abnormality in the second system, the first information processing apparatus identifies a third system other than the second system, transmits a second request that includes data concerning resources used to perform the first processing to a third information processing apparatus in the third system, and transmits a third request to release resources secured for the first system to the second information processing apparatus in the second system, upon detecting return of the second system. | 2015-09-10 |
20150254140 | Reliability Enhancement in a Distributed Storage System - Machines, systems and methods for enhancing data recovery in a data storage system, the method comprising determining whether one or more data storage mediums in a data storage system are unavailable; determining data that are at a risk of loss, due to said one or more data storage mediums being unavailable; from among the data that is determined to be at the risk of loss, identifying data that is highly vulnerable to loss; and creating one or more temporary replicas of the data that is highly vulnerable to loss. | 2015-09-10 |
20150254141 | CENTRALIZED TAPE MANAGEMENT FOR DATABASES - A method, apparatus, and system for centralized tape management are provided for databases. A centralized availability machine or disk and tape backup server maintains working backup data for a plurality of database management systems (DBMSs) based on receiving, from each of the plurality of DBMSs, differential incremental updates. The updates may be at the database block level, with an index maintained to identify different versions of the blocks for snapshot recovery. The availability machine then determines a utilization schedule for distributing the working backup data to a plurality of tapes using a plurality of tape drives, and stores the working backup data as archived backup data on the plurality of tapes according to the utilization schedule. By placing each DBMS within a protection policy that indicates criteria to meet business goals with respect to tape backups, the utilization schedule can automatically schedule tape backup jobs with optimized hardware resource assignments. | 2015-09-10 |
20150254142 | SYSTEMS AND/OR METHODS FOR DATA RECOVERY IN DISTRIBUTED, SCALABLE MULTI-TENANT ENVIRONMENTS - Certain example embodiments relate to techniques for recovering registry information and recreating the entire registry for all available tenants in a scalable, multi-tenant distributed environment, while also potentially looking into all of the running services where the most up-to-date data could exist. Dynamic real-time or substantially real-time recreation of connections between a web application and the latest instance of a tenant in such an environment (e.g., following a failure of one of the databases holding the tenant data, a corruption of the registry entry pointing to the tenant, and/or the like) is made possibly by, for instance, comparing the timestamps of the last written entities in order to examine the most current data and “re-bundle” the last master/replication instances, e.g., for restores in an environment where a rolling failover procedure is implemented. | 2015-09-10 |
20150254143 | COMPUTER SYSTEM, CLUSTER MANAGEMENT METHOD, AND MANAGEMENT COMPUTER - A computer system, comprising: a plurality of computers; and a management computer for managing a cluster which includes the plurality of computers, the cluster include a plurality of first computers each of which executes a service and a plurality of second computers for taking over the service, wherein the management computer includes: a backup obtaining module; and a restoration pair management module, wherein the restoration pair management module is configured to: sort the plurality of first computers into a plurality of groups of first computers by which a software configuration for providing the service is common; generate at least one restoration pair for each of the plurality of groups by associating at least one first computer that is included in one group with at least one second computer; determine a common image for each of the plurality of restoration pairs. | 2015-09-10 |
20150254144 | Method for data recovery on a data carrier with overlapping data tracks and device thereof - A defect management system for storage devices is disclosed, which may be used in connection with shingled magnetic recording (SMR). Overlapping data tracks, separated by guard regions, are written by a write element whose track width is at least twice as wide as the track width of a read element. Depending on the embodiment, data recovery of a defective track or sector is attained by evaluating the contents of an adjacent track or guard region: if the adjacent track or guard region encompasses equivalent data, due to the width of the write element, this data may be used as a complement or as a substitute for the defective track or sector. This may reduce the risk of data loss. The capacity of a storage device may be increased by balancing out the probability of read errors with the probability that an adjacent track may encompass equivalent data. | 2015-09-10 |
20150254145 | OPERATING SYSTEM/HYPERVISOR EFFICIENCIES FOR SUB-DIVIDED PRIVILEGE LEVELS - Operating system/hypervisor efficiencies for sub-divided privilege levels is described, for example, where a plurality of execution processes at the same privilege level share at least part of a memory address translation structure. In various embodiments a first component of an original hierarchical memory address translation structure is duplicated and edited to omit entries not visible to both a trusted process and an untrusted process. In various examples, the duplicated component is used by an untrusted process together with other components of the original translation structure; the original translation structure is used by a trusted process. In various examples, additional copies of the first component are used for additional untrusted processes. In some examples, synchronization of the first component and its duplicate(s) is carried out on update of the translation structure. In some examples, synchronization of the first component and its duplicate(s) is carried out by a page fault handler. | 2015-09-10 |
20150254146 | Adaptive Private Network with Geographically Redundant Network Control Nodes - Systems and techniques are described which improve performance, reliability, and predictability of networks. Geographically diverse network control nodes (NCNs) are provided in an adaptive private network (APN) to provide backup NCN operations in the event of a failure. A primary NCN node in a first geographic location is operated according to a primary state machine at an NCN active state. A client node is operated according to a client state machine. A secondary NCN node in a second geographic location that is geographically remote from the first geographic location is operated according to a secondary state machine at a standby state. The three state machines operating parallel and upon detecting a change in APN state information, the secondary state machine transitions from the standby state to a secondary active NCN state and the secondary NCN node provides APN timing calibration and control to the client node. | 2015-09-10 |
20150254147 | Fault Detection Method and Related Device and Stack System - A fault detection method and a related device and stack system. The fault detection method is applied in a stack system, where a first communications device includes a first service board and a second service board, the first service board includes a first processor and a first component, the second service board includes a second processor and a second component, where the second component receives a first signal from the first component, updates the current total number of abnormal ports of the second communications device based on the number, which is indicated by the first signal, of abnormal ports of the second communications device, and if the updated current total number of abnormal ports of the second communications device satisfies a failure confirmation condition corresponding to the second communications device, informs the second processor that the second communications device partially or entirely fails. | 2015-09-10 |
20150254148 | SEMICONDUCTOR DEVICE - A semiconductor device in which unwanted change in the secondary data which must be reliable is suppressed and the need for a considerable increase in the capacity of a memory unit can be avoided. Also it ensures efficient data processing by asymmetric access to the memory unit. It includes a memory unit having a first memory without an error correcting function, a second memory with an error correcting function, and a plurality of access nodes for the memories. A plurality of buses is coupled to the access nodes and a plurality of data processing modules can asymmetrically access the memory unit through the buses. The first memory stores primary data before data processing by the data processing modules, and the second memory stores secondary data after data processing by the data processing modules. | 2015-09-10 |
20150254149 | Dual Adjacency Between Edge Devices at a Network Site - Devices, methods and instructions encoded on computer readable medium for implementation of a dual-adjacency between edge devices of a network site. A first edge device comprises one or more local interfaces configured for communication, via a local network, with one or more network devices co-located in a first network site. The first edge device also comprises one or more overlay interfaces configured for communication, via a core network, with one or more network devices located in one or more other network sites connected to the core network. The first edge device comprises a processor configured to establish, via at least one of the local interfaces, a site communication channel with a second edge device co-located in the first network site. The processor is further configured to establish an overlay communication channel, via at least one of the overlay interfaces, with the second edge device. | 2015-09-10 |
20150254150 | SYSTEM AND METHOD FOR DATACENTERS DISASTER RECOVERY - A method for configuring an asynchronous Disaster Recovery (DR) process over a storage system comprising a plurality of storage sites, the method comprising: receiving data indicative of the storage sites; calculating information dispersal parameters that enable dispersing slices of DR enabling data based on original data written to a primary storage site out of the storage sites between at least two DR storage sites out of the storage sites, wherein at least one of the DR storage sites is a remote storage site, wherein each of the slices of DR enabling data is smaller than the original data and wherein the DR enabling data is larger than the original data; and configuring the asynchronous DR process in accordance with the calculated information dispersal parameters. | 2015-09-10 |
20150254151 | N-Gram Analysis of Inputs to a Software Application - Input sequence information may be analyzed and quantified using n-gram analysis of inputs received by an application. The sequences of inputs may be represented by n-grams, and the frequency of the various n-grams may indicate the ‘real world’ uses of the application in production, which may be compared to a test suite whose coverage may be quantified using a similar n-gram analysis. A coverage factor may compare the observed inputs to the application in production to the test suite for the application. The n-grams may be further quantified or prioritized by resource utilization and several visualizations may be generated from the data. | 2015-09-10 |
20150254152 | SYSTEM AND METHOD FOR IDENTIFYING UNDERUTILIZED STORAGE CAPACITY - Described herein is a system and method for detecting underutilized capacity within a storage system environment. The technique comprises collecting performance data of various storage objects within a storage system environment for various performance measures at designated time intervals. The collected performance data may be formatted and stored to a database. One or more parameters may be received specifying at least one performance measure, at least one threshold value, and/or at least one time period. The performance data for target storage objects may be analyzed according to the received parameters to determine any underutilized storage objects. A report may be generated according to the parameters listing the storage objects and address locations of any underutilized storage objects. The report may comprise various information corresponding to the underutilized storage object, such as the business units, tiers, data centers, and levels of service they are associated with. | 2015-09-10 |
20150254153 | PERIPHERAL APPARATUS MANAGEMENT SYSTEM, PERIPHERAL APPARATUS OPERATING SYSTEM AND SHARING SYSTEM THEREOF - The present disclosure illustrates a peripheral apparatus management system, peripheral apparatus operating system and sharing system thereof. The sharing system includes first electronic apparatus, second electronic apparatus and peripheral apparatus electrically connected with the second electronic apparatus. In the local area network, the peripheral apparatus is controlled remotely by the first electronic apparatus, via communication between a first apparatus driver module installed in the first electronic apparatus and a second apparatus driver module installed in the second electronic apparatus, so that the operation convenience of operating the peripheral apparatus can be improved. Besides, the user can operate this peripheral apparatus without running additional application program in the second electronic apparatus. The data generated by the peripheral apparatus in this system is output to the first electronic apparatus and cannot be accessed in the second electronic apparatus, so that this sharing system has better data confidentiality. | 2015-09-10 |
20150254154 | SYSTEMS AND METHODS FOR DETECTING ERRORS AND RECORDING ACTIONS ON A BUS - Systems and methods to detect errors and record actions on a bus are disclosed. In one embodiment, the bus is a serial low-power interchip media bus (SLIMbus) within a computing device. The SLIMbus is coupled to peripherals and a sniffer is positioned within the computing device and coupled to the SLIMbus. The sniffer mimics another SLIMbus peripheral. However, the sniffer uses a pair of multiplexers to know when to record data on the SLIMbus. The data, including the control header and payload of the data signal is captured and logged. The logged data is then exported to memory where it can be further processed so as to help debug communication on the SLIMbus. | 2015-09-10 |
20150254155 | Maintaining Coherent Synchronization Between Data Streams on Detection of Overflow - Trace data streams are generated for tracing target processor activity. Various trace data streams are synchronized using markers called sync points. The sync points provide a unique identifier field and a context to the data that will follow it. All trace data streams may generate a sync point with this unique identifier. These unique identifiers allow synchronization between multiple trace data streams. When multiple trace data streams are on, it is possible that the data input rate may be higher than the data output rate. If synchronization is lost in such a case, there must be a scheme to resynchronize the streams. This invention is a technique for this needed resynchronization. | 2015-09-10 |
20150254156 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 2015-09-10 |
20150254157 | Method for Throttling Trace Data Streams - A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and throttling the trace data stream to ensure that the bandwidth available for the trace data stream is not exceeded. A trace data gap is inserted into the data stream to indicate the amount and type of data discarded during the throttling process. | 2015-09-10 |
20150254158 | EVENT CORRELATION - Event correlation may include identifying a feature set for each log file of a plurality of log files, and extracting the feature set for each event of a plurality of events in each log file of the plurality of log files. Event correlation may further include determining a plurality of trace event pairs linkage strength values for an event from a first log file of the plurality of log files and a plurality of events from a second log file of the plurality of log files. The trace event pairs linkage strength values may represent an overlap of the feature set for the event from the first log file and the feature set for each of the plurality of events from the second log file. | 2015-09-10 |
20150254159 | MONITORING TARGET APPARATUS, AGENT PROGRAM, AND MONITORING SYSTEM - [Object] A monitoring target apparatus, agent program, and monitoring system capable of continuously and stably operating monitoring control are suggested. | 2015-09-10 |
20150254160 | TRACING THE OPERATIONS OF A DATA PROCESSING APPARATUS - An apparatus for processing data is disclosed in which the operations of data processing circuitry are monitored by one or more trace data sources which generate items of trace data indicative of the data processing operations performed by the data processing circuitry. Trace data source identifiers in a resulting trace stream indicate the source of items of trace data and a selected trace data source identifier is included in the trace stream in response to a received flush request signal. All items of trace data generated before the apparatus received the flush request signal are included in the trace stream before the selected trace data source identifier, such that the conclusion of the response of the apparatus to the flush request signal can be identified. | 2015-09-10 |
20150254161 | Regression Evaluation Using Behavior Models of Software Applications - Comparisons of different versions of an application may be compared using a behavior model of the application. A behavior model may be derived from n-gram analysis of observations of the application in production. The behavior model may include sequences of inputs received by the application or functions performed by the application, where each sequence is an n-gram observed in tracer data. Each n-gram may be coupled with a resource consumption to give a behavior model with performance data. A regression analysis may apply a behavior model derived from a first version of an application to the performance observations of a new version to create an expected performance metric for the new version. A similarly calculated metric from a previous version may be compared to the metric from a new version to determine an improvement or degradation of performance. | 2015-09-10 |
20150254162 | N-Gram Analysis of Software Behavior in Production and Testing Environments - Execution sequence information may be analyzed and quantified using n-gram analysis of functions executed by an application. The sequences of functions may be represented by n-grams, and the frequency of the various n-grams may indicate the behavior of the application in production, which may be compared to a test suite whose coverage may be quantified using a similar n-gram analysis. A coverage factor may compare the observed behavior of the application in production to the test suite for the application. The n-grams may be further quantified or prioritized by resource utilization, and several visualizations may be generated from the data. | 2015-09-10 |
20150254163 | Origin Trace Behavior Model for Application Behavior - A behavior model for a software application may identify a set of execution sequences that begin from a set of origins. The sequences may be further defined by a set of exits. In some cases, the sequences may be decomposed into subsequences or n-grams. The execution sequences and their frequencies may define a usage or behavior model for the application. The sequences may be defined by semantic level operations of an application, which may be defined by functions, call backs, API calls, or other blocks of code execution. The behavior model may be used for determining code coverage, comparing versions of applications, and other uses. | 2015-09-10 |
20150254164 | STACK OVERFLOW PROTECTION DEVICE, METHOD, AND RELATED COMPILER AND COMPUTING DEVICE - The present disclosure relates to a stack overflow protection device and a stack protection method. According to the present disclosure, a stack overflow protection device is provided, which includes a dividing unit configured to divide at least one function in the input codes into a code region with a string operation and a code region without a string operation. The device also includes a stack protection unit configured to set up stack protection in the code region with a string operation. The present disclosure further provides a stack protection method. | 2015-09-10 |
20150254165 | Automated Regression Testing for Software Applications - Regression testing of an application may gather performance tests for multiple functions within an application and determine when performance changes from one version of the application to another. The analysis may be further broken down by input sequences that may be processed by various functions. A detailed regression analysis may be presented as a heat map or other visualizations. A regression testing system may be launched during a build process by automatically launching a set of performance tests against an application. In many cases, the application may be executed in a system with a known or consistent performance capabilities. The application may be executed and tested in a new version and at least one prior version on the same hardware and software execution environment, so that results may be normalized from one execution run to another. A regression testing system may be deployed as a paid-for service that may integrate into a source code repository. | 2015-09-10 |
20150254166 | AUTOMATIC TEST CASE GENERATION - According to an embodiment of the present invention, a system for generating one or more test cases for a service of a server system comprises at least one processor. The system analyzes metadata associated with the service to generate a schema definition for inputs and outputs of the service. A description of the service is generated in an application description language that refers to the schema definition. The system processes the generated description of the service to produce the one or more test cases. Embodiments of the present invention further include a method and computer program product for generating one or more test cases for a service in substantially the same manner described above. | 2015-09-10 |
20150254167 | STRUCTURED SYNTAX FOR STORY SPECIFICATION - A computer-implemented method performed by a computerized device, apparatus and computer program product, the method comprising: displaying to a user two or more options related to one or more principle attributes of a test; receiving from the user selection for an option related to a principle attribute; receiving from the user a value for the principle attribute; and generating a description of the test, the description comprising the value for the principle attribute. | 2015-09-10 |
20150254168 | Method And System For Testing Interactions Between Web Clients And Networked Servers - A system and method providing a testing, monitoring and debugging framework that supports testing web clients with complex and advanced feature sets. The system and method allows multiple web clients to be simultaneously tested on the same physical machine without conflict and records a full range of performance and debugging information by providing detailed measurements at a combination of application and networking layers. | 2015-09-10 |
20150254169 | METHOD AND SYSTEM FOR CREATING REFERENCE DATA - A method for updating a test description for an automated computer test. The method includes comparing a received image from the system under test with one or more existing reference images to identify an expected image. If the expected image is not identified, the method further includes obtaining metadata for the expected image, using a processing device to create a new reference image using, at least, the said metadata, storing the new reference image using a storage device, updating the test description using the new reference image, and utilizing the updated test description in a further automated computer test. | 2015-09-10 |
20150254170 | METHOD AND SYSTEM FOR ENTERING INFORMATION - A method of updating a test description forming part of an automated test. The method includes obtaining a first time value associated with the sending of an instruction contained within the test description from the test computer to the system under test, obtaining a second time value associated with the receiving of an image comprising at least a portion of a GUI output of the system under test at the test computer, and using one or more processor devices to compare the first and second time values to determine timing information and update the test description using the timing information. | 2015-09-10 |
20150254171 | AUTOMATIC TEST CASE GENERATION - According to an embodiment of the present invention, a system for generating one or more test cases for a service of a server system comprises at least one processor. The system analyzes metadata associated with the service to generate a schema definition for inputs and outputs of the service. A description of the service is generated in an application description language that refers to the schema definition. The system processes the generated description of the service to produce the one or more test cases. Embodiments of the present invention further include a method and computer program product for generating one or more test cases for a service in substantially the same manner described above. | 2015-09-10 |
20150254172 | Security Alerting Using N-Gram Analysis of Program Execution Data - N-grams of input streams or functions executed by an application may be analyzed to identify security breaches or other anomalous behavior. A histogram of n-grams representing sequences of executed functions or input streams may be generated through baseline testing or production use. An alerting system may compare real time n-gram observations to the histogram of n-grams to identify security breaches or other changes in application behavior that may be anomalous. An alert may be generated that identifies the anomalous behavior. The alerting system may be trained using known good datasets and may identify deviations as bad behavior. The alerting system may be trained using known bad datasets and may identify matching behavior as bad behavior. | 2015-09-10 |
20150254173 | AUTOMATED GENERATION OF TEST CASES FOR REGRESSION TESTING - Systems, methods and computer program products for performing software regression testing are disclosed. The systems, methods and computer program products are configured to execute a test case against an application under test on a programmable digital computer, to obtain from the programmable digital computer an identity of a first code module invoked by the test case, to associate the test case identifier with the first code module, to identify a second code module that is related to the first code module, and to associate the test case identifier with the second code module. | 2015-09-10 |
20150254174 | REGRESSION TESTING OF SQL EXECUTION PLANS FOR SQL STATEMENTS - A first execution plan for a first version of a structured query language statement can be requested from a database management system. The first execution plan for the first version of the structured query language statement can be loaded into a first directed graph tree structure comprising a plurality of nodes. The first directed graph tree structure can be scanned to determine whether a full table scan for accessing requested data is represented by at least a one of the plurality of nodes of the directed graph tree structure. Responsive to determining that the full table scan for accessing the requested data is represented by the at least one of the plurality of nodes of the directed graph tree structure, a first indicator that indicates a fault condition can be output. | 2015-09-10 |
20150254175 | MEMORY MODULE INCLUDING MEMORY RESISTORS - A computing device includes, a memory component, a memory module including memory resistors, and a virtualization module. The virtualization module intercepts communication between an application and a memory component and directs the communication to the memory module including memory resistors. The virtualization module directs communication from the memory module to the application. | 2015-09-10 |
20150254176 | METHOD FOR MANAGING A FLASH MEMORY - A method of managing a rewritable mass memory subdivided into sectors within which data pages are recorded, and data periodically updated, where data erasure in a sector erases all previously written data therein. The method includes: | 2015-09-10 |
20150254177 | MEMORY SYSTEM - According to one embodiment, a memory system includes a first memory, a second memory, a third memory, a data transmission controller, and a processing unit. The second memory is configured to store first management information to manage the first memory. The third memory is configured to be accessed at a speed higher than the second memory. The processing unit causes the data transmission controller to transmit second management information and third management information from the second memory to the third memory in a burst mode before a read process is performed on the first memory. The second management information and the third management information are related to the read process and are included in the first management information. The processing unit performs the read process on the first memory using the second management information and the third management information stored in the third memory. | 2015-09-10 |
20150254178 | CONTROL ARRANGEMENTS AND METHODS FOR ACCESSING BLOCK ORIENTED NONVOLATILE MEMORY - A read/write arrangement is described for use in accessing at least one nonvolatile memory device in read/write operations with the memory device being made up of a plurality of memory cells which memory cells are organized as a set of pages that are physically and sequentially addressable with each page having a page length such that a page boundary is defined between successive ones of the pages in the set. The read/write arrangement includes a control arrangement that is configured to store and access a group of data blocks that is associated with a given write operation in a successive series of pages of the memory such that at least an initial page in the series is filled and each block includes a block length that is different than the page length. | 2015-09-10 |
20150254179 | MOVING BLOCKS OF DATA BETWEEN MAIN MEMORY AND STORAGE CLASS MEMORY - An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. | 2015-09-10 |
20150254180 | CACHE STRUCTURE AND MANAGEMENT METHOD FOR USE IN IMPLEMENTING RECONFIGURABLE SYSTEM CONFIGURATION INFORMATION STORAGE - Disclosed is a cache structure for use in implementing reconfigurable system configuration information storage, comprising: layered configuration information cache units: for use in caching configuration information that may be used by a certain or several reconfigurable arrays within a period of time; an off-chip memory interface module: for use in establishing communication; a configuration anagement unit: for use in managing a reconfiguration process of the reconfigurable arrays, in mapping each subtask in an algorithm application to a certain reconfigurable array, thus the reconfigurable array will, on the basis of the mapped subtask, load the corresponding configuration information to complete a function reconfiguration for the reconfigurable array. This increases the utilization efficiency of configuration information caches. Also provided is a method for managing the reconfigurable system configuration information caches, employing a mixed priority cache update method, and changing a mode for managing the configuration information caches in a conventional reconfigurable system, thus increasing the dynamic reconfiguration efficiency in a complex reconfigurable system. | 2015-09-10 |
20150254181 | BURST LENGTH DEFINED PAGE SIZE - In some examples, a memory device is configured with a reduced command set and a variable burst length. In some instances, the variable burst length defines a page size associated with data to be loaded into a cache. In other instances, the variable burst length may be set on the fly per read/write command and, in some cases, the burst length may be utilized to define the page size associated with the read/write command. | 2015-09-10 |
20150254182 | MULTI-CORE NETWORK PROCESSOR INTERCONNECT WITH MULTI-NODE CONNECTION - According to at least one example embodiment, a method of data coherence is employed within a multi-chip system to enforce cache coherence between chip devices of the multi-node system. According at least one example embodiment, a message is received by a first chip device of the multiple chip devices from a second chip device of the multiple chip devices. The message triggers invalidation of one or more copies, if any, of a data block. The data block stored in a memory attached to, or residing in, the first chip device. Upon determining that one or more remote copies of the data block are stored in one or more other chip devices, other than the first chip device, the first chip device sends one or more invalidation requests to the one or more other chip devices for invalidating the one or more remote copies of the data block. | 2015-09-10 |
20150254183 | INTER-CHIP INTERCONNECT PROTOCOL FOR A MULTI-CHIP SYSTEM - A multi-chip system includes multiple chip devices configured to communicate to each other and share resources. According to at least one example embodiment, a method of providing memory coherence within the multi-chip system comprises maintaining, at a first chip device of the multi-chip system, state information indicative of one or more states of one or more copies, residing in one or more chip devices of the multi-chip system, of a data block. The data block is stored in a memory associated with one of the multiple chip devices. The first chip device receives a message associated with a copy of the one or more copies of the data block from a second chip device of the multiple chip devices, and, in response, executes a scheme of one or more actions determined based on the state information maintained at the first chip device and the message received. | 2015-09-10 |
20150254184 | Directory Maintenance Method and Apparatus - A directory maintenance method and apparatus are provided. The method includes sending, by a main memory according to a correspondence between a cache line in a directory and a cache, listening information to each cache corresponding to a cache line at a preset frequency; receiving, by each cache corresponding to the cache line, the listening information, and sending a listening response according to the listening information; and receiving, by the main memory, the listening response, and updating the directory according to the listening response, where the listening response includes a state of the cache line in the cache sending the listening response. The directory maintenance method and apparatus that are disclosed in the present invention can lower an impact of listening caused due to replacement on normal processing of a processor, and reduce degradation of system performance. | 2015-09-10 |
20150254185 | System and Method to Cache Hypervisor Data - Systems and methods for caching data from a plurality of virtual machines are disclosed. In one particular exemplary embodiment, the systems and methods may be realized as a method for caching data from a plurality of virtual machines. The method may comprise detecting, using a computer processor executing cache management software, initiation of migration of a cached virtual machine from a first virtualization platform to a second virtualization platform, disabling caching for the virtual machine on the first virtualization platform, detecting completion of the migration of the virtual machine to the second virtualization platform, and enabling caching for the virtual machine on the second virtualization platform. | 2015-09-10 |
20150254186 | INFORMATION PROCESSING DEVICE HAVING A PLURALITY OF TYPES OF MEMORY CACHES WITH DIFFERENT CHARACTERISTICS - An information processing apparatus comprises a plurality types of cache memories having different characteristics, decides on a type of cache memory to be used as a data cache destination based on the access characteristics of cache-target data, and caches the data in the cache memory of the decided type. | 2015-09-10 |
20150254187 | STORAGE DEVICE, INFORMATION PROCESSING APPARATUS, AND CACHE CONTROL PROGRAM - A first cache memory connects to a first storage module and stores part of information in the first storage module. A second cache memory connects to a second storage module and stores information in the second storage module. By using the information stored in the first or the second cache memory, a request processing unit reads or writes information from or to the first and the second storage modules. A change management unit changes connection such that the first storage module connects to the second cache memory. When a change is performed by the change management unit, a read control unit moves the information stored in the first cache memory to the second cache memory. | 2015-09-10 |
20150254188 | MEMORY SYSTEM AND METHOD OF CONTROLLING MEMORY SYSTEM - According to one embodiment, a controller registers first information to a first management table, and manage the first information, the first information being management information of data buffered in the buffer memory. When the data buffered in the buffer memory is flushed to the nonvolatile memory, the controller releases, from the first management table, the first information of the flushed data, and registers, to a second management table, and manages, the first information of the flushed data. | 2015-09-10 |
20150254189 | RESOURCE ACCESS CONTROL IN A SYSTEM-ON-CHIP - A method for controlling access of a processor to a resource, wherein the processor has an instruction set including a virtualization extension, may include executing a resource access instruction by the processor using the virtualization extension, whereby the resource access instruction conveys a virtual address (VA) and a virtual machine identifier. The method may also include translating the virtual address to a physical address based on the virtual machine identifier, and looking-up an access control rule table using the physical address as a search key. Each entry of the rule table includes a virtual machine identifier. The method further includes controlling access to the resource based on the output of the rule table and a match between the virtual machine identifier returned by the table and the virtual machine identifier conveyed in the resource access instruction. | 2015-09-10 |
20150254190 | Policy Control Method and Apparatus for Terminal Peripheral - Provided are a policy control method and device for one or more terminal peripherals. The method includes: an M2M gateway executing one or more operations for one or more terminal peripherals according to a transaction trigger condition in policy definition, wherein the one or more operations for the one or more terminal peripherals are one or more operations corresponding to the transaction trigger condition in the policy definition. The solution solves the technical problem in the related art that it is impossible to implement control for one or more terminal peripherals through the M2M gateway according to the policy definition, which implements policy control of one or more terminal peripherals through the M2M gateway and improves the intelligent degree of an M2M system. | 2015-09-10 |
20150254191 | Software Enabled Network Storage Accelerator (SENSA) - Embedded Buffer for Internal Data Transactions - An apparatus and method of bypassing server DRAM by redirecting internal data transactions to an embedded buffer provides an innovative implementation for intermediate storage for internal transactions, providing transparent functionality with improved performance as compared to conventional solutions. Transaction throughput is improved at least in part by avoiding using conventional DRAM, thus eliminating conventional bottlenecks in DRAM intermediate storage. The current embodiment is particularly useful in sending and receiving data blocks between disk storage and network connections. | 2015-09-10 |
20150254192 | Local Internal Discovery and Configuration of Individually Selected and Jointly Selected Devices - A memory controller ( | 2015-09-10 |
20150254193 | APPARATUS, SYSTEM, AND METHOD FOR ALLOWING USB DEVICES TO COMMUNICATE OVER A NETWORK - One feature pertains to an apparatus includes a universal serial bus (USB) communication interface that communicates with at least one USB peripheral device through a USB cable connection. The apparatus also includes a network communication interface that communicates with a communication network. The apparatus also includes a processing circuit that receives USB communication signals from the USB peripheral device, generates network data packets that include USB data based on the USB communication signals, and transmits the network data packets to a receiving device associated with a USB host device through the communication network. The apparatus also serves as a proxy USB host device to the USB peripheral device. The processing circuit may also transmit polling messages to the USB peripheral device at substantially regular time intervals, and receive the USB communication signals from the USB peripheral device in response to the polling messages. | 2015-09-10 |
20150254194 | POLLING DETERMINATION - Techniques for polling an input/output (I/O) device are described herein. The techniques include polling a device for data from the I/O device, and receiving the data from the I/O device at the host device as a result of the polling. The techniques include determining whether the data received is the same as data received at a previous polling of the I/O device. Upon determining the data received is the same, the techniques include decreasing the polling rate if the data is the same, and if it is not the same. Upon determining the data is not the same, the techniques include increasing the polling rate if the data is not the same. | 2015-09-10 |
20150254195 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION - A method and apparatus for communication over a wireless medium is provided. The method includes transmitting a signal over the wireless medium, the signal including at least one frame formatted for interpretation by a first device and a second device; and interrupting a transmission function of at least one of the first device and the second device based on an interpretation of the at least one frame. | 2015-09-10 |