39th week of 2017 patent applcation highlights part 44 |
Patent application number | Title | Published |
20170277541 | MECHANISM FOR USING A RESERVATION STATION AS A SCRATCH REGISTER - A processor core includes an instruction-sequencing unit (ISU). The ISU includes a general register file (GRF) composed of multiple hardware general purpose registers (GPRs), an exception register (XER), and a reservation station (RS). The execution unit(s) load an address of data in a data GPR, and load a first portion of the data in a first data GPR and a second portion of the data in a second data GPR in the GRF, where loading the portions of the data generate intermediate data condition codes that are loaded in the XER. The execution unit(s) generate a cumulative data condition code, which is loaded into a history buffer within the ISU. The intermediate data condition codes are loaded into a reservation station (RS) within the ISU. Upon flushing the GRF and the XER, the ISU repopulates the GRF from a history buffer and the XER from the RS. | 2017-09-28 |
20170277542 | OPERATION OF A MULTI-SLICE PROCESSOR WITH AN EXPANDED MERGE FETCHING QUEUE - Operation of a multi-slice processor that includes a plurality of execution slices and a plurality of load/store slices, where each load/store slice includes a load miss queue and a load reorder queue, includes: receiving, at a load reorder queue, a load instruction requesting data; responsive to the data not being stored in a data cache, determining whether a previous load instruction is pending a fetch of a cache line comprising the data; if the cache line does not comprise the data, allocating an entry for the load instruction in the load miss queue; and if the cache line does comprise the data: merging, in the load reorder queue, the load instruction with an entry for the previous load instruction. | 2017-09-28 |
20170277543 | OPERATION OF A MULTI-SLICE PROCESSOR WITH DYNAMIC CANCELING OF PARTIAL LOADS - Operation of a multi-slice processor that includes a plurality of execution slices and a plurality of load/store slices, where the multi-slice processor is configured to dynamically cancel partial load operations by, among other steps, receiving a load instruction requesting multiple portions of data; receiving a load instruction requesting multiple portions of data; determining that a load of one portion of the requested multiple portions is unavailable to be issued; and responsive to determining that the load of the one portion of the requested multiple portions is unavailable to be issued, delaying issuance of the load instruction. | 2017-09-28 |
20170277544 | Run-Time Code Parallelization with Monitoring of Repetitive Instruction Sequences During Branch Mis-Prediction - A processor includes an execution pipeline and monitoring circuity. The execution pipeline is configured to execute instructions of program code. The monitoring circuity is configured to monitor the instructions in a segment of a repetitive sequence of the instructions so as to construct a specification of register access by the monitored instructions, to parallelize execution of the repetitive sequence based on the corrected specification, and to terminate monitoring of the instructions and discard the specification in response to detecting a branch mis-prediction in the monitored instructions. | 2017-09-28 |
20170277545 | System and Method to Remotely Detect and Report Bootable Physical Disk Location - Methods, devices and systems for identifying storage devices received within a plurality of drive bays, where the devices are identified via a visual indicator associated with each drive bay. A controller identifies storage devices that host booted operating systems. The controller activates the visual indicator associated with drive bays that receive the identified booted storage devices. The visual indicator may be a status light generated by a light source associated with each drive bay. This visual indicator may also be a graphical component of a remote management interface. To identify storage devices with booted operating systems, the controller determines the visual indicators to activate based on information received from a storage controller identifying the storage devices at each bay and an identification of booted drives received from a BIOS. The visual indictors may separately identify booted storage devices and bootable storage devices that are not presently booted. | 2017-09-28 |
20170277546 | METHOD FOR LOADING EXECUTABLE PROGRAM INSTRUCTIONS INTO A CHIP CARD DURING ACTIVE OPERATION - The method includes authenticating a chip card terminal to a chip card by a chip card operating system, verifying the authorisation of the chip card terminal to load executable program instructions by the chip card operating system, storing data in a predefined memory region of the NVM, which data indicate a successful execution of the authentication and the verification, by the chip card operating system, starting the execution of a boot loader by the chip card operating system and interrupting the execution of the chip card operating system following the start of the boot loader, reading the data from the predefined memory region by the boot loader, loading the program instructions from the chip card terminal into the NVM by the boot loader on the precondition that the data indicate the successful authentication and verification in the predefined memory region. | 2017-09-28 |
20170277547 | Method for Presenting Initialization Progress of Hardware in Server, and Server - A method for presenting initialization progress of hardware in a server, and a server where, before a basic input/output system (BIOS) runs to a preset process, an out-of-band central processing unit (CPU) in a hardware system in which a baseboard management controller (BMC) runs establishes a connection to a graphics card using a signal selection switch, the BIOS sends presentation information for representing initialization progress of hardware included in a server to the BMC, and then, the BMC presents the presentation information using the graphics card. Therefore, the presentation information can be always presented in an entire process in which the BIOS initializes the hardware in the server. | 2017-09-28 |
20170277548 | REMOTE OPERATING SYSTEM AND INFORMATION PROCESSING METHOD - An object of the present invention to provide a remote operating system and an information processing method which reduce a burden on a user's operation and suppress a user's erroneous operation. A remote operating system according to the present invention is a remote operating system which includes an operation target device and a remote operating device connected via a network, and in which a first controller causes a display signal interface to output a display signal for displaying a remote operating window corresponding to a selected window, and, when a cursor position is out of a movable area of a cursor, the second controller changes a position of the selected window and the cursor position such that the cursor position comes in the movable area of the cursor while maintaining a relative positional relationship between the position of the selected window and the cursor position. | 2017-09-28 |
20170277549 | Recommending a Transition from Use of a Limited-Functionality Application to a Full-Functionality Application in a Digital Medium Environment - A digital medium environment is described to recommend a transition from use of a limited-functionality application to a full-functionality application. As described herein, the limited-functionality application includes a subset of the functionalities of the full-functionality application. Interactions by a user with a limited-functionality application to generate or edit a creation (e.g., a photo, video, or document) are monitored. Based on the interactions, it is determined that the user needs a functionality for the creation that is not available in the limited-functionality application but is supported by the full-functionality application. A recommendation to transition the creation to the full-functionality application that supports the functionality is displayed. The recommendation may include a selectable control that, when selected, causes the creation to be transitioned to the full-functionality application to enable the functionality to be applied to the creation. | 2017-09-28 |
20170277550 | BEST PERFORMANCE DELIVERY IN HETEROGENEOUS COMPUTING UNIT ENVIRONMENT - An apparatus for selecting an efficient processor includes a comparison module that compares performance characteristics of a plurality of processors available for execution of a function, where each performance characteristic varies as a function of function size. The apparatus includes a selection module that selects, based on a size of the function, a processor from the plurality of processors with a best performance for execution of the function, and an execution module that executes the function on the selected processor. | 2017-09-28 |
20170277551 | INTERCEPTION OF A FUNCTION CALL, SELECTING A FUNCTION FROM AVAILABLE FUNCTIONS AND REROUTING THE FUNCTION CALL - An apparatus for dynamically selecting a function includes an intercept module that intercepts a function call from an executing application. The function call specifies a target function and the target function is associated with a target processor. The apparatus includes a selection module that selects a function from a plurality of available functions to execute the function call, where each available function is associated with a separate processor. The apparatus includes an execution module that reroutes the function call to execute the selected function. | 2017-09-28 |
20170277552 | TRACING METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND INFORMATION PROCESSING APPARATUS - An information processing apparatus includes receiving a read of a class file created using an object-oriented program language, when a class of the class file is a tracing target, performing class transformation to insert a tracing output process into the class file, when the tracing output process is called during execution of a class file having been subjected to the class transformation, generating a first classloader that reads a tracing class file corresponding to the tracing output process, setting an order of priorities in which the first classloader delegates a read of a class in such a manner that a second classloader having read a class of an object to be passed as an argument to the tracing output process has a highest priority, and causing the first classloader to delegate the read of a class to classloaders in a decreasing order of the priorities from the highest-priority classloader. | 2017-09-28 |
20170277553 | ANOMALOUS USAGE OF RESOURCES BY A PROCESS IN A SOFTWARE DEFINED DATA CENTER - The present disclosure is related to systems and methods for analysis of anomalous usage of a resource. An example system can include a plurality of virtual computing instances (VCIs) deployed in a software defined data center and a respective monitoring agent associated with each of the plurality of VCIs. The monitoring agent can be configured to collect information regarding resources used by a plurality of processes running on an associated VCI, maintain a sliding window of top resource users among the plurality of processes, analyze the top resource users among the plurality of processes for anomalous usage of the resources, and take an action in response to the anomalous usage. | 2017-09-28 |
20170277554 | TECHNOLOGIES FOR DYNAMICALLY MANAGING DATA BUS BANDWIDTH USAGE OF VIRTUAL MACHINES IN A NETWORK DEVICE - Technologies for dynamically managing data bus bandwidth usage of virtual machines include a network device that includes a data bus, one or more processors coupled to the data bus, and one or more throttled devices coupled to the data bus. Each throttled device is configured to use no more than an amount of bus bandwidth associated with at least one throttle value assigned to the corresponding throttled device. The network device is to assign functions to virtual machines, determine throttle values for each of the throttled devices utilized by the virtual machines to perform their assigned functions, and perform the assigned functions subject to the determined throttle values. Other embodiments are described and claimed. | 2017-09-28 |
20170277555 | EFFICIENT VM MIGRATION ACROSS CLOUD USING CATALOG AWARE COMPRESSION - Techniques for migrating a VM in a hybrid cloud computing system are provided. The techniques include identifying a similar VM at the destination, comparing dictionaries for the VM to be transmitted and the similar VM, and compressing the VM based on the comparison. After transmitting the compressed VM, the destination decompresses the VM using the dictionary of the similar VM. Dictionaries associate chunks of VM data with hashes of those chunks. This allows replacement of chunks with the hashes, thereby compressing the VM for transmission. | 2017-09-28 |
20170277556 | Distribution system, computer, and arrangement method for virtual machine - In a distribution system including a plurality of physical machines, when an output file output by first processing performs multistage processing input to second processing, a physical machine which is a deployment destination of a first virtual machine for performing the first processing, a physical machine which is a storage destination of each data block included in the output file, and a physical machine which is a deployment destination of a second virtual machine for performing the second processing are determined based on relationship between the first and second processing. | 2017-09-28 |
20170277557 | ARCHITECTURE OF NETWORKS WITH MIDDLEBOXES - Some embodiments provide a system for implementing a logical network that includes a set of end machines, a first logical middlebox, and a second logical middlebox connected by a set of logical forwarding elements. The system includes a set of nodes. Each of several nodes includes (i) a virtual machine for implementing an end machine of the logical network, (ii) a managed switching element for implementing the set of logical forwarding elements of the logical network, and (iii) a middlebox element for implementing the first logical middlebox of the logical network. The system includes a physical middlebox appliance for implementing the second logical middlebox. | 2017-09-28 |
20170277558 | SOFTWARE APPLICATION PLACEMENT USING COMPUTING RESOURCE CONTAINERS - Embodiments associate software applications with computing resource containers based on a placement rule and a selected failure correlation. A placement rule indicates that a first software application is to be co-located with a second software application during execution of the first and second software applications. The placement rule also indicates that the first software application is to be separated from the second software application during execution of the first and second software applications. Failure correlations are determined for a plurality of computing resources associated with the first software application. A computing resource with a lowest failure correlation is selected from the plurality of computing resources, and the second software application is associated with the selected computing resource despite the association violating the placement rule. | 2017-09-28 |
20170277559 | CLASSIFYING WORK PROCESSES - A system and method for classifying tasks are described. A server receives first sensor data from an augmented reality (AR) device and second sensor data from a first machine detected by the AR device. The first and second sensor data are related to a user of the AR device operating the first machine. The server identifies a task of the user based on the first and second sensor data. A task result of the user of the AR device operating the first machine is determined. The server accesses task patterns and corresponding levels of difficulty related to the first machine and determines a difficulty of the task based on a comparison of the task, the task result, and the task patterns and corresponding levels of difficulty. The AR application generates AR content based on the task and the difficulty of the task. | 2017-09-28 |
20170277560 | Efficient State Machines for Real-Time Dataflow Programming - An efficient state-machine-based pattern matching technique processes tokens in an input queue and identifies patterns in the sequence of tokens that match one or more predetermined input patterns without backtracking. Tokens can include data or no data and a time component. The tokens can be a stream of data generated by a sensor, which transforms a physical property into a digital quantity. The pattern matching technique processes the input queue in a single direction, and does not examine any previously examined token. In an implementation, specific patterns to be matched are specified using a state machine, where the state machine is specified in a state table and operates using a state stack. | 2017-09-28 |
20170277561 | Operating System Hot-Switching Method and Apparatus and Mobile Terminal - An operating system hot-switching method, applied to a mobile terminal running multiple operating systems, where the multiple operating systems include one foreground operating system and at least one background operating system, a current foreground operating system is a first operating system. The method includes obtaining an operating system switching instruction, where the operating system switching instruction includes an identifier of the second operating system and a switching identifier, releasing, according to the switching identifier, a hardware resource occupied by the first operating system, and switching the foreground operating system from the first operating system to the second operating system. Hence, the operating system hot-switching method ensures, to some extent, mutually exclusive access to and coordinated use of a hardware resource by multiple operating systems, thereby ensuring use reliability of the hardware resource after switching of an operating system. | 2017-09-28 |
20170277562 | THREADSAFE USE OF NON-THREADSAFE LIBRARIES WITH MULTI-THREADED PROCESSES - An apparatus includes a processor and a storage storing instructions causing the processor to determine whether an analysis routine is multi-threaded and calls a library function of a non-threadsafe library, and if so, causes the processor to: instantiate an analysis process for executing the analysis routine on multiple threads; instantiate an instance of the library for execution within a isolated library process; instantiate another instance of the library for execution within another isolated library process; retrieve library metadata providing a function prototype of the library function; employ the function prototype to generate an instance of a bridge routine to enable a call from the analysis routine on a first thread to the library function; employ the function prototype to generate another instance of the bridge routine to enable a call from the analysis routine on a second thread to the library function; and begin execution of the analysis routine. | 2017-09-28 |
20170277563 | CONTROL METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND CONTROL DEVICE - A control method executed by a control device, the control method including identifying a specified time period based on execution history information on previous jobs related to the plurality of systems, the specified time period being a period prior to execution start timing of a first job, update processing for a data storage area from which the first job refers to data is not executed during the specified time period, performing control so that evaluation timing of an amount of the data that the first job refers to from the data storage area is included in the identified time period, determining a specified system among from the plurality of systems based on the amount of the data evaluated at the evaluation timing, and causing the specified system to execute the first job. | 2017-09-28 |
20170277564 | Thermal-And Spatial-Aware Task Scheduling - A method, apparatus, and computer program product are provided for thermal- and spatial-aware task scheduling. The method may include monitoring a temperature for each core of a central processing unit having a plurality of cores; determining, from the monitoring, a set of hotspot cores from the plurality of cores determining temperature information and distance information for each hotspot core in the set of hotspot cores relative to each of the other cores on the central processing unit; calculating a placement metric for each core of the central processing unit based at least on the determined distance information and the determined temperature information; and scheduling a task by allocating the task to one or more cores of the central processing unit according to the placement metric. | 2017-09-28 |
20170277565 | EVENT-DRIVEN SYSTEM AND METHOD FOR SELECTIVELY PERFORMING COMPUTATIONS - An event-driven system, method and computer program product are provided to selectively generate events in response to receipt of data elements. The event-driven system includes processing circuitry configured to identify, in response to receipt of one or more data elements, an event that is impacted by the one or more data elements. The processing circuitry is also configured to determine whether at least a threshold number of consumers are currently listening for the event. In an instance in which at least a threshold number of consumers are currently listening for the event, the processing circuitry is configured to perform one or more computations based upon the one or more data elements to generate the event. Otherwise, however, the processing circuitry is configured to at least defer the one or more computations that would be performed upon the one or more data elements to generate the event. | 2017-09-28 |
20170277566 | SOFTWARE COMPONENT ASSIGNING SYSTEM FOR VEHICLE - A software component assigning system for a vehicle includes electronic control units connected to a common network in the vehicle, one of the electronic control units being an integrated control electronic control unit which is configured to: acquire a first rank value of each of the electronic control units, the first rank value becoming higher as a probability of occurrence of a malfunction is higher; acquire a second rank value of an additional software component that is additionally arranged in any one of the electronic control units, the second rank value becoming higher as a level of importance; and decide an electronic control unit to arrange the additional software component from among the electronic control units such that the additional software component is arranged in the electronic control unit of which the first rank value is lower as the second rank value of the additional software component is higher. | 2017-09-28 |
20170277567 | EFFICIENT WORK EXECUTION IN A PARALLEL COMPUTING SYSTEM - A computing device performs parallel computations using a set of thread processing units and a memory shuffle engine. The memory shuffle engine includes a register array to store an array of data elements retrieved from a memory buffer, and an array of input selectors. According to a first control signal, each input selector transfers at least a first data element from a corresponding subset of the register array, which is coupled to the input selector via input lines, to one or more corresponding thread processing units. According to a second control signal, each input selector transfers at least a second data element from another subset of the register array, which is coupled to another input selector via other input lines, to the one or more corresponding thread processing units. | 2017-09-28 |
20170277568 | ALLOCATING RESOURCES AMONG TASKS UNDER UNCERTAINTY - A model is built of benefit of each of a plurality of computing tasks under uncertainty as a function of computing resources invested in each of the computing tasks, and a model of risk is built of each of the computing tasks under uncertainty as a function of the computing resources invested in each of the computing tasks. Risk of a task allocation is calculated with the risk model, and benefit of a task allocation is calculated with the benefit model. An allocation of the computing resources is found to increase the benefit and manage the risk. The allocation of computing resources is applied to the computing tasks. | 2017-09-28 |
20170277569 | System and Method for Routing Computing Workloads based on Proximity - A system and method are provided for routing workloads in an information technology infrastructure using models of same. The method includes determining at least one proximity group of workloads; determining at least one proximity zone in the infrastructure for routing each proximity group; and determining a workload routing solution subject to one or more constraints defined by one or more proximity based rules. | 2017-09-28 |
20170277570 | COORDINATING MULTIPLE SECURITY COMPONENTS - A system and method for coordinating security components, including: determining, by an application executing on a client device, a need to perform a sharable functional task; identifying a first security component and a second security component installed on the client device and capable of performing variations of the sharable functional task, where variations of the sharable functional task are functionally overlapping and not identical; identifying a set of characteristics characterizing the first security component and the second security component; selecting the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics; delegating, by one or more processors, performance of the sharable functional task to the primary security component; and instructing the processors to cause functionality associated with the first security component to be at least partially suspended. | 2017-09-28 |
20170277571 | MULTI-CORE PROCESSOR AND METHOD OF CONTROLLING THE SAME - A method of controlling a multi-core processor includes allocating at least one core of the multi-core processor to at least one process for execution; generating a translation table with respect to the at least one process to translate a logical ID of the at least one core allocated to the at least one process to a physical ID; and controlling the at least one process based on the translation table generated with respect to the at least one process. | 2017-09-28 |
20170277572 | MIGRATION OF NETWORK ENTITIES TO A CLOUD INFRASTRUCTURE - A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (SLA) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an SLA for each node of the migration group with a provider of the cloud computing infrastructure in view of SLA information from the corresponding migration configuration file. | 2017-09-28 |
20170277573 | MULTIFUNCTION OPTION VIRTUALIZATION FOR SINGLE ROOT I/O VIRTUALIZATION - Methods and systems for supporting multifunction virtualization within SR-IOV in a multi-partition virtualization system are described. One method includes instantiating a physical function of an I/O interface device within an interconnect partition of a multi-partition virtualization system implemented at least in part on the computing device, and instantiating a plurality of virtual functions within a guest partition of the multi-partition virtualization system, each of the plurality of virtual functions associated with a physical function. The method includes assigning a bus identifier, a device identifier, and a function identifier to each of the plurality of virtual functions, the plurality of virtual functions including a first virtual function associated with a first bus identifier and a first device identifier and a second virtual function associated with the first bus identifier and the first device identifier. | 2017-09-28 |
20170277574 | INFORMATION PROCESSING DEVICE AND COOPERATIVE DISTRIBUTED STORAGE SYSTEM - In a network system that a plurality of information processing devices are connected via a network, an information processing device includes an information dividing part configured to generate a plurality of divided information by dividing user information, a state information acquisition part configured to acquire state information of the network system, and a destination determination part configured to determine a plurality of destinations fir storing a plurality of divided information distributed thereto in response to variations of the state information. The destination determination part determines destinations based on network communication speed, physical distances between information processing devices, authentication methods applied to information processing devices, or free spaces of storage units of information processing devices. The information dividing part generates a plurality of divided information by dividing user information by predetermined data sizes or by categories. | 2017-09-28 |
20170277575 | VIRTUAL DATA CENTER RESOURCE MAPPING METHOD AND DEVICE - A virtual data center resource mapping method and device. The method includes: S | 2017-09-28 |
20170277576 | MITIGATING LOAD IMBALANCES THROUGH HIERARCHICAL PERFORMANCE BALANCING - Systems, apparatuses and methods may provide for obtaining, by a system level reallocator in a plurality of reallocators arranged in a hierarchical tree, resource budget information. Additionally, application performance information may be obtained by at least one of the plurality of reallocators. Moreover, a performance imbalance between a plurality of compute subtrees associate with the application performance information may be reduced by the at least one of the plurality of reallocators and based at least in part on the resource budget information and the application performance information. | 2017-09-28 |
20170277577 | Navigation Application Programming Interface - Navigation application programming interfaces that can be used to embed navigation services in software applications are provided. In one embodiment, the application programming interface includes a first set of instructions specifying one or more first parameters to control the implementation of a navigation service by the software application. The navigation service provides navigation information to a user of the software application. The application programming interface further includes a second set of instructions specifying one or more second parameters to control interaction with a routing engine via the application programming interface to obtain the navigation information. The first set of instructions specify one or more configurable event listener interfaces. The configurable event listener interfaces can be operable to obtain data associated with one or more navigation events to update the navigation information provided as part of the navigation service. | 2017-09-28 |
20170277578 | Navigation Application Programming Interface to Accommodate Multiple Waypoint Routing - Navigation application programming interfaces that can be used to embed navigation services in software applications are provided. In one embodiment, the application programming interface includes a first set of instructions specifying one or more first parameters to control the implementation of a navigation service by the software application. The navigation service can provide navigation information to a user of the software application. The application programming interface can include a second set of instructions specifying one or more second parameters to control interaction with a navigation engine provided by the navigation data provider via the application programming interface. The application programming interface can further include a waypoint function specified as part of the first instructions operable to set a plurality of waypoints for a navigation route. The application programming interface can be operable to receive a multi-waypoint navigation route determined based on the plurality of waypoints. | 2017-09-28 |
20170277579 | ANNOTATION APPARATUS, ANNOTATION METHOD, AND ANNOTATION PROGRAM - An annotation apparatus includes an annotation DB, a screen state acquisition monitor unit, and an external collaboration program call unit. The annotation DB stores therein an annotation object and an annotation rule applicable to each of windows of the annotation object in an associated manner. The screen state acquisition monitor unit identifies an active window from among the windows. The external collaboration program call unit calls, when an annotation rule associated with the active window that has been identified by the screen state acquisition monitor unit is present in the annotation DB and when the annotation object is selected, an external program in accordance with the annotation rule. | 2017-09-28 |
20170277580 | HARDWARE-LOCKED ENCRYPTED BACKUP - A hardware-locked encrypted backup (HWLE-BU) that is locked to a single hardware device using the device's unique hardware identity, based on a Physically-Unclonable Function (PUF) or other suitable means providing a unique hardware identity. The HWLE-BU is bound to a specific hardware identity such that only the physical device that created the HWLE-BU can decrypt it, i.e., restoring HWLE-BU data requires utilizing the same physical hardware device in the decryption process. | 2017-09-28 |
20170277581 | APPARATUS AND METHODS FOR DEBUGGING ON A MEMORY DEVICE - The present disclosure includes apparatus and methods for debugging on a memory device. An example apparatus comprises a memory device having an array of memory cells and sensing circuitry coupled to the array. The sensing circuitry includes a sense amplifier and a compute component configured to perform logical operations on the memory device. A controller is coupled to the array and sensing circuitry and configured to cause the memory device to store debugging code in the array of memory cells and execute instructions to perform logical operations using the sensing circuitry. The controller is further configured to receive an indication in the executing instructions to halt a logical operation, and to execute the debugging code on the memory device. | 2017-09-28 |
20170277582 | IDENTIFICATION OF DISTINGUISHABLE ANOMALIES EXTRACTED FROM REAL TIME DATA STREAMS - A big data processing system includes a workload trimming function that separates out from among a set of identified anomalies, those that are clearly outliers, rather than ones residing within clusters of anomalies as mapped within an anomalies distribution space. The outlier anomalies are not subjected to a computationally-intensive anomalies aggregating process and thus, processing resources are conserved. | 2017-09-28 |
20170277583 | SYSTEM AND METHOD FOR CLASSIFYING DEFECTS OCCURRING IN A SOFTWARE ENVIRONMENT - System and method for classifying defects occurring in a software environment are disclosed. In one embodiment, the method comprises receiving defect data from at least one data source. The defect data comprises the defects occurring in the software environment. The method further comprises receiving current data and historical data pertaining to the software environment from a current environment database and a historical environment database. The method further comprises analyzing the defect data based on the current data, the historical data, and one or more rules to determine at least one root cause causing the defects in the software environment. The method further comprises classifying each of the defects into one or more categories based on the at least one root cause. | 2017-09-28 |
20170277584 | SEMICONDUCTOR DEVICE - A semiconductor device includes a first timer that includes a first counter, a second timer that includes a second counter and a controller that includes a CPU in provision of a technology for efficiently diagnosing a fault of a timer that is built in the semiconductor device such as a microcontroller and so forth. The first timer performs time synchronization with the time of external equipment arranged outside the semiconductor device. The controller compares a count value of the first counter with a count value of the second counter and detects a malfunction of the second timer on the basis of a result of comparison. | 2017-09-28 |
20170277585 | CIRCUIT DEVICE, PHYSICAL QUANTITY DETECTION DEVICE, OSCILLATOR, ELECTRONIC APPARATUS, VEHICLE, AND METHOD OF DETECTING FAILURE OF MASTER CLOCK SIGNAL - A circuit device includes a control circuit that operates on the basis of a master clock signal, and an interface circuit that includes a register unit and transmits data on the basis of an external clock signal which is input from an external device. In addition, the register unit takes up error information of the master clock signal on the basis of the external clock signal and stores the taken-up error information. The interface circuit transmits the data, including the error information stored in the register unit. | 2017-09-28 |
20170277586 | SEMICONDUCTOR APPARATUS AND DISPLAY APPARATUS - According to an aspect, a semiconductor apparatus includes semiconductor devices. Each semiconductor device includes: a state monitor that monitors a plurality of functions implemented by the semiconductor device, and outputs state monitoring signals; and an anomaly determination circuit that performs anomaly determination based on the state monitoring signals. When the anomaly determination circuit of a first semiconductor device detects that one or more of the functions of the semiconductor devices are abnormal based on a first anomaly determination result and a second anomaly determination result, the anomaly determination circuit of the first semiconductor device outputs an anomaly detection signal to the semiconductor devices. The first anomaly determination result is a result of the anomaly determination performed on the functions of the first semiconductor device, and the second anomaly determination result is a result of the anomaly determination performed on the functions of a second semiconductor device. | 2017-09-28 |
20170277587 | COMPUTER SYSTEM AND MEMORY DUMP METHOD - A computer system, having: a physical computer, which includes a processor and a memory; and an external apparatus, which is coupled to the physical computer and which includes a storage apparatus, the physical computer further includes: a virtualization module for providing at least one virtual machine; a first failure monitoring module for detecting a failure in the physical computer and the virtualization module; a first memory dump module for copying, to the external apparatus, a first area in the memory which is allocated to the virtualization module; a second failure monitoring module for detecting a failure in the virtual machine; and a second memory dump module for copying, to the external apparatus, a second area in the memory which is allocated by the virtualization module to the virtual machine. | 2017-09-28 |
20170277588 | DATA STORAGE DEVICE AND OPERATING METHOD THEREOF - A data storage device includes a nonvolatile memory device; a randomizing unit configured to randomize data to be stored in the nonvolatile memory device and derandomize data read from the nonvolatile memory device, by using seed values; and a control unit configured to, in the case where return is made from a power failure state to a normal state, detect a page of the nonvolatile memory device in which a power problem has occurred, and randomize data of the page in which the power problem has occurred, by using a seed value that is different from a seed value corresponding to the page in which the power problem has occurred, through the randomizing unit. | 2017-09-28 |
20170277589 | NON-VOLATILE MEMORY APPARATUS AND EMPTY PAGE DETECTION METHOD THEREOF - A non-volatile memory (NVM) apparatus and an empty page detection method thereof are provided. The NVM apparatus includes a NVM and a controller. The controller reads the content of a memory page of the NVM. The controller performs Low Density Parity Check (LDPC) decoding for at least one codeword of the memory page to obtain a decoded codeword and a check-result vector. The controller determines that the memory page is not an empty page when the LDPC decoding for the codeword is successful. The controller counts an amount of the bits being 1 (or 0) in the check-result vector when the LDPC decoding for the codeword is fail. Based on the amount of the bits being 1 (or 0) in the check-result vector, the controller determines whether the memory page is an empty page. | 2017-09-28 |
20170277590 | METHODS AND APPARATUS TO ASSIGN INDICES AND RELOCATE OBJECT FRAGMENTS IN DISTRIBUTED STORAGE SYSTEMS - Methods and apparatus to dynamically assign and relocate object fragments in distributed storage systems are disclosed. In some examples, the methods and apparatus encode an object with error correction coding to separate the object into fragments, create a first index indicative of storage nodes where the fragments of the object are to be stored, encode a second index into identifiers of the fragments of the object, the second index based on the first index, and store the fragments of the object and the corresponding second index encoded identifiers in the storage nodes based on the first index. | 2017-09-28 |
20170277591 | INDIRECTION DATA STRUCTURES TO MANAGE FILE SYSTEM METADATA - Described herein are systems, methods, and software to manage metadata in a data storage device. In one example, a data storage device includes a first storage zone, a shingled magnetic recording (SMR) zone, and a storage control system. The storage control system is configured to maintain metadata in a metadata location of the first storage zone for user data in the SMR zone. The storage control system is further configured to, responsive to a usage condition being satisfied for the metadata in the metadata location, identify metadata locations in the SMR zone to redirect and store the metadata. The storage control system is also configured to maintain an indirection data structure in the metadata location of the first zone that correlates the metadata locations in the SMR zone to the metadata. | 2017-09-28 |
20170277592 | INCREMENTAL DATA CONVERSION USING A SYNCRONIZATION INFORMATION RECORD - In one embodiment, techniques are provided for converting data items of a source repository that maintains a CAD description according to a first storage format to data items of an output repository that maintains the CAD description according to a second storage format. A converter gathers data items of the source repository and compares current condition information for them with condition information as of a last successful conversion maintained by a synchronization information record separate from the source repository. The converter determines one or more new or changed data items in the source repository since the last successful conversion, converts new or changed data items to the second storage format of the output repository, and stores them in the output repository, while skipping any unchanged data items. The converter further updates the synchronization information record to include the current condition information for data items in the source repository. | 2017-09-28 |
20170277593 | POWER-DOWN INTERRUPT OF NONVOLATILE DUAL IN-LINE MEMORY SYSTEM - A nonvolatile memory module includes volatile memory devices; a nonvolatile memory device; and a controller suitable for backing up data stored in the volatile memory devices or restoring data backed up in the nonvolatile memory device, according to a fail/recovery of power of the host, the controller including a power-down interrupt logic which interrupts a backup operation when the power of the host is recovered while performing the backup operation, the power-down interrupt logic including: a logic which determines whether sufficient erased blocks exist in the nonvolatile memory device; a logic which erases a new block when the sufficient erased bocks do not exist; and an interrupt backup logic which backs up a volatile memory device having data corresponding to the erased block, when a fail in the power of the host is detected or a backup operation is instructed from the host. | 2017-09-28 |
20170277594 | NONVOLATILE DUAL IN-LINE MEMORY MODULE AND METHOD FOR OPERATING THE SAME - A nonvolatile memory module includes a plurality of volatile memory devices sharing a data bus through which data is transmitted and a control bus through which a command and an address are transmitted; at least one nonvolatile memory device; and a controller including a backup logic which backs up data stored in the plurality of volatile memory devices when a fail in power of the host is detected or a backup operation is instructed from the memory controller of the host, wherein the backup logic sets a command address latency (CAL) of one among the plurality of volatile memory devices to a first value, and sets a command address latency of remaining volatile memory devices to a second value different from the first value. | 2017-09-28 |
20170277595 | UNIFIED PROTECTION OF CLUSTER SUITE - Techniques to back up data associated with a cluster environment are disclosed. In various embodiments, an indication is received to back up data associated with the cluster. A backup configuration data associated with the cluster is used to back up, in a unified backup operation, one or more save sets associated with virtual resources associated with the cluster and one or more saves sets associated with physical nodes associated with the cluster, including by storing each respective save set in a manner that associates the save set with a virtual or physical node comprising the cluster suite. | 2017-09-28 |
20170277596 | MULTIPLE RETENTION PERIOD BASED REPRESENTATONS OF A DATASET BACKUP - A storage tier manager creates different representations of a dataset backup for different retention periods. Each of the representations of the dataset backup is distinctly identifiable despite initially representing a same dataset backup. The representations are structured metadata corresponding to the dataset backup. One representation is a cached backup version of the dataset backup (“cached backup” or “cached representation”) provided for low latency access while residing at a storage tier of the backup appliance for a relatively short retention period according to a lifecycle management policy. The other representation is a cloud backup version of the dataset backup (“cloud backup” or “cloud representation”) provided for persisting into cloud storage for a longer retention period according to the lifecycle management policy. | 2017-09-28 |
20170277597 | EFFICIENT CREATION OF MULTIPLE RETENTION PERIOD BASED REPRESENTATIONS OF A DATASET BACKUP - A storage tier manager efficiently creates different representations of a dataset backup for different retention periods. Each of the representations of the dataset backup is distinctly identifiable despite initially representing a same dataset backup. The representations are structured metadata corresponding to the dataset backup. One representation is a cached backup version of the dataset backup (“cached backup” or “cached representation”) provided for low latency access while residing at a storage tier of the backup appliance for a relatively short retention period according to a lifecycle management policy. The other representation is a cloud backup version of the dataset backup (“cloud backup” or “cloud representation”) provided for persisting into cloud storage for a longer retention period according to the lifecycle management policy. | 2017-09-28 |
20170277598 | APPLICATION AWARE EXPORT TO OBJECT STORAGE OF LOW-REFERENCE DATA IN DEDUPLICATION REPOSITORIES - Various embodiments for managing data in a data deduplication repository in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises migrating certain deduplication repository data from a host to an object storage by integrating a data offload process with an existing backup management application, for reducing unnecessary deduplication repository data stored on the host. | 2017-09-28 |
20170277599 | DATA BOUNDARY IDENTIFICATION FOR IDENTIFYING VARIABLE SIZE DATA CHUNKS - A system and method obtain a set of data and identify successive subsets of data within the set of data. A boundary identifying hash is calculated on a subset of data and compared with a boundary indicating value. If the calculated boundary identifying hash matches the boundary indicating value, a natural boundary is identified in the set of data. | 2017-09-28 |
20170277600 | STORAGE SYSTEM - A primary storage system is equipped with a local storage subsystem having a mirror volume of a volume in a primary storage subsystem, and a remote storage subsystem having a mirror volume of the volume in the primary storage subsystem at a secondary site. When storing a write data from a host to a volume, the primary storage subsystem determines an SEQ# to be stored in a journal corresponding to the write request, creates a journal including the relevant SEQ# and a replica of the write data, and transmits the relevant SEQ# to the local storage subsystem, which creates a journal including the relevant SEQ# and stores it in its own journal volume. But when creation of the journal including the relevant SEQ# is stopped, the local storage subsystem creates a dummy journal including the relevant SEQ# but not including the write data. | 2017-09-28 |
20170277601 | POINT-IN-TIME COPY RESTORE - Managing storage volumes in a point-in-time copy cascade. The cascade includes a first source volume, a first target volume and a second target volume. The method detects a corruption of the first source volume and, if a first restoration of the first source volume from the first target volume is in progress, creates a third target volume from the second target volume and directs I/O operations for the first source volume to the third target volume. The first source volume is then restored from the third target volume. | 2017-09-28 |
20170277602 | CATALOGING METADATA FOR REPLICATION MANAGEMENT AND RECOVERY - A method and system for managing backup storage of file system entities. In an aspect, a file system catalog includes a database populator tool that generates records within a metadata table that may be maintained within a database. In response to detecting a replication cycle, the populator tool reads a stream of replication operations. For each of the replication operations, the populator tool determines the type of operation and in response to determining that a directory inode is an operand of the replication operation, the tool generates one or more catalog records. Each of the generated records includes and logically associates data entries corresponding to an inode number, a parent inode number, an entity type, a point-in-time-image (PTI) ID, an absolute path, and an operation. | 2017-09-28 |
20170277603 | DATA SAVING METHOD, DEVICE AND TERMINAL - A data saving method and device and a terminal are provided. In the data saving method, power failure of a power supply is detected (S | 2017-09-28 |
20170277604 | ARCHITECTURE AND APPARATUS FOR ADVANCED ARBITRATION IN EMBEDDED CONTROLS - A method of arbitrating conflicting outputs in a redundant control system. Execution data of a task executed by each controller in the redundant control system is recorded. The execution data includes an initial timestamp of each execution stream, identification of critical functions in each execution stream, and parameter values used by the critical functions. A path executed by each controller is identified based only on the critical functions executed for each execution stream. The recorded execution data of each executed path is applied to an arbitration module. An output result from one of the respective controllers selecting, by an arbitration module, based on the recorded execution data of each executed path. The output result of the selected controller is communicated to a next module for further processing. | 2017-09-28 |
20170277605 | POWER FAIL CIRCUIT FOR MULTI-STORAGE-DEVICE ARRAYS - Some embodiments include a multi-storage-device array (e.g., a SSD tray, a SSD sled or a SSD rack) having multiple drives (e.g., solid-state drives). The multi-storage-device array can have an enclosure around the drives, a processor and a network interface, and implement a power failure management circuit. The power failure management circuit can include an electric probe that detects a power failure. Upon detecting the power failure, the power failure management circuit sends an interrupt signal to a drive controller to flush data in volatile-memory (e.g., write cache, firmware cache, look-up table cache, or other random access memory) into non-volatile memory (e.g., flash memory). The power failure management circuit can include a system-level holdup energy storage that retains power after power failure to support flushing of the data from the volatile memory during the power failure. | 2017-09-28 |
20170277606 | SEMICONDUCTOR SYSTEM INCLUDING REPLACEMENT STORAGE UNIT - A semiconductor system includes one or more core chips including a plurality of memory banks; one or more replacement storage units; and a base chip suitable for: first detecting a memory bank having an access frequency that satisfies a first condition, second detecting whether an utilization rate of the first detected memory bank satisfies a second condition, and replacing the second detected memory bank with one among the replacement storage units. | 2017-09-28 |
20170277607 | FAULT-TOLERANCE PATTERN AND SWITCHING PROTOCOL FOR MULTIPLE HOT AND COLD STANDBY REDUNDANCIES - A method for fault tolerant controller readiness. Executing functions by a first controller operating in a primary status mode. Operating in a hot standby status mode by a second controller and mirroring the first controller by executing functions to operate as a redundant controller. Operating in a cold standby status mode by at least one backup controller under normal operating conditions. The second controller is reconfigured while operating under normal operating conditions from the hot standby status mode to the primary standby status mode if a failure occurs in the first controller. Reconfiguring the at least one backup controller operating under normal operating conditions from cold standby status mode to hot standby status mode to operate as a redundant controller in response to the reconfiguring the second controller from the hot standby status mode to the primary status mode. | 2017-09-28 |
20170277608 | STORAGE CONTROL OF STORAGE MEDIA SUBJECT TO WRITE AMPLIFICATION EFFECTS - According to one aspect of the present invention, there is provided a method for performing storage control. Member storage media and a hot spare storage medium are identified in a storage system. The member storage media are members of a storage medium array, and the hot spare storage medium is for joining in the storage medium array when a member storage medium fails. Data on a member storage medium having a write amplification effect is migrated to the hot spare storage medium. In the member storage medium having a write amplification effect, an erase operation is performed on a storage medium where the migrated data is located. Embodiments of the present invention can alleviate adverse impact caused by a write amplification effect. | 2017-09-28 |
20170277609 | DEFERRED, BULK MAINTENANCE IN A DISTRIBUTED STORAGE SYSTEM - Failed capacity of a distributed storage system is determined. The distributed storage system includes a plurality of storage nodes, wherein the plurality of storage nodes include at least one storage device to store data objects, wherein the data objects have been divided into constituent fragments in the distributed storage system. Protection capacity of the distributed storage system is determined. Protection capacity includes the data fragments generated to allow the data objects to be rebuilt in response to at least a part of the data objects being either lost or corrupted. A probability is determined that the failed capacity overlaps with the used capacity of the distributed storage system prior to a next periodically scheduled maintenance of the distributed storage system. In response to the probability exceeding a risk threshold, a next maintenance of the distributed storage system is scheduled that comprises reducing the failed capacity. | 2017-09-28 |
20170277610 | SYSTEM AND METHOD OF DATA ALLOCATION PROVIDING INCREASED RELIABILITY OF STORAGE - A system and method is disclosed for storing a block of data in a distributed data-storage system. An example method includes identifying a list of a plurality of disks in the distributed data-storage system, randomly selecting a disk from the list of the plurality of disks and adding the selected disk to a subset of disks allocated for a copyset, and continuously performing the step of randomly selecting the disk and adding the disk to the subset of disks until the copyset contains a predetermined amount of allocated disks from the distributed data-storage system. Furthermore, this process is repeated to perform a plurality of copysets. Once the copysets are defined, the method further includes dividing the block of data into a number of data chunks equal to the predetermined amount of allocated disks, and, distributing the data chunks onto disks of one of the plurality of the copysets. | 2017-09-28 |
20170277611 | OPTIMIZING STANDBY DATABASE MEMORY FOR POST FAILOVER OPERATION - A current minimum memory requirement for each memory consumer of one or more memory consumers of a primary database system is received. A current memory allocation for a standby database system is received. A set of benefit-to-cost metrics is received. A benefit-to-cost metric is a measure of whether each memory consumer would benefit or would not benefit from additional memory. The set of benefit-to-cost metrics is applied to the standby database system to define an upper bound memory allocation of the standby database system to function in the event of a failover from the primary database system. A scaling factor is determined. In response to receiving an indication of a failover of the primary database system to the standby database system, a ramp up of the standby database system is monitored. The ramp up of the standby database system uses the set of benefit-to-cost metrics and the determined scaling factor. | 2017-09-28 |
20170277612 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING AN ANTICIPATED DATA INTEGRITY CHECK - Methods, systems, and computer readable media for providing an anticipated data integrity check are disclosed. According to one method, the method includes generating a test message including an anticipated data integrity check value (ADICV), wherein the ADICV is computed using at least one value based on at least one expected modification to message data in the test message by at least one system under test (SUT), and sending the test message to the at least one SUT. | 2017-09-28 |
20170277613 | MULTIPLE MODE TESTING IN A VECTOR MEMORY RESTRICTED TEST ENVIRONMENT - A method and apparatus for testing an electronic device is provided. The method begins when at least one test setup vector for at least one test to be performed is generated. An actual test vector is then generated. The actual test vector may be generated using test results from testing at least one device of known good quality. A delay time parameter determined by waiting for the test controller to complete the test. After the delay time parameter has been determined, at least one test result is output as a test signature. The test signature and the delay time parameter may used to call the test and provide for counter-based delay independent memory testing. The apparatus includes a test controller and a vector memory in communication with the test controller and at least one clock in communication with the test controller and a power supply. | 2017-09-28 |
20170277614 | INTELLIGENT TEST ROBOT SYSTEM - The present invention provides intelligent test robot system, which operation platform of intelligent robot body connected storage module for storing test script, operation platform respectively connected signal output unit and image input unit, further connected network communication module linked remote console computer. When operation platform automatically performs tests accordance test script, e.g., power switches, string inputs through keyboard, mouse cursor movements, clicks etc., it is possible to send instructions contained test script to test object via signal output unit for action controls, image input unit receives images outputted by test object and returns them to operation platform, then automatic graphic recognitions can be performed on captured images according to image recognition instructions in test script. Moreover, remote console computer may control plural intelligent robot bodies through Internet for synchronously executing automatic test flows so as to facilitate shortened test time and reduced costs thus further elevating the integral production efficiency. | 2017-09-28 |
20170277615 | DYNAMIC RATE ADJUSTMENT FOR INTERACTION MONITORING - Methods and systems for implementing dynamic rate adjustment for interaction monitoring are disclosed. At an entity, the collection of trace information is initiated according to a first sampling rate. The trace information is indicative of interactions between the entity and one or more additional entities. A second sampling rate is determined based at least in part on information external to the entity. The second sampling rate is determined after the collection of the trace information is initiated at the entity according to the first sampling rate. At the entity, the collection of additional trace information is initiated according to the second sampling rate. | 2017-09-28 |
20170277616 | REPLAY-SUITABLE TRACE RECORDING BY SERVICE CONTAINER - Techniques are provided for recording service invocation traffic in a format that is suitable for subsequent replay, perhaps in a different environment. In one technique, a computing device records invocation traffic. The computing device receives a first request that is directed to a first service. In response to receiving the first request, one or more computers store an identifier of the first request into a second request. After storing the identifier into the second request, the computing device causes the second request to be sent to a second service. After causing the second request to be sent to the second service, the computing device receives, from the second service, a response that contains the identifier of the first request. The one or more computers store, in a single record, the first request, the second request, and the response. | 2017-09-28 |
20170277617 | SOURCE CODE ANALYSIS DEVICE, COMPUTER PROGRAM FOR SAME, AND RECORDING MEDIUM THEREOF - The present invention relates to a source code analysis device, a computer program for the same, and a recording medium thereof. Disclosed is a source code analysis device including: a source code analysis module including: a syntax analysis unit for extracting and refining information required for analysis; a defect detection unit for detecting defect information; a correction example generation unit for generating correction example information or notice information or both; and an analysis result transmission unit for constructing synthesized analysis result information and transmitting the constructed information to an analysis result output module, and the analysis result output module including: a defect output unit for extracting and outputting the defect information from the synthesized analysis result information, and a correction example output unit for extracting and outputting the correction example information and or notice information or both from the synthesized analysis result information. | 2017-09-28 |
20170277618 | SYSTEMS AND METHODS FOR COLLECTING ERROR DATA TO TROUBLESHOOT PRODUCT ERRORS - The disclosed computer-implemented method for collecting error data to troubleshoot product errors may include (1) monitoring Internet searches submitted by a user of a computing device to a search engine executing within a browser installed on the computing device, (2) identifying, while monitoring the Internet searches, a search including a description of an error in a product installed on the computing device, (3) in response to identifying the search, automatically enabling debug logging for the product on the computing device, and (4) maintaining an event log including information collected from the debug logging that may be used to diagnose the error. Various other methods, systems, and computer-readable media are also disclosed. | 2017-09-28 |
20170277619 | SYSTEM AND METHOD FOR DEBUGGING ROBOT BASED ON ARTIFICIAL INTELLIGENCE - The present disclosure provides a system and a method for debugging a robot based on artificial intelligence. The system includes: a mobile terminal; and the robot, in which the mobile terminal and the robot communicate with each other wirelessly, and the mobile terminal is configured to set a state parameter of each function node of the robot, and to send a control command to the robot according to the state parameter of each function node, so as to control the robot to perform a test. | 2017-09-28 |
20170277620 | SYSTEMS AND METHODS FOR PROVIDING DYNAMIC AND REAL TIME SIMULATIONS OF MATCHING RESOURCES TO REQUESTS - Computerized embodiments are disclosed for simulating requests and resources to be assigned to the requests by assignment logic. In one embodiment, a simulation session is initiated by generating test data that includes resource data, request data, and simulation state parameters. The test data is communicated to the assignment logic programmed to generate an assignment solution between resources and requests as represented by the resource data and the request data, respectively. The assignment solution is received from the assignment logic and the test data is updated. The test data can be updated by one or more of updating the simulation state parameters based on the assignment solution, adding at least one new request, or adding at least one new resource. The test data, as updated, is again communicated to the assignment logic and the process repeats until the simulation session is stopped. | 2017-09-28 |
20170277621 | APPARATUS FOR MINIMALLY INTRUSIVE DEBUGGING OF PRODUCTION USER INTERFACE SOFTWARE - An article of manufacture, which comprises a computer readable medium having stored therein a computer program for a method for debugging of a production application, the computer program comprising a first code segment which, when executed on a computer, accesses a context object associated with an application method of the production application, such that the application method is mapped to an application name and execution of the application method can be replaced by a first pre-defined replacement method; a second code segment which, when executed on the computer, accesses a test module containing one or more overrides and a reference to the application method, where the override is associated with the first pre-defined replacement method and is associated with the application name associated with the context object; a third code segment which, when executed on the computer, accesses a debugging user interface for implementing one or user interactions, each interaction associated with a method mapping on the context object; a fourth code segment which, when executed on the computer, accesses a dashboard module, coupled to the computer, comprising references to test modules and a debugging user interface specification; wherein a main user interface specification includes a reference to the dashboard module; and wherein on request in the debugging user interface specification, the one or more overrides are substituted for the application method. | 2017-09-28 |
20170277622 | Web Page Automated Testing Method and Apparatus - A web page automated testing method and apparatus. In the web page automated testing method, target network interaction data sent by a browser to a server is obtained using a network proxy server. Then, a web page automated testing tool validates the target network interaction data, thereby implementing validation on network interaction data between the browser or a web page and the server. A network request in the target network interaction data is validated, which improves a capability of finding a web page defect, and a response message returned by the server is validated, which improves accuracy of a web page display validation result. | 2017-09-28 |
20170277623 | METHOD OF ASCERTAINING PRIMARY CAUSE OF MEMORY CONSUMPTION IN PROGRAM, AND COMPUTER SYSTEM AND COMPUTER PROGRAM FOR THE SAME - A method of holding information for identifying a cause for an object becoming problematic and presenting the information to a user. The method ascertains the cause of memory consumption by a program in a computer system. This method includes: acquiring a first call path related to the creation of an object from a memory; acquiring a second call path related to the connection to the object from the memory; and determining a common part of the acquired first and second call paths, wherein the common part indicates the cause in the program. | 2017-09-28 |
20170277624 | METHOD AND SYSTEM FOR AUTOMATED USER INTERFACE (UI) TESTING THROUGH MODEL DRIVEN TECHNIQUES - A method and system for automated UI testing through model driven techniques where the UI test case model is generated based on the selected UI model content. The system selects the UI model corresponding to which test case model is created and populated into a test case editor using a test case model creation module. In one embodiment, the test case model before being populated into the test case editor is created as a sequence of UI Actions based on a structure pattern of the selected UI model. In another embodiment, the test case editor displays and edits the test case model. A validation module, based on rules and constraints then validates the test case model against the corresponding UI model. Thereafter, a script generation module generates a test case script from the test case model for the selected UI model. | 2017-09-28 |
20170277625 | GENERATING ANNOTATED SCREENSHOTS BASED ON AUTOMATED TESTS - Techniques are described herein for generating annotated documentation of a web application based on scripts that simulate tasks performed within the web application. While running each script, an automated testing utility captures individual screens within the web application based on a first set of criteria. The first set of criteria includes capturing a screen after a page loads, before clicking on a DOM element, and before validating the occurrence of an element or event within the web application. An annotation engine then annotates each screen based on a second set of criteria. The second set of criteria includes highlighting each given screen based on the type event and location of the element that triggered the screen capture. The annotation utility additionally visualizes contextual metadata that provides the viewer with a reference of what they are looking at. | 2017-09-28 |
20170277626 | METHOD AND A SYSTEM FOR AUTOMATING TEST ENVIRONMENT OPERATIONAL ACTIVITIES - A method and a system are provided method for automating test environment operational activities. The method comprises creating, by a unified test environment management (UTEM) system, a configuration management database comprising information pertaining to at least one of a test infrastructure, test data, and a plurality of test environment incidents. The method comprises defining, by the (UTEM) system, one or more test environment incident management policies based on Information Technology Infrastructure Library and the configuration management database. In an embodiment, the one or more test environment incident management policies are defined to manage the plurality of test environment incidents. The method comprises selecting, by the (UTEM) system, a testing environment for resolving the plurality of test environment incidents based on the defined one or more test environment incident management policies. The method comprises generating, by the (UTEM) system, a plurality of reports corresponding to the selected testing environment. | 2017-09-28 |
20170277627 | SOFTWARE TEST AUTOMATION SYSTEM AND METHOD - A method for testing an updated version of an existing software application is provided. The method may comprise analyzing a user interface screen of the updated version of the existing software application to identify previously existing controls and updated controls and then associating a plurality of testing actions with the previously existing controls and thee updated controls, thereby generating a plurality of test steps. The method may further comprise generating an updated test component comprised of the plurality of test steps, identifying one or more previously existing test components that should be replaced by the updated test component in a test asset repository, and automatically updating each of the one or more previously existing test components with the updated test component at the same time. | 2017-09-28 |
20170277628 | TECHNOLOGIES FOR MEMORY MANAGEMENT OF NEURAL NETWORKS WITH SPARSE CONNECTIVITY - Technologies for memory management of a neural network include a compute device to read a memory of the compute device to access connectivity data associated with a neuron of the neural network, determine a memory address at which weights corresponding with the one or more network connections are stored, and access the corresponding weights from a memory location corresponding with the memory address. The connectivity data is indicative of one or more network connections from the neuron. | 2017-09-28 |
20170277629 | EXTENDING THE USEFUL LIFESPAN OF NONVOLATILE MEMORY - A system for extending the useful lifespan of solid-state nonvolatile memory includes a memory that stores machine instructions and a processor coupled to the memory that executes the machine instructions to reconfigure a unit of nonvolatile memory cells from a first configuration that stores a minimum state, one of a group of intermediate states, or a maximum state as a current state to a second configuration that stores the minimum state, one of a subset of the group of intermediate states, or the maximum state as the current state. | 2017-09-28 |
20170277630 | GARBAGE COLLECTION AND DEFRAGMENTATION FOR SOLID STATE DRIVES (SSD) AND SHINGLED MAGNETIC RECORDING (SMR) DRIVES - Example apparatus and methods provide improved reclamation, garbage collection (GC) and defragmentation (defrag) for data storage devices including solid state drives (SSD) or shingled magnetic recording (SMR) drives. An erasure code (EC) layer that facilitates logically or physically erasing data from the SSD or SMR as a comprehensive GC or defrag is added to the SSD or SMR. Erased data may be selectively recreated from the EC layer as needed. Pre-planned EC write zones may be established to further optimize GC and defrag. Recreated data may be written to selected locations to further optimize SSD and SMR performance. Erasure code data may be distributed to co-operating devices to further improve GC or defrag. Example apparatus and methods may also facilitate writing data to an SMR drive using tape or VTL applications or processes and providing a pseudo virtual tape library on the SMR drive. | 2017-09-28 |
20170277631 | STORAGE DEVICE, SEMICONDUCTOR MEMORY DEVICE, AND METHOD FOR CONTROLLING SAME - The present invention improves an access performance in an SSD device in which a nonvolatile semiconductor, such as a NAND flash memory, is mounted, or in a storage subsystem having the SSD device built therein, and achieves longer operating life. For this purpose, a plurality of units (logical-physical sizes) for associating a logical address with a physical address is provided in the SSD device or the storage subsystem, and an appropriate logical-physical size is selected in accordance with an I/O size or I/O pattern accessed from a superior device. | 2017-09-28 |
20170277632 | VIRTUAL COMPUTER SYSTEM CONTROL METHOD AND VIRTUAL COMPUTER SYSTEM - A hypervisor that allocates the computer resource of a physical computer to one or more logical partitions allocates the computer resource to be allocated to the logical partitions to the logical partitions; generates, as address conversion information, the relationship between a guest physical address and a host physical address with respect to a memory of the computer resource; enables a first address conversion portion of a processor using the address conversion information; disables the first address conversion portion after the starting of a guest OS is completed; and causes an application to be executed. | 2017-09-28 |
20170277633 | MULTI-LEVEL MEMORY MANAGEMENT - A multi-level memory management circuit can remap data between near and far memory. In one embodiment, a register array stores near memory addresses and far memory addresses mapped to the near memory addresses. The number of entries in the register array is less than the number of pages in near memory. Remapping logic determines that a far memory address of the requested data is absent from the register array and selects an available near memory address from the register array. Remapping logic also initiates writing of the requested data at the far memory address to the selected near memory address. Remapping logic further writes the far memory address to an entry of the register array corresponding to the selected near memory address. | 2017-09-28 |
20170277634 | Using Leases for Entries in a Translation Lookaside Buffer - The described embodiments include a computing device with two or more translation lookaside buffers (TLB) that performs operations for handling entries in the TLBs. During operation, the computing device maintains lease values for entries in the TLBs, the lease values representing times until leases for the entries expire, wherein a given entry in the TLB is invalid when the associated lease has expired. The computing device uses the lease value to control operations that are allowed to be performed using information from the entries in the TLBs. In addition, the computing device maintains, in a page table, longest lease values for page table entries indicating when corresponding longest leases for entries in TLBs expire. The longest lease values are used to determine when and if a TLB shootdown is to be performed. | 2017-09-28 |
20170277635 | CONDITIONAL DATA CACHING TRANSACTIONAL MEMORY IN A MULITPLE PROCESSOR SYSTEM - A multiprocessor system providing transactional memory. A first processor initiates a transaction which includes reading first data into a private cache of the first processor, and performing a write operation on the first data in the private cache of the first processor. In response to detecting that prior to the write operation the first data was last modified by a second processor, the first processor writes the modified first data into a last level cache (LLC) accessible by the multiple processors. The system sets a cache line state index string to indicate that the first data written into the LLC was last modified by the first processor, invalidates the first data in the private cache of the first processor, and commits the transaction to the transactional memory system. This allows more efficient accesses to the data by the multiple processors. | 2017-09-28 |
20170277636 | METHOD AND DEVICE FOR CONTROLLING MEMORY - A memory controller includes a dirty group detector configured to, in response to receiving a request for writing data to a memory, modify addresses of a cache group related to a physical address of the memory, increase counters corresponding to the modified addresses of the cache group, and detect whether the cache group is in a dirty state based on the counters; and a dirty list manager configured to manage the cache group in the dirty state and a dirty list including dirty bits according to a result of the detecting; wherein the dirty bits indicate whether a cache set included in the cache group is in the dirty state. | 2017-09-28 |
20170277637 | APPARATUSES AND METHODS FOR CACHE OPERATIONS - The present disclosure includes apparatuses and methods for cache operations. An example apparatus includes a memory device including a plurality of subarrays of memory cells, where the plurality of subarrays includes a first subset of the respective plurality of subarrays and a second subset of the respective plurality of subarrays. The memory device includes sensing circuitry coupled to the first subset, the sensing circuitry including a sense amplifier and a compute component. The first subset is configured as a cache to perform operations on data moved from the second subset. The apparatus also includes a cache controller configured to direct a first movement of a data value from a subarray in the second subset to a subarray in the first subset. | 2017-09-28 |
20170277638 | CACHE MAP WITH SEQUENTIAL TRACKING FOR INVALIDATION - The described technology is directed towards efficiently invalidating cached data (e.g., expired data) in a hash-mapped cache, e.g., on a timed basis. As a result, data is able returned from the cache without checking for whether that data is expired, (if desired and acceptable), because if expired, the data is only briefly expired since the last invalidation run. To this end, a data structure such as a linked list is maintained to track information representative of hash-mapped cache locations of a hash-mapped cache, in which the information tracks a sequential order of entering data into each hash-mapped cache location. An invalidation run is performed on part of the hash mapped cache, including using the tracking information to invalidate a sequence of one or more cache locations, e.g., only the sequence of those locations that contain expired data. | 2017-09-28 |
20170277639 | Adaptive Extension of Leases for Entries in a Translation Lookaside Buffer - The described embodiments include a computing device with two or more translation lookaside buffers (TLB). During operation, the computing device updates an entry in the TLB based on a virtual address to physical address translation and metadata from a page table entry that were acquired during a page table walk. The computing device then computes, based on a lease length expression, a lease length for the entry in the TLB. Next, the computing device sets, for the entry in the TLB, a lease value to the lease length, wherein the lease value represents a time until a lease for the entry in the TLB expires, wherein the entry in the TLB is invalid when the associated lease has expired. The computing device then uses the lease value to control operations that are allowed to be performed using information from the entry in the TLB. | 2017-09-28 |
20170277640 | DRAM/NVM HIERARCHICAL HETEROGENEOUS MEMORY ACCESS METHOD AND SYSTEM WITH SOFTWARE-HARDWARE COOPERATIVE MANAGEMENT - The present invention provides a DRAM/NVM hierarchical heterogeneous memory system with software-hardware cooperative management schemes. In the system, NVM is used as large-capacity main memory, and DRAM is used as a cache to the NVM. Some reserved bits in the data structure of TLB and last-level page table are employed effectively to eliminate hardware costs in the conventional hardware-managed hierarchical memory architecture. The cache management in such a heterogeneous memory system is pushed to the software level. Moreover, the invention is able to reduce memory access latency in case of last-level cache misses. Considering that many applications have relatively poor data locality in big data application environments, the conventional demand-based data fetching policy for DRAM cache can aggravates cache pollution. In the present invention, an utility-based data fetching mechanism is adopted in the DRAM/NVM hierarchical memory system, and it determines whether data in the NVM should be cached in the DRAM according to current DRAM memory utilization and application memory access patterns. It improves the efficiency of the DRAM cache and bandwidth usage between the NVM main memory and the DRAM cache. | 2017-09-28 |