09th week of 2014 patent applcation highlights part 60 |
Patent application number | Title | Published |
20140059216 | METHODS AND SYSTEMS FOR NETWORK FLOW ANALYSIS - A system and method comprising: receiving network flow data; identifying a peer to peer network flow within the network flow data comparing the peer to peer network flow to a known peer to peer application flow; labeling the peer to peer network flow as the known peer to peer application flow when the peer to peer network flow matches the known peer to peer application flow; and creating a data set to be associated with the labeled peer to flow. | 2014-02-27 |
20140059217 | METHOD FOR CONTENT CHANGE NOTIFICATION IN A CLOUD STORAGE SYSTEM, A CORRESPONDING CLOUD BROKER AND CLOUD AGENT - A method for notification of content changes across different applications that share same content in a cloud storage system comprises: registering at a cloud IO broker applications that require content change notification; informing a cloud IO agent about content for which applications registered with the cloud IO broker for content change notification; monitoring content changes in the cloud storage system and upon each change of a content item: sending a first content change notification from the cloud IO agent to each cloud IO broker that requested content change notification for that content item; identifying at the cloud IO broker applications registered for content change notification for that content item; and multicasting a second content change notification from the cloud IO broker to all applications registered for content change notification for that content item. | 2014-02-27 |
20140059218 | SYSTEM, APPARATUS AND METHOD FOR MANAGING CLIENT DEVICES WITHIN A WIRELESS NETWORK - According to one embodiment, a system and computer-readable storage medium for storage of software directed to the management of associations between network devices is described. The computer-readable storage medium comprising instructions which, when executed by at least one hardware processor on a network device, causes performance of operations, comprising: (1) determining a desired operating state for a client device under analysis, the client device being associated with a first network device of a plurality of network devices; (2) detecting if a triggering event has occurred based on a comparison of the desired operating state for the client device under analysis to an actual operating state for the client device under analysis; and (3) in response to detecting that the triggering event has occurred, causing the client device to wirelessly connect to a second network device of the plurality of network devices in lieu of the first network device. | 2014-02-27 |
20140059219 | MONITORING THE HEALTH OF WEB PAGE ANALYTICS CODE - A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server. The monitoring service can attempt to render any analytics code on the web pages to see if the analytics code renders or executes as expected. The monitoring service can also perform basic text searches to identify analytics code, even if it cannot be rendered, and to determine if such code is present and correctly written in the web page. For web pages that require form input, the monitoring service can prompt the user for corresponding input, or retrieve pre-recorded user input from a store. The monitoring service can determine analytics health for web pages of interest in real-time. | 2014-02-27 |
20140059220 | METHOD FOR RECOGNIZING THE LOCATIONS OF ELECTRIC APPLIANCES - The present invention relates to a method for recognizing the locations of electric appliances. The method for recognizing the locations of electric appliances according to one embodiment includes: a step of the electric appliances starting communication; a step of said electric appliances recognizing basic information required for recognizing the locations thereof; and a step of the locations of said electric appliances being recognized on the basis of the recognized basic information. | 2014-02-27 |
20140059221 | PACKET VALIDATION IN VIRTUAL NETWORK INTERFACE ARCHITECTURE - Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain characteristic, transmits the packet only if the sending queue has authority to send packets having that characteristic. The data packet characteristics can include transport protocol number, source and destination port numbers, source and destination IP addresses, for example. Authorizations can be programmed into the NIC by a kernel routine upon establishment of the transmit queue, based on the privilege level of the process for which the queue is being established. In this way, a user process can use an untrusted user-level protocol stack to initiate data transmission onto the network, while the NIC protects the remainder of the system or network from certain kinds of compromise. | 2014-02-27 |
20140059222 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 2014-02-27 |
20140059223 | SERVICE SEGREGATION ACCORDING TO SUBSCRIBER SERVICE ASSOCIATION - Processing a plurality of packets through at least one service, a privilege granter monitors at least two authentication packets to obtain a source unique network identifier, one of which does not have a vendor specific attribute and detects an authentication packet among the at least two authentication packets, and the authentication packet having the vendor specific attribute. The privilege granter receives at least one response authentication packet having at least one service definition identifier, the service definition identifier corresponding to the source unique network identifier, responsive to detecting the authentication packet having the vendor specific attribute and builds an entitlement database to pair the source unique network identifier to the service definition identifier. The privilege granter receives a session packet and determines that the source unique network identifier corresponds to a user entitlement in the entitlement database. The privilege granter routes the session packet to an addressable service. | 2014-02-27 |
20140059224 | FUNCTIONAL DEVICE, ACCESS SYSTEM, AND COMMUNICATION ESTABLISHING METHOD - A functional device can communicate with an access apparatus through wireless communication. At least one additional device can be connected to the functional device. The functional device includes an access controller that performs an initialization process of the additional device to obtain characteristic information of the additional device from the additional device, before establishing communication between the access apparatus and the functional device, a memory that stores the obtained characteristic information, a communication unit that performs transmission and reception of data with the access apparatus, and a communication controller that transmits the characteristic information stored in the memory to the access apparatus without performing an initialization process of the additional device, upon establishment of communication with the access apparatus by the communication unit. | 2014-02-27 |
20140059225 | NETWORK CONTROLLER FOR REMOTE SYSTEM MANAGEMENT - Generally, this disclosure describes a network controller for remote system management. A host device may include the network controller and a programmable network element. The network controller may include controller circuitry configured to acquire network management data related to operation of the network controller and to receive host management data related to operation of the host device. The network controller may further include a transmitter configured to transmit the network and host management data to a management system remote from the network controller and a receiver configured to receive a command from the management system related to the management data, the command configured to reprogram the programmable network element to change a behavior of the programmable network element. | 2014-02-27 |
20140059226 | Multi-Level Cloud Computing System - A cloud computing system includes a physical resource pool that includes a number of information processing devices. Each information processing device includes a processor, a computer-readable medium, and a network interface. The system further includes a first cloud controller to manage a first cloud infrastructure, the first cloud infrastructure operating a first set of virtualized resources, the first set of virtualized resources having access to the physical resource pool through the first cloud controller. The system further includes a second cloud controller to manage a second cloud infrastructure, the second cloud infrastructure utilizing the first set of virtual resources to operate a second set of virtual resources, the second set of virtual resources being provided access to the physical resource pool through the second cloud controller and the first cloud controller. | 2014-02-27 |
20140059227 | SYSTEM, METHOD AND APPARATUS FOR FILTERING SUBSCRIBER NETWORK TRAFFIC - Methods, apparatus, and systems manage use of shared network resources among subscribers to a data communication service. In some implementations, a first metric is computed representing a subscriber's utilization of the shared network resources. If the subscriber's utilization exceeds a first threshold, the subscriber's network traffic over the shared network resources may be filtered to allow use of the shared network resources only with a first set of capabilities. When the subscriber's data is filtered, their upload or download speed may be unaffected. If the subscriber's utilization exceeds a second threshold, the subscriber's data download speed may be limited. In some implementations, the second threshold is larger than the first threshold. | 2014-02-27 |
20140059228 | RESOURCE ALLOCATION DIAGNOSIS ON DISTRIBUTED COMPUTER SYSTEMS - A system and method for performing a resource allocation diagnosis on a distributed computer system includes computing current resource allocation of the distributed computer system using a current snapshot of the distributed computer system. The current snapshot includes configurations and resource usage information of at least some components of the distributed computer system. The system and method also includes computing improved resource allocation of the distributed computer system using a modified version of the current snapshot of the distributed computer system and outputting the current resource allocation and the improved resource allocation for the resource allocation diagnosis. | 2014-02-27 |
20140059229 | REMOTE SERVICE FOR EXECUTING RESOURCE ALLOCATION ANALYSES FOR COMPUTER NETWORK FACILITIES - A system and method for performing remote resource allocation analyses on distributed computer systems utilizes a snapshot of a target distributed computer system obtained at a distributed computer system, which is transmitted to a remote resource allocation module so that a remote resource allocation analysis can be performed on the snapshot of the target distributed computer system. The snapshot includes configurations and resource usage information of at least some components of the target distributed computer system. | 2014-02-27 |
20140059230 | METHOD FOR ALLOCATION OF NETWORK RESOURCES IN AN OPERATIONS NETWORK FOR A SELECTED ENVIRONMENT - A method for allocation of network resources in an operations network for a selected environment includes, among other things, a plurality of applications communicating over a network having a bandwidth capacity and a plurality of modes including at least a first mode and a second mode. | 2014-02-27 |
20140059231 | DEVICE AND METHOD FOR SHARING CONTENT USING THE SAME - A method for sharing content of a device is provided. The method includes receiving, by an inputter, an input of a share command of a selected content, recommending at least one service to share the content among a plurality of services that are available in the device and a share target, and sharing, by a controller, the content with the share target selected through the selected service based on a selection input with respect to the at least one recommended service and the share target. | 2014-02-27 |
20140059232 | ROBUST TENANT PLACEMENT AND MIGRATION IN DATABASE-AS-A-SERVICE ENVIRONMENTS - A robust tenant placement and migration system, a process, and a respective controller for database-as-a-service environments are disclosed. Multiple tenants (T) are allocated on a set of in-memory database servers (S), such that workload changes depending on the tenants' behavior are considered, while maintaining strict service level objectives. The placement and migration are based on a migration command which, in turn, is based on an interleaved placement by interleaving tenants (T) across servers. | 2014-02-27 |
20140059233 | Methods, Systems, and Computer Program Products for Modifying Bandwidth and/or Quality of Service for a User Session in a Network - Bandwidth and/or Quality of Service (QoS) for a user session may be modified in a network that includes a Regional/Access Network (RAN) that facilitates differentiated end-to-end data transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP) and a Customer Premises Network (CPN) that includes a Customer Premises Equipment (CPE) by receiving a request at the NSP and/or the ASP to change the bandwidth and/or QoS associated with the user's session. An Application Programming Interface (API) is used at the NSP and/or the ASP to communicate with the RAN to modify the bandwidth and/or QoS associated with the user's session. | 2014-02-27 |
20140059234 | Switch Management System and Method - Methods and systems for managing a service provider switch are provided. According to one embodiment, a method is provided for provisioning a switch with a network-based managed Internet Protocol (IP) service. A network operating system (NOS) is provided on each processor element (PE) of the switch. The NOS includes an object manager (OM) responsible for managing global software object groups, managing software object configurations, managing local software objects and groups and routing control information between address spaces based on locations of software objects. The OM performs management plane communications among software objects by way of system calls. The OM performs data plane communications among software objects by way of object-to-object channels. The switch is provisioned with a network-based managed IP service for a particular customer by pushing discrete and customized software objects representing the network-based managed IP service onto an object-to-object channel established between two of the software objects. | 2014-02-27 |
20140059235 | METHOD AND APPARATUS FOR UTILIZING ADVERTISEMENTS TO PROVIDE INFORMATION REGARDING CONNECTION SETUP - A method, apparatus and computer program product are provided for reducing the time required for connection setup including, but not limited to, the time required for connection setup for devices discovered utilizing a low energy technology. In the context of a method performed by a slave device to be discovered, an advertisement may be generated including an indication of a capability to perform a predefined type of connection setup for initiating wireless communications. The method also causes the advertisement to be transmitted and receives a response to the advertisement from another device including one or more parameters relating to the predefined type of connection setup. The method also supports the connection setup with the another device in accordance with the one or more parameters. Corresponding apparatus and computer program products as employed by both master and slave devices are also provided. | 2014-02-27 |
20140059236 | Process for Peer-To-Peer Download of Software Installer - A system, method, and computer-readable medium are disclosed for performing automated, peer-to-peer migrations of entitled digital assets. A first identifier corresponding to a source system, and a first set of entitlement data corresponding to a set of digital assets installed on the source system, are processed to generate a first set of entitlements entitling the source system to use the set of digital assets. The first identifier is then cross-referenced to a second identifier corresponding to a target system. A migration request and the second identifier are received from the target system, which are then processed to initiate the migration of the digital assets from the source system to the target system. The second identifier and the first set of entitlement data are subsequently processed to generate a second set of digital asset entitlements entitling the target system to use the set of digital assets. | 2014-02-27 |
20140059237 | SCHEDULING AND CONDUCTING A COMMUNICATION SESSION WITH A REMOTE AGENT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for conducting and scheduling a communication session with a remote agent. A communication session can be scheduled using a scheduling interface configured to present scheduling data. Upon scheduling a communication session, the user can be sent a confirmation message including the details of the scheduled communication session. The user can enter the communication session via a launch page configured to allow entrance to the communication session during a scheduled time period. Prior to the time period, the launch page can present the user with a clock indicating the remaining time until the user can enter. Upon entering the communication session, the user is presented with a communication session interface enabled with a primary communication method. Communication methods can be added or terminated with terminating the communication session as long as one communication method remains active. | 2014-02-27 |
20140059238 | STREAMING MEDIA - A method for providing a session invitation protocol (SIP) session between a first and a second entity. An SIP session is established between the first and second entity. At least one media stream is transmitted from the first entity to the second entity. At least one of transmission, storage and play back of the at least one media stream is controlled in the SIP session at the first and/or second entity. | 2014-02-27 |
20140059239 | ACKNOWLEDGEMENT MESSAGE MONITORING - The invention relates to a system and method for monitoring a handshaking exchange between a call initiator and a call recipient to determine if handshaking has failed, to avoid repeated failed calls between the call initiator and the call recipient. | 2014-02-27 |
20140059240 | SYSTEM AND METHOD FOR COMMUNICATION SESSION CORRELATION - A system and method for correlating communication sessions. A globally unique correlation identifier is created and exchanged between the parties during Session Initiation Protocol (SIP) session setup to allow for association and correlation of additional SIP sessions between the same parties or with additional parties. The correlation information may then be used by network and session entities to perform different services. | 2014-02-27 |
20140059241 | Multiple Core Session Initiation Protocol (SIP) - A Session Initiation Protocol (SIP) proxy server including a multi-core central processing unit (CPU) is presented. The multi-core CPU includes a receiving core dedicated to pre-SIP message processing. The pre-SIP message processing may include message retrieval, header and payload parsing, and Call-ID hashing. The Call-ID hashing is used to determine a post-SIP processing core designated to process messages between particular user pair. The pre-SIP and post-SIP configuration allows for the use of multiple processing cores to utilize a single control plane, thereby providing an accurate topology of the network for each processing core. | 2014-02-27 |
20140059242 | METHOD AND SYSTEM OF IMPLEMENTING DATA LOAD PROTOCOLS - A system and method uses a proxy device to enable use of a standard data load protocol to load data to a target device that is incompatible with the standard data load protocol. | 2014-02-27 |
20140059243 | SYSTEMS AND METHODS FOR HIGH AVAILABILITY HTTP STREAMING - According to some embodiments, systems, methods, apparatus, and computer program code are provided to process video source data to generate a high availability segmented video stream for delivery to client devices. Pursuant to some embodiments, the video source data is packaged into a first segmented video stream and a second segmented video stream, and a first stream manifest file for the first segmented video stream and a second stream manifest file for the second segmented video stream are generated. A high availability stream manifest file is generated based on the first stream manifest file, the second stream manifest file and information associated with the availability of individual segments of the first and second segmented video streams. The segmented video stream data is then provided via the high availability stream manifest file to one or more client devices over one or more network connections. | 2014-02-27 |
20140059244 | METHOD AND APPARATUS FOR STREAMING MULTIMEDIA DATA WITH ACCESS POINT POSITIONING INFORMATION - A method and apparatus for streaming multimedia data over a network is provided. A playlist file for a selected multimedia presentation is downloaded by a client device over the network from a streaming server using a transfer protocol. The playlist file provides a list of URIs for media files each providing compressed video data corresponding to a segment of the multimedia presentation. The compressed video data includes reference frames used for video compression. A data file that is associated with the playlist file is also downloaded by the client device over the network from the streaming server using a transfer protocol and provides information identifying a location, a size, and a time stamp for each the reference frames contained in the media files listed by the playlist file. This information can be used by the client device to perform trick plays and to switch and stitch between variant streams. | 2014-02-27 |
20140059245 | STREAMING MEDIA WITH A SERVER IDENTIFIED AT RUNTIME - A server machine may create a network connection to a device and receive a request to stream media that is managed by a different server machine. The server machine that created the network connection may be unaware of the location of the media at the time the network connection is created, and the location of the media may remain unknown to this server machine until the location is identified by the request, which may be received at runtime. In response to this request, the server machine that created the network connection may communicate with the different server machine and function as an intermediary in routing a stream of data between the device and the different server machine. In example embodiments where certain media is managed by the other server machine, the server machine may retrieve the media and stream it to the device using the created network connection. | 2014-02-27 |
20140059246 | USER TERMINAL DEVICE AND CONTENTS STREAMING METHOD USING THE SAME - A contents streaming method of a user terminal device is provided. The method includes converting a certain portion of contents into a first format based on information to initially display contents on the external device, transmitting the certain portion of contents converted into the first format to the external device, converting the contents into a second format different from the first format after transmitting the portion of contents converted into the first format, and transmitting the contents converted into the second format to the external device. | 2014-02-27 |
20140059247 | NETWORK TRAFFIC MANAGEMENT USING SOCKET-SPECIFIC SYN REQUEST CACHES - Methods, systems, and devices are described for managing network communications at a traffic manager module serving as a proxy to at least one network service for at least one client device. The traffic manager module may maintaining a SYN request cache for a socket implemented by the traffic manager module. Active SYN request messages may be stored at the socket in the SYN request cache. The traffic manager module may determine a status of the SYN request cache and ignore additional SYN request messages at the socket based on the determined status of the SYN request cache. | 2014-02-27 |
20140059248 | Global hosting system - Network architecture supports hosting and content distribution on a global scale. The architecture allows a Content Provider to replicate and serve its most popular content at an unlimited number of points throughout the world. The inventive framework comprises a set of servers operating in a distributed manner. The actual content to be served is preferably supported on a set of hosting servers (sometimes referred to as ghost servers). This content comprises HTML page objects that, conventionally, are served from a Content Provider site. A base HTML document portion of a Web page is served from the Content Provider's site while one or more embedded objects for the page are served from the hosting servers, preferably, those hosting servers near the client machine. By serving the base HTML document from the Content Provider's site, the Content Provider maintains control over the content. | 2014-02-27 |
20140059249 | DATA CONVERSION DEVICE, DATA CONVERSION METHOD, AND PROGRAM FOR DATA CONVERSION - When an information storing area included only in a first data format among the first data format corresponding to a version of processing target data and a second data format corresponding to an output version is present as a difference area, a data conversion device | 2014-02-27 |
20140059250 | NETWORK SYSTEM - A network system of the present invention includes a computer and a device connected via a network, and a system management device. The computer and the device include, respectively, bridges that encapsulate transmission/reception data transmitted and received to and from each other and transmit and receive the data to and from each other via the network. Each of the bridges includes a control data transmitting means for generating control data for controlling the state of the system based on control auxiliary data issued from the computer or the device and used for controlling the state of the system, and transmitting the control data to the system management device via the network. The system management device includes a system controlling means for controlling the state of the system in accordance with the control data received thereby. | 2014-02-27 |
20140059251 | STATE CHANGE IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for state change in systems having devices coupled in a chained configuration. A number of embodiments include a host and a number of devices coupled to the host in a chained configuration. The chained configuration includes at least one device that is not directly coupled to the host. The at least one device that is not directly coupled to the host is configured to change from a first communication state to a second communication state responsive to receipt of a command from the host. | 2014-02-27 |
20140059252 | METHOD FOR CONFIGURING A FIELD DEVICE AND CORRESPONDING SYSTEM FOR PARAMETERIZATION - To provide a method for configuring a field device, and a corresponding parameterization system, that enables secure transfer of parameter values via a potentially unsafe data link the method establishes a data link ( | 2014-02-27 |
20140059253 | METHODS AND STRUCTURE FOR IDENTIFYING SUPPORT FOR SUPER-STANDARD FEATURES IN COMMUNICATIONS BETWEEN SERIAL ATTACHED SCSI DEVICES - Methods and structure for determining compatibility between a pair of SAS devices for support of super-standard features of the devices. Features and aspects hereof provide for exchange of information between a first and second SAS device using SAS protocol in non-standard manners. The exchanges are designed to exchange information between compatible, enhanced device without causing protocol violation errors in either the first or second devices. The information exchanged represents super-standard features supported by each device. Mutually supported super-standard features are enabled for further communications between the devices. If no super-standard features are mutually supported or if the second device is non-enhanced, no super-standard features are enabled in further communications between the devices. | 2014-02-27 |
20140059254 | MODE SWITCHING METHOD OF ELECTRONIC DEVICE AND ASSOCIATED ELECTRONIC DEVICE - A mode switch method of an portable electronic device includes: when the electronic device is electrically connected to a host, setting the electronic device to start to be operated under a first mode; when the host has installed a operating system, detecting whether the host has a driver of the electronic device or not; when the host has the driver of the electronic device, the electronic device continues to be operated under the first mode; and when the host does not have the driver of the electronic device, switching the electronic device to be operated under a second mode. | 2014-02-27 |
20140059255 | INPUT DEVICE, INPUT SYSTEM, ELECTRONIC APPARATUS, AND SENSE PRESENTATION METHOD - An input device includes an operation portion configured to receive an input operation made by a user, a vibration portion configured to vibrate the operation portion, a detection portion configured to detect the input operation, and a controller configured to determine a vibration condition of the vibration portion based on the input operation detected by the detection portion and present an elastic sense to the user by driving the vibration portion under the determined vibration condition. | 2014-02-27 |
20140059256 | NON-DISRUPTIVE SELECTIVE TRAFFIC BLOCKING IN A SAS DOMAIN - The invention may be embodied in a SAS expander with register bits within Phys associated with I/O devices. Setting and unsetting the register bit in the Phy associated with a particular physical or logical device allows I/O traffic to be blocked and unblocked, as desired, to the selected physical or logical devices. In a particular embodiment, when the register bit is set to a blocking state, an OPEN request that comes in on the SAS link is rejected using OPEN_REJECT (RETRY). Phy register bits may be provided for multiple different SAS protocols that can be controlled individually for each attached SAS device. The Phy register bit may also be used to reject only SAS connection requests that attempt to leave a particular SAS link. | 2014-02-27 |
20140059257 | KEYBOARD-VIDEO-MOUSE SYSTEM AND METHOD OF PROVIDING AND USING THE SAME - Some embodiments include keyboard-video-mouse systems. Other embodiments of related systems and methods are also disclosed. | 2014-02-27 |
20140059258 | ELECTRONIC DEVICE AND METHOD FOR BACKING UP USERS OPERATION INFORMATION - An electronic device capable of switching between a normal mode for recording users' operation information and a testing mode for allowing testers to analyze the recorded users' operation information, is provided. The electronic device includes an interface allowing an external device having a storage module to be electronically connected thereto, a detecting unit for detecting when the external device is electronically connected to the interface port when the electronic device is put into the testing mode, and a processor backing up the stored users' operation information to the external device if the external device having a sufficient available capacity is electronically connected to the interface port. A method for backing up users operation information is also provided. | 2014-02-27 |
20140059259 | METHOD FOR CONFIGURING AND OPERATING A MEDICAL APPARATUS WITH ELECTRONICALLY READABLE COMPONENT DESCRIPTIONS - In a method to operate a magnetic resonance tomography apparatus that includes a number of electronically controlled sub-components, the components and/or the apparatus are controlled by a control unit via sensors and actuators. All relevant configuration data and operating data are stored in respective electronic objects that are stored in an apparatus memory. An electronic object is respectively associated with each component. | 2014-02-27 |
20140059260 | BATTERY PACK MONITORING SYSTEM AND METHOD FOR ASSIGNING A BINARY ID TO A MICROPROCESSOR IN THE BATTERY PACK MONITORING SYSTEM - A battery pack monitoring system is provided. The system includes a master microprocessor and a first microprocessor. The master microprocessor outputs a first signal from an output port thereof to induce an input port of the first microprocessor to have a first low logic voltage. The master microprocessor sends a message having a first binary ID from the communication bus port thereof through a communication bus after outputting the first signal. The first microprocessor receives the first binary ID at the communication bus port thereof and stores the first binary ID in a non-volatile memory of the first microprocessor when the input port of the first microprocessor has the first low logic voltage. | 2014-02-27 |
20140059261 | NOVEL LOCK LEASING METHOD FOR SOLVING DEADLOCK - A method for resolving deadlock in a multi-threaded computing system using a novel lock lease is disclosed. A first thread leases a lock held by the first thread to a second thread different from the first thread. The leasing transfers control of the lock to the second thread while the first thread retains ownership of the lock. To lease the lock: (1) the second thread applies for the lease from the first thread; (2) the first thread grants the lease; (3) the first thread waits for the second thread to complete a task; (4) the second thread terminates the lease; (5) the first thread confirms termination of the lease. The first thread receives control of the lock back from the second thread after the second thread has finished using resources controlled by the lock. The second thread also can sublease the lock to a third thread. | 2014-02-27 |
20140059262 | TASK SCHEDULING IN BIG AND LITTLE CORES - One aspect provides a method comprising: ascertaining an interrupt at an information handling device having two or more cores of different size; determining if the interrupt should be directed to one of a bigger core and a littler core based on a policy for scheduling interrupts; directing the interrupt to the little core if the interrupt does not qualify as an exception based on the policy for scheduling interrupts; and processing the interrupt on an appropriate core according the policy for scheduling interrupts. Other aspects are described and claimed. | 2014-02-27 |
20140059263 | System and Method for Mobile Device Docking Station - Embodiments of the invention are related to systems and methods for a docking station that wirelessly connects to a mobile device, facilitates charging the mobile device, and enables the mobile device to interact with a virtual desktop infrastructure. | 2014-02-27 |
20140059264 | APPARATUS, SYSTEM AND METHOD OF DOCKING WITH WIRELESS CONNECTOR - Some demonstrative embodiments include apparatuses, systems and method of transferring data between a mobile device and one or more peripheral devices via a docking device including a wireless connector. For example, a docking device to transfer data between a mobile device and one or more peripheral devices may include a power plug to be connected to a power supply, one or more peripheral connectors to be connected to the one or more peripheral devices for communicating data with the peripheral devices, and a docking connector to connect the docking device to the mobile device. The docking connector may include, for example, a power connector to receive electrical power from the power supply via the power plug and to transfer the electrical power to the mobile device, and a wireless communication unit to communicate the data between the docking device and the mobile device over a wireless communication link. | 2014-02-27 |
20140059265 | Fabric Independent PCIe Cluster Manager - A cluster manager of a computer cluster determines an allocation of resources from the endpoints for running applications on the nodes of the computer cluster and configures the computer cluster to provide resources for the applications in accordance with the allocation. The cluster may include a Peripheral Component Interconnect express (PCIe) fabric. The cluster manager may configure PCIe multi-root input/output (I/O) virtualization topologies of the computer cluster. The allocations may satisfy Quality of Service requirements, including priority class and maximum latency requirements. The allocations may involve splitting I/O traffic. | 2014-02-27 |
20140059266 | METHODS AND APPARATUS FOR SHARING A NETWORK INTERFACE CONTROLLER - Methods, apparatus, and systems for enhancing communication between compute resources and networks in a micro-server environment. Micro-server modules configured to be installed in a server chassis include a plurality of processor subsystems coupled in communication to a shared Network Interface Controller (NIC) via PCIe links. The shared NIC includes at least one Ethernet port and a PCIe block including a shared PCIe interface having a first number of lanes. The PCIe lines between the processor sub-systems and the shared PCIe interface employ a number of lanes that is less than the first number of lanes, and during operation of the micro-server module, the shared NIC is configured to enable each processor sub-system to access the at least one Ethernet port using the PCIe link between that processor sub-system and the shared PCIe block on the shared NIC. | 2014-02-27 |
20140059267 | USB TRANSACTION TRANSLATOR AND USB TRANSACTION TRANSLATION METHOD - A universal serial bus (USB) transaction translator is provided along with a micro-frame synchronization method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus. At least two buffers are configured to store data. A controller stores the data in the buffers alternately. A start-of-frame (SOF) counter is used to count the SOF packets, with the counting value of the SOF counter being compared to a predefined value. Specifically, the controller resets a SOF timer for sending the SOF packet when the counting value achieves or exceeds the predefined value, such that the SOF packet and an isochronous timestamp packet (ITP) from the host are sent at the same time. Further, the controller delays the sending of the SOF packet for a period of time according to the ITP from the host. | 2014-02-27 |
20140059268 | MEMORY CONTROL DEVICE, NON-VOLATILE MEMORY, AND MEMORY CONTROL METHOD - Provided is a memory control device, including a write control unit that sequentially designates a memory block, a write processing unit that writes write data in the designated memory block, a verifying unit that reads read data from the memory block and verifies whether or not the read data matches the write data for each of a plurality of memory cells, a retry inhibiting unit that inhibits a retry process from being performed in a memory cell in which the read data matches the write data among the plurality of memory cells, and a retry control unit that designates at least some memory blocks among the plurality of memory blocks and simultaneously executes the retry process when the read data does not match the write data in any one of the plurality of memory cells in which all the write data is written. | 2014-02-27 |
20140059269 | COMPUTING DEVICE AND OPERATING METHOD OF COMPUTING DEVICE - Exemplary embodiments may provide a computing device which includes a first random access memory; a second random access memory; a memory controller which is configured to control the first random access memory and second random access memory; and a processor which is configured to use the first random access memory and second random access memory, as a working memory, through the memory controller, wherein the memory controller is configured to access one memory, selected by a transferred command from the processor, from among the first random access memory and second random access memory. | 2014-02-27 |
20140059270 | EFFICIENT ENFORCEMENT OF COMMAND EXECUTION ORDER IN SOLID STATE DRIVES - A method in a storage device includes receiving from a host storage commands for execution in a non-volatile memory of the storage device. At least a subset of the storage commands are to be executed in accordance with an order-of-arrival in which the storage commands in the subset are received. The received storage commands are executed in the non-volatile memory in accordance with internal scheduling criteria of the storage device, which permit deviations from the order-of-arrival, but such that execution of the storage commands in the subset reflects the order-of-arrival to the host. | 2014-02-27 |
20140059271 | FAST EXECUTION OF FLUSH COMMANDS USING ADAPTIVE COMPACTION RATIO - A method includes receiving one or more storage commands and at least one flush command in a storage device, which includes a non-volatile memory and a volatile buffer for buffering data received for storage in the non-volatile memory. The flush command instructs the storage device to commit the data buffered in the volatile buffer to the non-volatile memory. The storage commands are executed in accordance with a first storage rule. The flush command is executed in accordance with a second storage rule having smaller latency relative to the first storage rule. | 2014-02-27 |
20140059272 | DATA PROCESSING SYSTEM AND METHOD FOR STORAGE - A data processing system includes a first storage, a second storage, a processor and a controller. The first storage is a non-volatile storage, the second storage is a volatile storage. The first storage and the second storage are initialized when the data processing system is started up. The controller detects whether the first storage and the second storage have been initialized, and generates a signal to control the processor to write data from the first storage to the second storage. The controller further detects when the processor generates a request to read data from the first storage, and generates a reading instruction to control the processor to, instead, read the same data from the second storage that was copied from the first storage to the second storage. | 2014-02-27 |
20140059273 | HOST APPARATUS AND MEMORY DEVICE - According to one embodiment, a host apparatus is capable of accessing memory device. The host apparatus includes application software, a dedicated file system, and an interface circuit. The application software issues, to a file system, a request for access to the memory device. The dedicated file system manages a memory area of the memory device in accordance with a method appropriate to a flash memory in response to the access request. The dedicated file system manages logical address spaces by predetermined unit areas, and sequentially writes data into one of reserved unit areas. The application software issues the access request to the dedicated file system without recognizing a size of the unit area. | 2014-02-27 |
20140059274 | FLASH MEMORY CONTROLLER, FLASH MEMORY SYSTEM, AND FLASH MEMORY CONTROL METHOD - A flash memory controller configures, in a polling interval storage part, a polling interval, which is a time interval for outputting an acquisition signal for acquiring from a flash memory, information showing whether or not the execution of programing or erasing has ended after the execution of the programming or erasing has started with respect to the flash memory. The flash memory controller sends either a program command or an erase command to the flash memory, and thereafter, outputs the acquisition signal in accordance with the configured polling interval until information denoting that the execution of either the programming or the erasing has ended is received. | 2014-02-27 |
20140059275 | STORAGE DEVICES INCLUDING NON-VOLATILE MEMORY AND MEMORY CONTROLLER AND METHODS OF ALLOCATING WRITE MEMORY BLOCKS - Storage devices including a flash memory and a memory controller, and write memory block allocating methods of the storage devices are provided. A write memory block allocating method may include storing a pre-allocation table in a Random Access Memory (RAM) of a memory controller. The pre-allocation table may include allocation order information of a pre-allocated memory block included in a flash memory. The method may also include receiving a write request from a host, determining whether a write memory block for the write request can be allocated according to the pre-allocation table and allocating the pre-allocated memory block as the write memory block according to the pre-allocation table when the write memory block can be allocated according to the pre-allocation table. | 2014-02-27 |
20140059276 | HOST DEVICE AND SYSTEM INCLUDING THE SAME - A memory module includes a first storage module including a first module controller and a first memory unit. The first storage module is configured to receive first partial data from a host and write the first partial data to the first memory unit. A second storage module includes a second module controller and a second memory unit. The second storage module is configured to receive second partial data from the host and write the second partial data to the second memory unit. The first storage module and the second storage module are configured to connect to the host through a single host interface bus. | 2014-02-27 |
20140059277 | STORAGE FOR ADAPTIVELY DETERMINING A PROCESSING TECHNIQUE WITH RESPECT TO A HOST REQUEST BASED ON PARTITION DATA AND OPERATING METHOD FOR THE STORAGE DEVICE - Provided are: a storage device for adaptively determining a processing technique with respect to a host request based on partition data; and an operating method for the storage device. The storage device responds to receipt of a read or write request from a host by ascertaining a partition corresponding to the host request based on data about block addresses occupied by various partitions stored in the storage device. Also, the storage device adaptively determines a processing technique with respect to the host request based on predetermined attributes of the partition concerned. | 2014-02-27 |
20140059278 | STORAGE DEVICE FIRMWARE AND MANUFACTURING SOFTWARE - Storage device FirmWare (FW) and manufacturing software techniques include access to FW images and communication of a manufacturing software tool. The manufacturing software tool enables download of the FW images into an I/O device and controlling a manufacturing test of the I/O device that is a storage device providing a storage capability. Execution of the downloaded FW images enables an I/O controller of the I/O device to provide the storage capability via operation with one or more selected types of flash memory devices. The selected types are selected from a plurality of flash memory types that the I/O controller is capable of operating with by executing appropriate ones of the FW images. Optionally the manufacturing test includes testing the storage capability of the I/O device. The techniques further include an SSD manufacturing self-test capability. | 2014-02-27 |
20140059279 | SSD Lifetime Via Exploiting Content Locality - A solid state drive (SSD), which is used in computing systems, implements the systems and methods of a Delta Flash Transition Layer (ΔFTL) to store compressed data in the SSD instead of original new data. The systems and methods of ΔFTL reduce the write count via exploiting the content locality between the write data and its corresponding old version in the flash. Content locality implies the new version resembles the old to some extent, so that the difference (delta) between the versions may be compressed compactly. Instead of storing new data in its original form in the flash, ΔFTL stores the compressed deltas. | 2014-02-27 |
20140059280 | HOST DEVICE AND SYSTEM INCLUDING THE SAME - A memory module includes a first storage module including a first module controller and a first memory unit. The first storage module is configured to receive first partial data from a host and write the first partial data to the first memory unit. A second storage module includes a second module controller and a second memory unit. The second storage module is configured to receive second partial data from the host and write the second partial data to the second memory unit. The first storage module and the second storage module are configured to connect to the host through a single host interface bus. | 2014-02-27 |
20140059281 | MEMORY SYSTEM - According to the embodiments, a memory system includes a nonvolatile semiconductor memory and a writing-loop-count monitoring unit that monitors a loop count of an applied voltage to the nonvolatile semiconductor memory required for data writing of the nonvolatile semiconductor memory as a writing loop count. Moreover, the memory system includes a management table for managing the writing loop count in block unit that is a unit of data erasing and a life managing unit that determines a degraded state of the nonvolatile semiconductor memory based on the management table. | 2014-02-27 |
20140059282 | HYBRID NANOTUBE/CMOS DYNAMICALLY RECONFIGURABLE ARCHITECTURE AND SYSTEM THEREFORE - A hybrid nanotube, high-performance, dynamically reconfigurable architecture, NATURE, is provided, and a design optimization flow method and system, NanoMap. A run-time reconfigurable architecture is provided by associating a non-volatile universal memory to each logic element to enable cycle-by-cycle reconfiguration and logic folding, while remaining CMOS compatible. Through logic folding, significant logic density improvement and flexibility in performing area-delay tradeoffs are possible. NanoMap incorporates temporal logic folding during the logic mapping, temporal clustering and placement steps. NanoMap provides for automatic selection of a best folding level, and uses force-direct scheduling to balance resources across folding stages. Mapping can thereby target various optimization objectives and user constraints. A high-density, high-speed carbon nanotube RAM can be implemented as the universal memory, allowing on-chip multi-context configuration storage, enabling fine-grain temporal logic folding, and providing a significant increase in relative logic density. | 2014-02-27 |
20140059283 | CONTROLLING A MEMORY ARRAY - Methods and systems for controlling a memory array are provided. A method of controlling a memory array includes: providing a next index to be read that indicates a location in the memory array from which to retrieve an output; reading validity information from a validity memory unit; comparing the next index with a last read index stored in an index memory unit; reading the output from an output memory unit when the last read index is the same as the next index and the validity information indicates the output in the output memory unit is valid; and reducing power to the memory array when the output is read from the output memory unit. | 2014-02-27 |
20140059284 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS MEMORY SPACE MANAGEMENT FOR STORAGE CLASS MEMORY - Embodiments of the present invention provide a system, method and computer program products for memory space management for storage class memory. One embodiment comprises a method for information storage in an information technology environment. The method comprises storing data in a storage class memory (SCM) space, and storing storage management metadata corresponding to said data, in the SCM in a first data structure. The method further includes buffering storage management metadata corresponding to said data, in a main memory in a second data structure. | 2014-02-27 |
20140059285 | APPARATUS AND METHOD FOR DATA MOVEMENT - The present disclosure relates to an apparatus and method capable of carrying out data movement in a memory of a terminal. The apparatus includes a processor configured to transmit a command for data movement and address information for data movement in a memory to the memory, and the memory configured to perform the data movement in units of word line in the memory by using the address information, in response to reception of the command for moving the data. | 2014-02-27 |
20140059286 | MEMORY ACCESS DEVICE FOR MEMORY SHARING AMONG PLURALITY OF PROCESSORS, AND ACCESS METHOD FOR SAME - Provided is a memory access device for a shared memory mechanism of main memory for a plurality of CPUs. The present invention includes a plurality of CPUs using memory as main memory, another function block using memory as a buffer, a CPU interface which controls access transfer from the plurality of CPUs to memory, and a DRAM controller for performing arbitration of the access transfer to the memory. Therein, the CPU interface causes access requests from the plurality of CPUs to wait, and receives and stores the address, data transfer mode and data size of each access, notifies the DRAM controller of the access requests, and then, upon receiving grant signals for the access requests, sends information to the DRAM controller according to the grant signals, whereupon the DRAM controller receives the grant signals, and on the basis of the access arbitration, specifies CPUs for which transfers have been granted so as to send the grant signals to the CPU interface. | 2014-02-27 |
20140059287 | ROW HAMMER REFRESH COMMAND - A memory controller issues a targeted refresh command. A specific row of a memory device can be the target of repeated accesses. When the row is accessed repeatedly within a time threshold (also referred to as “hammered” or a “row hammer event”), physically adjacent row (a “victim” row) may experience data corruption. The memory controller receives an indication of a row hammer event, identifies the row associated with the row hammer event, and sends one or more commands to the memory device to cause the memory device to perform a targeted refresh that will refresh the victim row. | 2014-02-27 |
20140059288 | Batch Entries Sharing Individual Content-addressable Memory Entries - In one embodiment, batch entries include multiple content-addressable memory (CAM) entries, and CAM entries are allowed to be shared among different batch entries. For example, two or more batch entries might have a common set of bits (e.g., representing an address, an address prefix, etc.). Rather than consuming bits of multiple CAM entries, a single CAM entry can be programmed with this common information. Other CAM entries associated with different batch entries are programmed with the distinguishing/different values. A batch lookup operation on a batch entry of two or more CAM entries requires multiple lookup operations on the CAM entries. One embodiment uses a batch mask vector to provide information to decode what CAM entries are shared among which batch entries during a series of lookup operations, which can be performed in one or both directions through the CAM entries. | 2014-02-27 |
20140059289 | Content-addressable Memory Lookup Device Supporting Iterative Lookup Operations - In one embodiment, multiple content-addressable memory entries are associated with each other to effectively form a batch content-addressable memory entry that spans multiple physical entries of the content-addressable memory device. To match against this content-addressable memory entry, multiple lookup operations are required—i.e., one lookup operation for each combined physical entry. Further, one embodiment provides that a batch content-addressable memory entry can span one, two, three, or more physical content-addressable memory entries, and batch content-addressable memory entries of varying sizes could be programmed into a single content-addressable memory device. Thus, a lookup operation might take two lookup iterations on the physical entries of the content-addressable memory device, with a next lookup operation taking a different number of lookup iterations (e.g., one, three or more). | 2014-02-27 |
20140059290 | DISTRIBUTED CONTENT STORAGE AND RETRIEVAL - Distributed content storage and retrieval is disclosed. A set of features associated with a content object is determined. A storage location is selected to perform an operation with respect to the content object, from a plurality of storage locations comprising a distributed content storage system, based at least in part on probability data indicating a degree to which the selected storage location is associated statistically with a feature comprising the set of features determined to be associated with the content object. | 2014-02-27 |
20140059291 | METHOD FOR PROTECTING STORAGE DEVICE DATA INTEGRITY IN AN EXTERNAL OPERATING ENVIRONMENT - An invention is provided for protecting the data integrity of a cached storage device in an alternate operating system (OS) environment. The invention includes replacing an actual partition table for a disk with a dummy partition table. The dummy partition table is designed to render data on the disk inaccessible when the dummy partition table is used by an OS to access the data. During operation, the data on the disk can be accessed using information based on the actual partition table. In response to receiving a request to disable caching, the dummy partition table on the disk is replaced with the actual partition table, thus rendering the data on the formally cached disk accessible in an alternate OS environment where appropriate caching software is not present. | 2014-02-27 |
20140059292 | TRANSPARENT HOST-SIDE CACHING OF VIRTUAL DISKS LOCATED ON SHARED STORAGE - Techniques for using a host-side cache to accelerate virtual machine (VM) I/O are provided. In one embodiment, the hypervisor of a host system can intercept an I/O request from a VM running on the host system, where the I/O request is directed to a virtual disk residing on a shared storage device. The hypervisor can then process the I/O request by accessing a host-side cache that resides one or more cache devices distinct from the shared storage device, where the accessing of the host-side cache is transparent to the VM. | 2014-02-27 |
20140059293 | METHOD FOR PROTECTING A GPT CACHED DISKS DATA INTEGRITY IN AN EXTERNAL OPERATING SYSTEM ENVIRONMENT - An invention is provided for protecting the data integrity of a cached storage device in an alternate operating system (OS) environment. The invention includes replacing a globally unique identifiers partition table (GPT) for a cached disk with a modified globally unique identifiers partition table (MGPT). The MGPT renders cached partitions on the cached disk inaccessible when the MGPT is used by an OS to access the cached partitions, while un-cached partitions on the cached disk are still accessible when the using MGPT. In normal operation, the data on the cached disk is accessed using information based on the GPT, which can be stored on a caching disk, generally via caching software. In response to receiving a request to disable caching, the MGPT on the cached disk is replaced with the GPT, thus rendering the all data on the formally cached disk accessible in an alternate OS environment where appropriate caching software is not present. | 2014-02-27 |
20140059294 | STORAGE SYSTEM AND STORAGE CONTROL METHOD - When a request to write data to a logical storage area realized by a storage area of a first storage apparatus is made in a storage system, a determination section determines whether a write pattern is sequential access or random access. When the write pattern is the sequential access, a control section writes the data to the logical storage area. On the other hand, when the write pattern is the random access, the control section writes the data to a virtual storage area obtained by virtualizing a storage area of a second storage apparatus which is faster in access speed than the first storage apparatus. | 2014-02-27 |
20140059295 | SMART SCALABLE STORAGE SWITCH ARCHITECTURE - A method and system for providing advanced storage features using commodity, consumer-level storage devices is provided. The advanced storage system is a component that is connected between the computer system and one or more physical disk drives. The host interface of the advanced storage system presents itself to the computer system as a virtual disk drive that implements the commands of consumer-level storage hardware that are familiar to the host controller of the computer system. Similarly, the storage device interface of the advanced storage system presents itself to one or more disk drives as a consumer-level host controller, regardless of the actual topology of the physical storage devices that are connected. This system provides a simple way for a user to combine low-cost, consumer-level hardware to add advanced storage features to a computer system. | 2014-02-27 |
20140059296 | STORAGE TECHNOLOGY AGNOSTIC SYSTEM FOR PERSISTING SOFTWARE INSTANTIATED OBJECTS - Embodiments of the present invention relate to a storage technology agnostic system for persisting software instantiated objects. The system provides an ability for software systems to use one persistence logic tool for disparate storage systems, such as MySQL databases and NoSQL databases, to store the software instantiated objects. These different storage systems can be utilized from within the same software system. The software instantiated objects from the software system are mapped to one or more storage systems via the persistence logic tool, which is configured as a single interface for all the storage systems. | 2014-02-27 |
20140059297 | SYSTEM CACHE WITH STICKY ALLOCATION - Methods and apparatuses for implementing a system cache within a memory controller. Multiple requesting agents may allocate cache lines in the system cache, and each line allocated in the system cache may be associated with a specific group ID. Also, each line may have a corresponding sticky state which indicates if the line should be retained in the cache. The sticky state is determined by an allocation hint provided by the requesting agent. When a cache line is allocated with the sticky state, the line will not be replaced by other cache lines fetched by any other group IDs. | 2014-02-27 |
20140059298 | Snapshot Coordination - In one embodiment, a method performed by one or more computing devices includes receiving at a host cache, a first request to prepare a volume of the host cache for creating a snapshot of a cached logical unit number (LUN), the request indicating that a snapshot of the cached LUN will be taken, preparing, in response to the first request, the volume of the host cache for creating the snapshot of the cached LUN depending on a mode of the host cache, receiving, at the host cache, a second request to create the snapshot of the cached LUN, and in response to the second request, creating, at the host cache, the snapshot of the cached LUN. | 2014-02-27 |
20140059299 | ADAPTIVE STRIDE PREFETCHER - The disclosed embodiments relate to a method for dynamically changing a prefetching configuration in a computer system, wherein the prefetching configuration specifies how to change an ahead distance that specifies how many references ahead to prefetch for each stream. During operation of the computer system, the method keeps track of one or more stream lengths, wherein a stream is a sequence of memory references with a constant stride. Next, the method dynamically changes the prefetching configuration for the computer system based on observed stream lengths in a most-recent window of time. | 2014-02-27 |
20140059300 | Snapshot Access - In one embodiment, a method performed by one or more computing devices includes receiving at a host cache a first request for data comprising at least one snapshot of a cached logical unit number (LUN), sending, by the host cache, the data comprising at least one snapshot of the cached LUN in response to the first request, and in response to the completing sending the data comprising at least one snapshot of the cached LUN, sending, by the host cache, a first response indicating that sending the data is complete. | 2014-02-27 |
20140059301 | EXECUTING PARALLEL OPERATIONS TO INCREASE DATA ACCESS PERFORMANCE - Techniques are described for increasing data access performance for a memory device. In various embodiments, a scheduler/controller is configured to manage data as it read to or written from a memory. Read or write access is increased by partitioning a memory into a group of sub-blocks, associating a parity block with the sub-blocks, and accessing the sub-blocks to read data as needed. Write access is increased by including a latency cache that stores data associated with a read command. Once a read-modify write command is received, the data stored in the data cache is used to update the parity block. In a memory without a parity block, write access is increased by adding one or more spare memory blocks to provide additional memory locations for performing write operations to the same memory block in parallel. | 2014-02-27 |
20140059302 | COMPUTER SYSTEM - A hypervisor as a movement source stores key information, and the key information is registered in a storage using the stored key information through a logical HBA which is used for migration. | 2014-02-27 |
20140059303 | Method and Apparatus for Probabilistic Allocation in a Switch Packet Buffer - Systems and methods of writing data to a buffer during a buffer cycle are described. The buffer has a plurality of buffer banks having various fill levels. The buffer determines a first portion of banks from the plurality of buffer banks. The first portion of banks unfilled banks. A rank can be assigned to each of the first portion of banks and a candidate set of banks chosen from the first portion of banks. A target bank is then chosen from the candidate set and the data is written to that bank. The ranking may be random. Furthermore, the target bank can be chosen based on ranking, fill level, or both. | 2014-02-27 |
20140059304 | SEMICONDUCTOR MEMORY DEVICE - According to one embodiment, a semiconductor memory device includes a memory core, a peripheral circuit which executes a reading/writing of data in the memory core, and an interface which inputs a control signal for the reading/writing. The control signal inputs by one data path. The peripheral circuit is configured to read a first data from a first address in the memory core in a first cycle, and read a second data from a second address in the memory core in parallel with writing a third data to a third address in the memory core in a second cycle. | 2014-02-27 |
20140059305 | MANAGEMENT APPARATUS, STORAGE DEVICE, AND INITIALIZATION METHOD - A management apparatus that performs initialization of a storage region of a storage medium is described. The management unit includes a first storage area that stores a first information representing an initialization status of the storage region of the storage medium, a second storage area that stores a second information representing an initialization progress status of the storage region of the storage medium, an initializing unit that performs initialization of the storage medium based on the second information, and a storage processing unit that updates the first information based on the second information which reflects the initialization progress status. | 2014-02-27 |
20140059306 | STORAGE MANAGEMENT IN A VIRTUAL ENVIRONMENT - A method, computer program product, and system for managing storage space in a virtualized computing environment. The method includes a computer determining, by one or more computer processors, that a virtual computer system has reached a threshold level of minimum available storage space. The storage space of the computer system is searched for an inactive snapshot file. When the inactive snapshot file is located, the inactive snapshot file is moved to a secondary storage. | 2014-02-27 |
20140059307 | AUTOMATED MIGRATION TO A NEW COPY SERVICES TARGET STORAGE SYSTEM TO MANAGE MULTIPLE RELATIONSHIPS SIMULTANEOUSLY WHILE MAINTAINING DISASTER RECOVERY CONSISTENCY - A system according to one embodiment, includes one or more source volumes on a source storage subsystem from which data is copied in first copy services relationships, the one or more source volumes being accessible to an application; one or more original target volumes on an original target storage subsystem to which data is copied in the first copy services relationships; logic configured for selecting a new target storage subsystem to replace the original target storage subsystem; logic configured for creating second copy services relationships between one or more new target volumes on the new target storage subsystem and the one or more source volumes on the source storage subsystem using multi-target functionality; and logic configured for terminating the first copy services relationships after all of the second copy services relationships are full duplex. | 2014-02-27 |
20140059308 | AUTOMATED MIGRATION TO A NEW TARGET VOLUME VIA MERGED BITMAPS TO MAINTAIN CONSISTENCY - Aspects of the present invention relate to data migration and/or disaster recovery. One embodiment enables merging of bitmaps to allow for automation of the process of switching to a different target volume on the same storage subsystem without major interruption of data recovery capability and limited interruption of host I/O to the source volumes during the migration. In one approach, the migration of data onto a new target volume within the same storage subsystem as the original target volume is automated, without requiring the user to manually create or remove any new copy relationships. | 2014-02-27 |
20140059309 | MULTI-VOLUME INSTANT VIRTUAL COPY FREEZE - Provided are a computer implemented method, computer program product, and system for creating a consistency group. For each source volume that has an instant virtual copy relationship with a target volume, an indicator for the source volume is set to true in a Fast Incremental with Freeze (FIF) map. The consistency group for each source volume whose indicator is set to true in the FIF map and each associated target volume is created by: performing a quick Instant Virtual Copy (IVC) freeze command to freeze each source volume whose indicator is set to true in the FIF map and performing a consistency group created command to thaw each source volume whose indicator is set to true in the FIF map. | 2014-02-27 |
20140059310 | Virtualization-Aware Data Locality in Distributed Data Processing - A virtualized computing system for executing a distributed computing application, such as Hadoop, is discussed. The virtualized computing system stores data in a distributed filesystem, such as Hadoop Distributed File System, and processes data using a topology awareness that takes into account the virtualization layer of the virtualized computing system. The virtualized computing system employs locality-related policies, including replica placement policies, replica choosing policies, balancer policies, and task scheduling policies that take advantage of the awareness of the virtualization topology. | 2014-02-27 |
20140059311 | Data Backup or Restore Using Main Memory and Non-Volatile Storage Media - The invention relates to a computer implemented method for creating a backup of data by a computer system. The creation of the backup comprises: assigning a first memory space in a main memory to data and loading the data into the first memory space; allocating a second memory space in the main memory for acting as container of one or more images of the data in the first memory space; creating the one or more images of the data in the first memory space; and storing the created one or more images in the second memory space and storing a respective copy of at least one of the one or more images in the one or more non-volatile storage media. | 2014-02-27 |
20140059312 | RECORDING MEDIUM, COMPUTER, AND INFORMATION PROCESSING SYSTEM - A non-transitory computer-readable recording medium storing a program causing a processor to execute a process, the process includes identifying a second virtual machine in charge of storing data onto a storage in accordance with a hash value that is calculated from a key and a hash function, the key corresponding to the data that is to be stored on the storage and is placed on a first virtual machine from among a plurality of virtual machines running in a computer and the hash function commonly used by the plurality of virtual machine; storing the data on the storage using the first virtual machine when the second virtual machine matches the first virtual machine; and performing a control operation so that the first virtual machine does not store the data onto the storage when the second virtual machine fails to match the first virtual machine. | 2014-02-27 |
20140059313 | APPARATUS AND METHOD FOR RECOVERING PARTITION USING BACKUP BOOT RECORD INFORMATION - In a method for recovering a partition using backup boot record information, an unallocated area is separated from a disk or an evidence image. The unallocated area is searched for a location of a backup boot record. Whether is backup boot record of a file system to be detected is present in found sectors is analyzed. If the backup boot record is found to be the backup boot record of the file system desired to be detected as a result of the analysis, it is verified whether the backup boot record is a boot record of a valid partition. If it is verified that the backup boot record is the boot record of the valid partition, a file system of a deleted partition is parsed using the backup boot record and a deleted directory or file is recovered. | 2014-02-27 |
20140059314 | PREVENTING DATA LOSS DURING REBOOT AND LOGICAL STORAGE RESOURCE MANAGEMENT DEVICE - According to an example, in a method for preventing data loss during reboot, a logical storage resource management device may pre-allocate reserved memory for storing a storage resource mapping table, allocate logical storage resources to a data source device before a system is rebooted, record, in the storage resource mapping table, a physical location of the logical storage resources into which data has been written when the data source device writes the data into the logical storage resources, obtain the physical location of the logical storage resources into which the data has been written from the storage resource mapping table when the system is rebooted, set a state of a physical memory block corresponding to the logical storage resources into which the data has been written as used, and release all logical storage resources after the data source device reads the data. | 2014-02-27 |
20140059315 | COMPUTER SYSTEM, DATA MANAGEMENT METHOD AND DATA MANAGEMENT PROGRAM - A computer system is achieved which enables a high-speed response to a copy process between computers configuring a KVS and ensures data reliability. Disclosed is a computer system in which computers are connected via a network, and a task is executed using a database including storage areas belonging to the computers. The computer system includes a first computer that manages a data set containing pieces of data. The first computer stores replicated data of data contained in data sets managed by other computers. Upon receiving a request for storage (writing and/or overwriting) of new data, the first computer stores the data in memory, replicating the data to generate replicated data, transmits the replicated data to the other computers, determines whether the replicated data has been transmitted to the network, and uses the data to execute the task when determining the replicated data was transmitted to the network. | 2014-02-27 |