18th week of 2020 patent applcation highlights part 51 |
Patent application number | Title | Published |
20200133737 | INDEPENDENT SERVICES PLATFORM - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing an independent services platform. One of the methods includes maintaining a first software platform system configured to host user-provided computing tasks in a cloud computing environment of a distributed computing system. A services platform system configured to host services in the cloud computing environment of the distributed computing system is also maintained, wherein the second services platform system is configured to provision independent service resources in the underlying cloud computing infrastructure, and launch one or more service instances of the service using the provisioned independent service resources in the underlying cloud computing infrastructure. The second services platform system is configured to receive a bind request from a user and to provide binding information to one or more computing tasks hosted by the first software platform system upon receiving the bind request. | 2020-04-30 |
20200133738 | Multi-Cloud Framework for Microservice-Based Applications - A multi-cloud framework is provided for microservice-based applications. An exemplary method comprises maintaining a structural state of an application comprising a plurality of microservices hosted in a plurality of distinct cloud environments. The structural state of the application is maintained over time and comprises, for each microservice, an indication of the cloud environment that hosts the respective microservice. A source code is maintained for each of the plurality of microservices of the application and deployment instructions are maintained for each of the plurality of distinct cloud environments. The plurality of microservices of the application are deployed using the structural state of the application, the source code for each of the plurality of microservices and the deployment instructions for each of the plurality of distinct cloud environments. | 2020-04-30 |
20200133739 | MULTI-STAGE IOPS ALLOCATION - Systems and methods for policy-based apportionment of input/output operations (IOPS) in computing systems. Embodiments access a policy that specifies IOPS limits. Two or more virtual machines that are associated with the policy and two or more nodes that host those virtual machines are identified. In a first allocation stage, an inter-node policy manager prescribes an initial IOPS limit to the two or more nodes. The allocation amounts sent to the nodes depend at least in part on performance capabilities of respective nodes. In a second allocation stage, for each node that had received a limit amount, that amount is apportioned to the sets of virtual machines that execute on respective host nodes. Each node of the two or more nodes invokes its own node-local IOPS monitoring. Each node reports IOPS usage data to the inter-node policy manager, which in turn adjusts the node-level IOPS apportionments based on the node-level usage. | 2020-04-30 |
20200133740 | ACCELERATING LARGE-SCALE IMAGE DISTRIBUTION - Methods and systems for deploying images to computing systems include predicting an environment for a plurality of processing nodes. Image deployment to the plurality of processing nodes is simulated to determine a subset of the plurality of processing nodes for deployment. One or more images is pre-loaded to the subset of the plurality of processing nodes in advance of a deployment time. | 2020-04-30 |
20200133741 | TASK SYNCHRONIZATION FOR ACCELERATED DEEP LEARNING - Techniques in advanced deep learning provide improvements in one or more of accuracy, performance, and energy efficiency. An array of processing elements performs flow-based computations on wavelets of data. Each processing element has a compute element and a routing element. Each compute element has memory. Each router enables communication via wavelets with at least nearest neighbors in a 2D mesh. Routing is controlled by respective virtual channel specifiers in each wavelet and routing configuration information in each router. A compute element conditionally selects for task initiation a previously received wavelet specifying a particular one of the virtual channels. The conditional selecting excludes the previously received wavelet for selection until at least block/unblock state maintained for the particular virtual channel is in an unblock state. The compute element executes block/unblock instructions to modify the block/unblock state. | 2020-04-30 |
20200133742 | DATA MODEL API FOR LIVE APPLICATIONS IN A CLOUD COLLABORATION PLATFORM - Disclosed herein are system, method, and computer program product embodiments for providing a data model API to customizable live applications in a cloud collaboration platform. The cloud collaboration platform may provide data storage, a data model, and an application programming interface to embedded third-party live applications to allow the live applications to securely create, store, and access data within the cloud collaboration platform. The data model allows records stored in the cloud collaboration platform to sync independently, merge intelligently, and function offline. | 2020-04-30 |
20200133743 | UNIFIED PROGRAMMING INTERFACE FOR REGRAINED TILE EXECUTION - Systems, apparatuses and methods may provide for technology that detects a tensor operation in an application, wherein the tensor operation has an unspecified tensor input size, determines the input tensor size at runtime, and selects a partition configuration for the tensor operation based at least in part on the input tensor size and one or more runtime conditions. In one example, the technology searches a lookup table for the input tensor size and at least one of the runtime condition(s) to select the partition configuration. | 2020-04-30 |
20200133744 | APPLICATION INTERFACE GOVERNANCE PLATFORM TO HARMONIZE, VALIDATE, AND REPLICATE DATA-DRIVEN DEFINITIONS TO EXECUTE APPLICATION INTERFACE FUNCTIONALITY - Various embodiments relate generally to data science and data analysis, computer software and systems, including a subset of intermediary executable instructions constituting an communication interface between various software and/or hardware platforms, and, more specifically, to an automated application interface governance platform to automate development, maintenance, and governance functions for application interfaces, such as harmonizing, validating, and/or replicating application program interfaces (“APIs”). For example, a method may include identifying a subset of application interfaces, synthesizing a data structure for each application interface, analyzing the data structure against other data structures to identify duplicative portions among multiple data structures, substituting a reference to a location into a portion of multiple application interfaces. Optionally, the method may include evaluating interoperability of multiple application interfaces to validate collective operation of a subset of application interfaces. | 2020-04-30 |
20200133745 | COGNITIVE AGENT FOR PERSISTENT MULTI-PLATFORM REMINDER PROVISION - A reminder method, system, and computer program product include collecting information and an activity of a user, determining an optimum time to send the reminder to the user based on the information and the activity of the user and an optimal platform to deliver the reminder to the user based on the information and the activity of the user. | 2020-04-30 |
20200133746 | Triggered Automated Operations For Spaceborne And Airborne Nodes - Systems, methods, and software described herein provide enhancements for the deployment and management of converged resources across satellites, aircraft, and ground-based nodes to perform user tasks and applications. In one implementation, a system includes a first physical node that monitors sensor data to determine when the sensor data qualifies for an operation triggering event. Once the sensor data qualifies for the operation triggering event, the first physical node may generate and communicate a notification to a second physical node to initiate a new operation to support the triggering event. | 2020-04-30 |
20200133747 | SYSTEM AND METHOD FOR SUPPORTING DATA COMMUNICATION IN A MOVABLE PLATFORM - A system includes a memory buffer, a first data processor, a second data processor, and a controller. The first data processor performs a write operation to write data into the memory buffer and provides a first reference indicating a status or progress of the write operation. The controller provides a second reference indicating a buffer block in the memory buffer. The second data processor receives the first reference and the second reference, uses a threshold and the first reference to determine whether the buffer block contains enough data to be processed by the second data processor, obtains data to be processed from the buffer block using the second reference if the buffer block contains enough data to be processed, and processes the data obtained from the buffer block. | 2020-04-30 |
20200133748 | MESSAGING IN A MULTI-CLOUD COMPUTING ENVIRONMENT - A method for messaging in a hybrid multi-cloud computing environment may include receiving, from a multi-cloud controller, a message. The hybrid multi-cloud computing environment may include multiple cloud platforms hosted on private, on premise infrastructure as well as public, third-party infrastructure. The multi-cloud controller may send the message to control an operation of the cloud platform. In response to receiving the message from the multi-cloud controller, the message may be deposited in message queue. The cloud platform may send a request to retrieve data destined for the cloud platform. The message from the message queue may be sent to the cloud platform in response to the request. Related systems and articles of manufacture, including computer program products, are also provided. | 2020-04-30 |
20200133749 | METHOD AND APPARATUS FOR TRANSFORMATION OF MPI PROGRAMS FOR MEMORY CENTRIC COMPUTERS - According to a method of transforming a message passing interface (MPI) program, an MPI function is parsed such that a computer may directly access data created by another computer through a memory when an MPI parallel program is executed on a computer system for distributed processing, a network function corresponding to the MPI function is created for network communication, and a bus line function is created for directly accessing the memory through a bus line. | 2020-04-30 |
20200133750 | METHODS, APPARATUS AND COMPUTER PROGRAMS FOR MANAGING PERSISTENCE - Described are methods, apparatus and computer programs for managing persistence within a data processing system such as a messaging system, database system or file system. The method for managing persistence includes a deferred evaluation ( | 2020-04-30 |
20200133751 | AUTOMATED CONSOLIDATION OF API SPECIFICATIONS - A method may include receiving first and second application programming interface (API) specifications. The method may include comparing first and second API Specification according to a set of criteria. Responsive to the first and second criteria being identical, the method may include identifying first and second objects. Responsive to the first and second criteria being identical, the method may include classifying a type of the first and second objects and associating one or more parameters in the first and second objects with a consolidated object. The one or more parameters in the first and second objects may be associated with the consolidated object based on the type of the first and second object. The method may include generating a consolidated specification that includes the consolidated object and a description of the one or more parameters of the first and second objects that are associated with the consolidated object in a single API specification. | 2020-04-30 |
20200133752 | PREDICTION OF POWER SHUTDOWN AND OUTAGE INCIDENTS - An information handling system (IHS), baseboard management controller (BMC) and method are provided for preventing critical operations when power shutdown is predicted. A service processor of a BMC of the IHS executes a predicted power operation (PPO) utility to monitor health data from physical memory devices of memory of the IHS. Based on the health data, the service processor predicts that at least one of the physical memory devices will fail, causing a power shutdown of the IHS. To prevent any critical operation that is executed by a host processing subsystem of the IHS being adversely affected by the shutdown, the service processor of the BMC updates information contained in a PPO software sensor to indicate the predicted power down. | 2020-04-30 |
20200133753 | USING A MACHINE LEARNING MODULE TO PERFORM PREEMPTIVE IDENTIFICATION AND REDUCTION OF RISK OF FAILURE IN COMPUTATIONAL SYSTEMS - Input on a plurality of attributes of a computing environment is provided to a machine learning module to produce an output value that comprises a risk score that indicates a likelihood of a potential malfunctioning occurring within the computing environment. A determination is made as to whether the risk score exceeds a predetermined threshold. In response to determining that the risk score exceeds a predetermined threshold, an indication is transmitted to indicate that potential malfunctioning is likely to occur within the computing environment. A modification is made to the computing environment to prevent the potential malfunctioning from occurring. | 2020-04-30 |
20200133754 | DATA-STRUCTURE BASED DYNAMIC PROGRAM TARGETING CONTROL - Feedback relating to errors in memory operations on a plurality of memory cells is received by a memory sub-system. At least one processing level corresponding to a program distribution is updated based on the feedback to adjust an error measure between pages of the plurality of memory cells and to adjust a read window budget within a page of the plurality of cells. The updating of the at least one processing level is based on information for the at least one processing level that is stored in a data-structure. | 2020-04-30 |
20200133755 | METHOD AND SYSTEM FOR INTELLIGENTLY RESOLVING FAILURES RECURRING IN INFORMATION TECHNOLOGY ENVIRONMENTS - A method and system for intelligently resolving failures recurring in information technology (IT) environments. Specifically, the method and system disclosed herein may be directed to the resolution of persistently-occurring failures observed in data backup and/or data recovery operations. Further, resolution of any given persistently-occurring failure may entail the identification of zero, one, or more solutions (e.g., patches and/or other instructions) based on the analyses of failure-related information and host-related configuration information using machine learning and/or artificial intelligence paradigms. In cases where zero solutions are identified, the conventional and manual investigative route by way of support ticketing may be pursued. | 2020-04-30 |
20200133756 | METHOD, APPARATUS AND COMPUTER STORAGE MEDIUM FOR ERROR DIAGNOSTICS OF AN APPLICATION - Embodiments of the present disclosure provide methods, apparatus, and computer storage media for application error diagnosis. The method of application error diagnosis may include obtaining information related to an error in an application, generating a code of the information related to the error in the application, determining a similarity between the code and at least one predetermined code, wherein the at least one predetermined code is being associated with a known software bug. The method further includes determining at least one software bug related to the error in the application by comparing the similarity with a predetermined threshold. | 2020-04-30 |
20200133757 | Apparatus and Method for Diagnosing Communication Fault - Provided is an apparatus and method for diagnosing a communication fault. The apparatus includes a first slave module, a second slave module and a master module. The first slave module receives a synchronization signal through the first communication line and a first output signal through the second communication line, and transmits an input signal through the third communication line. The second slave module receives synchronization signal through the first communication line, and transmits a comparison signal to the master module through the third communication line when the second slave module receives a second output signal through the second communication line. The master module transmits the synchronization signal, the first output signal and the second output signal, and diagnose a communication fault by comparing a value of the comparison signal with a predetermined reference value or a value of the input signal. | 2020-04-30 |
20200133758 | Method, device, and computer program product for facilitating prediction of disk failure - A method of facilitating prediction of a disk failure The method includes obtaining operation information and failure information associated with a plurality of disks, wherein the plurality of disks comprising a first set of disks indicated by the failure information as having a failure and a second set of disks indicated by the failure information as having no failure; determining validity of the failure information associated with a first set of disks based on system context information related to the storage system comprising the first set of disks; and in response to determining that the failure information associated with at least one of the first set of disks is valid, generating a machine learning model based on the operation information and the failure information associated with the first set of disks. | 2020-04-30 |
20200133759 | SYSTEM AND METHOD FOR MANAGING, RESETTING AND DIAGNOSING FAILURES OF A DEVICE MANAGEMENT BUS - Embodiments are described for operating a device management bus coupled to a remote access controller and a managed device. The remote access controller detects an inoperable state of the bus and determines a FRU (Field Replaceable Unit) memory is accessible on the managed device. A predefined reset indicator is written to the FRU memory. The managed device monitors for the reset indicator being written to a specified location in FRU memory. Upon detecting the reset indicator in FRU memory, the managed device resets a bus controller coupled to the device management bus and transmits a reset notification on the device management bus. The remote access controller may include an I2C shim that controls access to an I2C multiplexer utilized for transmitting I2C commands from a service processor and an I2C coprocessor, preventing certain inoperable bus states due to concurrent operation of the I2C multiplexer by the I2C coprocessor and the service processor. | 2020-04-30 |
20200133760 | DATABASE SYSTEM PERFORMANCE DEGRADATION DETECTION - Among other things, embodiments of the present disclosure relate to detecting performance degradation in database systems. Other embodiments may be described and/or claimed. | 2020-04-30 |
20200133761 | SMART SYSTEM DUMP - Techniques are disclosed for performing dump collection on a computing system. One technique includes detecting an error event on the computing system. After detecting the error event, a subset of hardware registers associated with the error event are determined. One or more hardware units within the computing system to capture data from are determined from a set of rules that specify an association between the one or more hardware units and the subset of hardware registers associated with the error event. Data is captured from each of the one or more hardware units. | 2020-04-30 |
20200133762 | CONTINUING A RUNNING SCRIPT AFTER MODIFICATION - A computer-implemented method includes detecting that a first script has been modified to an updated script and that the first script is currently running. A data key point is selected from among a set of data key points available in the first script. At the selected data key point in the first script, a current state of the first script is saved in a storage object external from the first script, responsive to detecting that the first script has been modified. An execution point is selected in the updated script. The current state of the first script is loaded into the updated script. The updated script is run from the execution point, with the current state of the first script. | 2020-04-30 |
20200133763 | PROCESSING OF DATA - A method and associated apparatus is disclosed for processing data by means of an error code, wherein the error code has an H-matrix with n columns and m rows, wherein the columns of the H-matrix are different, wherein component-by-component XOR sums of adjacent columns of the H-matrix are different from one another and from all columns of the H-matrix and wherein component-by-component XOR sums of nonadjacent columns of the H-matrix are different from all columns of the H-matrix and from all component-by-component XOR sums of adjacent columns of the H-matrix. | 2020-04-30 |
20200133764 | SOFTWARE-ASSISTED FINE-GRAINED DATA PROTECTION FOR NON-VOLATILE MEMORY STORAGE DEVICES - Selective use of a software path and hardware path help to provide fine-grained T10-PI support while maintaining IO operation efficiency for single IO read/write commands transferring multiple data segments. NVMe hardware capability (i.e. the hardware path) is always utilized for CPU-intensive CRC verification. NVMe hardware capability is utilized for application tag and reference tag verification whenever possible. Software running on a computing node (i.e. the software path) is used for application tag and reference tag verification and replacement when those functions cannot be implemented by the NVMe hardware. | 2020-04-30 |
20200133765 | ANTI-TEARING PROTECTION SYSTEM FOR NON-VOLATILE MEMORIES - The present invention concerns an anti-tearing protection system ( | 2020-04-30 |
20200133766 | DETECTING SINGLE EVENT UPSETS AND STUCK-AT FAULTS IN RAM-BASED DATA PATH CONTROLLERS - In one embodiment, a method includes receiving data comprising a plurality of data elements; creating a binary sequence comprising a plurality of bonus bits using a first binary sequence generator; using a first exclusive-or module to provide a XOR calculation using bits of each data element of the data with a bonus bit from the binary sequence; passing each data element along with its corresponding parity bit to an input of a data path; receiving each data element along with its corresponding parity bit at an output of the data path; creating the binary sequence using a second binary sequence generator; using a second XOR module to XOR together bits of each data element along with its corresponding parity bit and a bonus bit from the binary sequence to produce a result; and analyzing the result to determine whether an error has occurred to the data in the data path. | 2020-04-30 |
20200133767 | DATA STORAGE DEVICE AND ADAPTIVE DATA-READING METHOD THEREOF - A data storage device is provided. The data storage device includes a flash memory and a controller. The flash memory includes a plurality of blocks for storing data and each block includes a plurality of pages. The controller is configured to convert a host read command into a read-operation instruction to the flash memory to perform a default read operation to read page data from the flash memory. The default read operation has a default read threshold voltage. In response to a failure of the default read operation, the controller is configured to sequentially perform a read operation on the flash memory using a read threshold voltage with respect to each entry of a plurality of entries in a read-retry table, and replace the default read threshold voltage with the read threshold voltage corresponding to the read operation being successfully performed. | 2020-04-30 |
20200133768 | SEMICONDUCTOR MEMORY DEVICE, CONTROLLER, AND MEMORY SYSTEM - Disclosed are a semiconductor memory device, a controller, and a memory system. The semiconductor memory device includes a memory cell array including a plurality of memory cells, and an error correcting code (ECC) decoder configured to receive first data and a parity output from selected memory cells of the memory cell array. The ECC decoder generates a syndrome based on the first data and the parity, generates a decoding status flag (DSF) indicating a type of an error of the first data by the syndrome, and outputs the second data and the DSF to an external device outside of the semiconductor memory device when a read operation of the semiconductor memory device is performed. | 2020-04-30 |
20200133769 | MEMORY WORDLINE ISOLATION FOR IMPROVEMENT IN RELIABILITY, AVAILABILITY, AND SCALABILITY (RAS) - A memory device that performs internal ECC (error checking and correction) can treat an N-bit channel as two N/2-bit channels for application of ECC. The ECC for an N/2-bit channel is simpler than the ECC for N bits, and thus, each N/2-bit portion can be separately correctable when treated as two N/2-bit portions. The memory device can include an additional hardware for the application of ECC to the channel as two sub-channels. For example, the memory device can include an additional subarray to store ECC bits for the internal ECC to enable the application of ECC to two sub-channels of the N-bit channel. The memory device can include an additional driver to access the additional subarray when applied. | 2020-04-30 |
20200133770 | KEY VALUE SSD - A storage device includes: a plurality of memory devices configured as a virtual device utilizing stateless data protection; and a virtual device layer configured to manage the virtual device to store objects by applying a first data protection to some of the objects and a second data protection to other ones of the objects depending on respective sizes of the objects. | 2020-04-30 |
20200133771 | INLINE RELIABILITY CODING FOR STORAGE ON A NETWORK - This disclosure describes a programmable device, referred to generally as a data processing unit, having multiple processing units for processing streams of information, such as network packets or storage packets. This disclosure also describes techniques that include enabling data durability coding on a network. In some examples, such techniques may involve storing data in fragments across multiple fault domains in a manner that enables efficient recovery of the data using only a subset of the data. Further, this disclosure describes techniques that include applying a unified approach to implementing a variety of durability coding schemes. In some examples, such techniques may involve implementing each of a plurality of durability coding and/or erasure coding schemes using a common matrix approach, and storing, for each durability and/or erasure coding scheme, an appropriate set of matrix coefficients. | 2020-04-30 |
20200133772 | REDISTRIBUTING DATA ACROSS DRIVES OF A STORAGE ARRAY BASED ON DRIVE HEALTH METRICS - Techniques are presented for maintaining data distributed across a plurality of storage drives (drives) in a robust manner. A method includes (a) collecting physical state information from each drive of the plurality of drives, (b) generating a predicted failure probability of each drive based on the collected physical state information from that drive, the predicted failure probability indicating a likelihood that that drive will fail within a predetermined period of time, and (c) rearranging a distribution of data across the plurality of drives to minimize a probability of DU/DL. Systems, apparatuses, and computer program products for performing similar methods are also provided. | 2020-04-30 |
20200133773 | DATA AND METADATA STORAGE IN STORAGE DEVICES - In an example, a storage device includes a plurality of pages, a main page table structure, and an auxiliary page table structure. The main page table structure includes a first data mapping between a logical address of first data and a first physical address pointing to a first data page. Further, the auxiliary page table structure includes a first metadata mapping between a logical address of first metadata and a second physical address pointing to a first metadata page. | 2020-04-30 |
20200133774 | METHOD, DEVICE AND PROGRAM PRODUCT FOR MANAGING DATA OF RAID - Techniques manage data of a Redundant Array of Independent Disks (RAID). Such techniques involve: obtaining a first parity of checksum pair, which is determined based on a first checksum when user data of data disks in the RAID are predetermined values; determining, based on current checksums of the data disks in the RAID, a second parity of checksum pair of the RAID, the first parity of checksum pair and the second parity of checksum pair respectively comprising a row parity of checksum and a diagonal parity of checksum; and determining, based on the first parity of checksum pair and the second parity of checksum pair, a third parity of checksum pair for updating parity data of parity disks of the RAID. | 2020-04-30 |
20200133775 | METHOD, DEVICE, AND COMPUTER READABLE STORAGE MEDIUM FOR MANAGING REDUNDANT ARRAY OF INDEPENDENT DISKS - Techniques manage a redundant array of independent disks. In such a technique, a response time of a first storage device in the RAID is compared to a first threshold. In response to the response time of the first storage device exceeding the first threshold, the first storage device is configured as a pseudo-degraded storage device, such that the pseudo-degraded storage device is responsive to write requests only. | 2020-04-30 |
20200133776 | METHODS, DEVICES AND COMPUTER READABLE MEDIUM FOR MANAGING A REDUNDANT ARRAY OF INDEPENDENT DISKS - A technique involves: in response to establishing a stripe in a Redundant Array of Independent Disks (RAID), generating first mapping information of the stripe in a block allocated for the stripe, the RAID being built based on extents obtained by dividing disks, the stripe including a first extent set, the first mapping information recording respective disk locations of the first extent set; in response to a failure occurring in a first disk where a first extent in the first extent set is located, replacing the first extent with a second extent to obtain a second extent set corresponding to the stripe; generating second mapping information of the stripe in the block, to record respective disk locations of the second extent set; and in response to the first disk being recovered from the failure, restoring data in the stripe based on the first mapping information and the second mapping information. | 2020-04-30 |
20200133777 | MASTERLESS RAID FOR BYTE-ADDRESSABLE NON-VOLATILE MEMORY - A system includes byte-addressable non-volatile memory (NVM) modules. The system includes media controllers communicatively connected to one another over a memory semantic fabric. Each media controller is responsible for a corresponding NVM module to which the media controller is attached. The media controllers cooperatively provide redundant array of independent disks (RAID) functionality at a granularity at which the NVM modules are byte-addressable without employing a master RAID controller. | 2020-04-30 |
20200133778 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR MANAGING STORAGE SYSTEM - According to implementations of the present disclosure, there is provided a method for managing a storage system, extents in the storage system being from multiple storage devices in a resource pool associated with the storage system. In the method, regarding multiple extents comprised in a storage device among the multiple storage devices, respective service states of the multiple extents are obtained. Respective features of respective extents among the multiple extents are determined on the basis of respective service states of the multiple extents. An association relation between a failure in an extent in a storage device in the resource pool and a feature of the extent is obtained. A failure extent in which a failure is to be occurred is identified from the multiple extents on the basis of respective features of the multiple extents and the association relation. | 2020-04-30 |
20200133779 | METHOD, APPARATUS, AND COMPUTER READABLE MEDIUM FOR I/O CONTROL - Techniques providing I/O control involve: in response to receiving an I/O request, detecting a first set bits for a stripe in a RAID. The RAID is built on disk slices divided from disks. The stripes include extents. Each of the first set bits indicates whether a disk slice where a corresponding extent in the stripe is located is in a failure state. The techniques further involve determining, from the stripe and based on the first set bits, a first set of extents in the failure state and a second set of extents out of the failure state. The techniques further involve executing the I/O request on the second set of extents without executing the I/O request on the first set of extents. Such techniques can simplify storage bits in I/O control, support the degraded stripe write request for the RAID and enhance performance executing the I/O control. | 2020-04-30 |
20200133780 | METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR DATA PROCESSING - Embodiments of the present disclosure provide a method, a device and a computer program product for data processing. The method comprises determining, at a first node of a plurality of nodes of a metadata management system, a set of nodes from the plurality of nodes that store access information associated with a shard of metadata; determining, from the set of nodes, the number of available nodes capable of providing the shard; and adjusting the number of available nodes based on a threshold number. In this way, a distributed management of the shard of metadata in each node could be achieved without using the management node in a conventional way. | 2020-04-30 |
20200133781 | RULE BOOK BASED RETENTION MANAGEMENT ENGINE - Systems and methods for determining retention periods or policies for backups are disclosed. A rule book stores relationships between rules and recommended retention periods. Data related to a backup is collected and organized. A query is generated from the organized data and used to identify a rule from the rule book. The retention period corresponding to the identified rule in the rule book is then applied to the corresponding backup. | 2020-04-30 |
20200133782 | RESTORING A DIRECTORY TO A STATE PRIOR TO A PAST SYNCHRONIZATION EVENT - The present technology pertains to restoring a directory to a state prior to a past synchronization event. A content management system can present an interface including history of synchronization events for a directory, and a user can select to restore a directory to a state prior to any one of the past synchronization events. | 2020-04-30 |
20200133783 | OPTIMIZING BACKUP PERFORMANCE WITH HEURISTIC CONFIGURATION SELECTION - Embodiments are described for a heuristic configuration selection process as part of or accessible by the backup management process. This processing component provides a method to automatically determine the configuration parameters needed to obtain optimal performance for a given backup/restore job. This process involves identifying key parameters that determine backup performance and suggest means to derive and incorporate those configurable parameters into the backup software automatically. Embodiments can be applied to stream based backups, or other types of backup software as well. | 2020-04-30 |
20200133784 | SYSTEMS AND METHODS FOR PERFORMING BACKUPS OF A SERVER DATABASE - Systems and methods for performing differential and full data protection operations. Parameters that define minimum, interval, and maximum values are provided to an agent. These values relate to changes in the data or in a database. The agent monitors the database and backups are triggered in accordance with these values. A differential backup is not performed until the minimum value is reached and differential backups are performed only after subsequent intervals are reached. A full backup is performed once the maximum value is reached. | 2020-04-30 |
20200133785 | SOURCE-SIDE ACCELERATED INDEXING FOR DATA PROTECTION SEARCH - A method, apparatus, and system for storing indexed metadata associated with backed up data is provided. The operations comprising: for each first data item stored at a first client device to be backed up, extracting, at the first client device, an associated first metadata item; transforming, at the first client device, the first metadata item based on a predefined metadata definition; associating, at the first client device, a first client identifier and a backup identifier with the transformed first metadata item; and transferring the transformed first metadata item from the first client device to a metadata bus of a search cluster. | 2020-04-30 |
20200133786 | RESTORING A DIRECTORY TO A STATE PRIOR TO A PAST SYNCHRONIZATION EVENT - The present technology pertains to restoring a directory to a state prior to a past synchronization event. A content management system can present an interface including history of synchronization events for a directory, and a user can select to restore a directory to a state prior to any one of the past synchronization events. | 2020-04-30 |
20200133787 | METHOD, ELECTRONIC DEVICE AND COMPUTER READABLE MEDIUM OF FILE MANAGEMENT - Embodiments of the present disclosure relate to method, electronic device and computer readable medium of file management. The method comprises: generating an index structure of files in first backup data created at a first point of time, the index structure at least indicating a file name and associated path information of each of the files, the first backup data being incremental backup data relative to second backup data created at a second point of time prior to the first point of time; determining, for a folder involved in the first backup data, existing files that have been present at the second point of time in the folder based on the second backup data; and identifying files modified between the first point of time and the second point of time in the folder by determining whether the index structure comprises index items of the existing files. Accordingly, the modified files can be quickly identified and the computation complexity can be reduced. Moreover, the processing can be efficiently executed for larger backup data. | 2020-04-30 |
20200133788 | METHOD, DEVICE AND COMPUTER READABLE MEDIUM FOR RESTORING FILES - Embodiments of the present disclosure relate to a method, device and computer readable medium for restoring files. The method described herein comprises: at a client, in response to receiving an instruction for restoring a set of files on a virtual machine from a backup server, obtaining a backup of a set of files from the backup server; transmitting information about the backup and a file downloading application to the virtual machine; causing the file downloading application to be executed on the virtual machine by transmitting an instruction for executing the file downloading application to the virtual machine, such that the virtual machine downloads the backup from the client based on the information about the backup. | 2020-04-30 |
20200133789 | APPLICATION CONSISTENT SNAPSHOTS AS A SIDECAR OF A CONTAINERIZED APPLICATION - Systems and methods for performing data protection operations in a containerized application. A sidecar application is associated with or attached to a main application. The sidecar application has access to the resources of the main application. Backup requests are handled by the sidecar so that the application, which may be stateful, can be placed in a consistent state prior to performing the backup operation. The backup operation is then performed on the consistent application or on the data that is quiesced. | 2020-04-30 |
20200133790 | TIERED DATA STORAGE MANAGEMENT SYSTEM - Management and configuration of a tiered data storage system are described. An agent software application on computing devices in a first tier processes snapshot backups and pushes them to an appliance software application on a server in a second tier. The agent software application may optionally store checkpoint backups in the first tier. The appliance software application processes archive backups and pushes them to cloud storage in a third tier. A cloud application on a management server receives storage policy specifications from customers and promulgates the policies to the agent software application and the appliance software application. The policy specifications include an optional checkpoint specification including a checkpoint time period for backups in the first tier, a snapshot specification including a snapshot time period for backups in the second tier, and an archive specification including an archive time period for backups in the third tier. | 2020-04-30 |
20200133791 | METHODS AND SYSTEMS TO INDEX FILE DATA OF VIRTUAL MACHINE (VM) IMAGE - According to one embodiment, one or more consistent states of a virtual machine (VM) are backed up and stored. An index library is used to extract, from the consistent state(s) of the VM, metadata corresponding to content files captured in the consistent state(s). The extracted metadata is stored into a metadata catalog, where the metadata catalog is subsequently downloaded by an index server to index the content files captured in the consistent state(s). | 2020-04-30 |
20200133792 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR MANAGING VIRTUAL MACHINE - The present disclosure relates to a method, apparatus and computer program product for managing a virtual machine. According to example implementations of the present disclosure, there is provided a method for managing a virtual machine. In the method, in response to receiving a backup request for the virtual machine, corresponding metadata of a corresponding object of at least one object in the virtual machine is obtained, the corresponding metadata describing multiple attributes of the corresponding object in a file system of the virtual machine. A corresponding abstract describing a basic attribute of multiple attributes of the corresponding object is generated on the basis of the corresponding metadata. An index of a backup version of the virtual machine is created on the basis of the corresponding abstract, the index comprising a corresponding path of the corresponding object in the backup version of the virtual machine. Moreover, there is provided an apparatus and computer program product for managing a virtual machine. | 2020-04-30 |
20200133793 | PRIORITIZED LEADERSHIP FOR DATA REPLICATION GROUPS - Data replication groups may be used to store data in a distributed computing environment. A data replication group may include a set of nodes executing a consensus protocol to maintain data durably. In order to increase efficiency and performance of the data replication group leadership and/or fitness information may be determined for each node of the set of nodes executing the consensus protocol. The fitness information may be based at least in part on information associated with computing resource in the distributed computing environment and one or more constraints on assignment of a role of master node in the data replication group. The master node may be responsible for advancing the data replication group. | 2020-04-30 |
20200133794 | STORAGE SYSTEM WITH SCANNING AND RECOVERY OF INTERNAL HASH METADATA STRUCTURES - A storage system in one embodiment comprises a plurality of storage devices and a storage controller. The storage controller is configured to scan data pages and associated metadata structures of the storage system, the metadata structures comprising at least a first metadata structure associating unique hash identifiers with physical locations of respective data pages in the storage system and a second metadata structure associating the physical locations of respective data pages with hash digests of the data pages and the unique hash identifiers. The storage controller is further configured to detect an error in one of the first and second metadata structures. Responsive to the detected error, the storage controller recovers a corresponding portion of the metadata based at least in part on one or more entries of the other one of the first and second metadata structures. The unique hash identifiers illustratively comprise respective shortened representations of the hash digests, such as hash handles uniquely corresponding to respective ones of the hash digests. | 2020-04-30 |
20200133795 | SMART DYNAMIC RESTORE FOR KUBERNETES BASED APPLICATIONS - One example method includes discovering an application topology, discovering relationships between microservices that are elements of the application topology, ranking the microservices, identifying one or more of the microservices as a persistency microservice, selecting one or more persistency microservices for backup, and defining a backup policy based on the microservice relationships, the microservice rankings, and the selected persistent microservices. A backup operation is then performed that includes backing up persistent data and/or persistent metadata generated and/or modified by one or more of the persistency microservices. | 2020-04-30 |
20200133796 | EFFICIENT METHOD AND SYSTEM OF INTELLIGENT DEPLOYING FILE LEVEL RESTORE AGENT IN MULTICLOUD - A method, apparatus, and system for managing file level restore agents is provided. The operations comprising: determining a computing resource usage level at a data protection appliance; determining whether the computing resource usage level at the data protection appliance is below a first threshold; in response to determining that the computing resource usage level at the data protection appliance is below a first threshold, assigning a new file level restore-associated job to a first tier file level restore agent for performance; and in response to determining that the computing resource usage level at the data protection appliance is not below a first threshold, assigning the new file level restore-associated job to a second tier file level restore agent for performance. | 2020-04-30 |
20200133797 | ONLINE RECOVERY APPROACH TO SPACE ACCOUNTING - Techniques for performing online recovery of space accounting metadata. The techniques include reestablishing a plurality of counters for tracking amounts of physical storage space committed and/or unique to the volumes and/or volume families. The techniques include, while reestablishing the counters, conducting a tree walk through a mapping hierarchy of each volume and/or volume family, marking starting and ending points through the mapping hierarchy, and monitoring a logical offset from the starting point during the tree walk. Upon receipt of an IO request, the techniques determine whether the IO request and space accounting metadata recovery activities are attempting to access the same metadata based on the logical offset relative to the starting point, and update the counters and/or temporary versions of the counters, as appropriate. By providing such techniques, metadata inconsistencies can be addressed while allowing users of the data storage system full or at least partial access to their data. | 2020-04-30 |
20200133798 | METHOD TO RESOLVE CONFLICTS DURING RECOVERY IN A STORAGE SYSTEM - An aspect of resolving conflicts during recovery operations includes separating journal entries for first and second types of recovery operations into each of a first and second array. For each entry in the first array, an aspect includes taking a range lock of a designated number of the addresses and creating an entry in a table. For each entry in the second array, an aspect includes upon determining a corresponding sub-LUN has been locked for an entry in the first array, incrementing a count in the table. Upon determining the corresponding sub-LUN is not locked for the entry, an aspect includes taking the address lock for the entry in the second array. An aspect further includes opening gates for a corresponding address, performing a first recovery operation corresponding to the first type of recovery operation, and performing a second recovery operation corresponding to the second type of recovery operation. | 2020-04-30 |
20200133799 | AUXILIARY STORAGE DEVICE PROVIDING INDEPENDENT BACKUP AND RECOVERY FUNCTIONS AND APPARATUS EMPLOYING SAME - An auxiliary storage device is disclosed. The device provides independent backup and recovery functions: enables easy use by attaching a commercialized auxiliary memory device in existing computers; minimizes of access time to the auxiliary memory device; enables automatic backup of data in a computer auxiliary memory device; recovers original data from a specific time using data that has been backed up through a simple operation when data on the auxiliary memory device has been damaged; and performs a recovery function for the auxiliary memory device by rebooting using backed-up OS information as needed. | 2020-04-30 |
20200133800 | KEY-VALUE STORE ON PERSISTENT MEMORY - A technique for reducing recovery time in a computing apparatus includes: storing data in a key-value store residing in a persistent memory, the key-value store including a plurality of persistent nodes including key-value pairs, the key-value pairs of the persistent nodes being unsorted; caching selected persistent nodes in a volatile memory, the key-value pairs of the cached nodes being sorted, the caching including instantiating a dual pointer for each cached node, the dual pointer including a volatile pointer to a child node of the cached node and a persistent pointer to the child node of the corresponding persistent node in the key-value store; and rebuilding the cache of selected nodes upon demand using the dual pointers in the event of recovery. | 2020-04-30 |
20200133801 | SYSTEM AND METHOD FOR DATA BACKUP IN MIXED DISK ENVIRONMENT - A production host that hosts virtual machines includes a physical disk and a backup agent. The physical disk is utilized by a virtual machine of the virtual machines. The backup agent obtains a backup generation request; makes a first determination that the backup generation request impacts the physical disk; in response to the first determination: generates a mirror virtual disk for the physical disk; generates a backup of the mirror virtual disk as a backup of the physical disk; and stores the backup of the mirror virtual disk in backup storage. | 2020-04-30 |
20200133802 | SYSTEM AND METHOD FOR PREDICTIVE BACKUP IN A DISTRIBUTED ENVIRONMENT - A production host for hosting virtual machines includes a persistent storage and a production agent. The persistent storage stores virtual machine data of the virtual machines. The production agent obtains a dynamic backup generation rule for the virtual machines; for a predetermined period of time after obtaining the dynamic backup generate rule: generates first backups of the virtual machines based on the dynamic backup generate rule; and identifies a change rate of the virtual machine data; after the predetermined period of time, obtain a prediction-based backup generation rule that is based on the change rate of the virtual machine data over the predetermined period of time; and generates second backups of the virtual machines based on the prediction-based backup generation rule. | 2020-04-30 |
20200133803 | METHOD FOR OPERATING A MICROCONTROLLER AND MICROCONTROLLER - A method for operating a microcontroller, which includes a processor and a peripheral circuit on a common chip, the method including initiating a process in the peripheral circuit, in the peripheral circuit generating recovery data, executing the process, checking whether the process has been executed successfully and, in the event that the check reveals that the process has not been executed successfully, generating recovered data from the recovery data, and executing the process again. | 2020-04-30 |
20200133804 | METHOD, APPARATUS AND COMPUTER STORAGE MEDIUM FOR DATA SYNCHRONIZATION - Techniques provide for data synchronization. For example, such a technique may involve: obtaining respective synchronization characteristics of a group of synchronization jobs to be processed, each synchronization characteristic indicating at least one of an expected completion time instant and an amount of data to be synchronized of a corresponding synchronization job; prioritizing the group of the synchronization jobs based on the synchronization characteristics; and controlling execution of the group of the synchronization jobs based on a result of the prioritizing. Accordingly, high priority is given to the synchronization jobs which can be rapidly completed thereby improving the Recovery Point Objective (RPO) achievement rate before occurrence of a failure. | 2020-04-30 |
20200133805 | SYSTEM AND METHOD TO DETECT AND RECOVER FROM INOPERABLE DEVICE MANAGEMENT BUS - Embodiments are described for detecting and recovering from an inoperable device management bus. A remote management controller is configured to offload device management bus transactions that use a messaging protocol. The messing protocol transactions are offloaded to a bus protocol controller that is responsible for managing bus operations using the messaging protocol. The bus protocol controller updates a set of bus status counters stored in a shared memory based on the processing of the offloaded messaging protocol transactions. The remote management controller processes device management bus transactions that use a bus protocol and updates the bus status counters based on the status of the bus protocol transactions. The remote management controller determines the status of the device management bus based on the bus status counters in shared memory, if the device management bus is inoperable, resets the remote management controller. | 2020-04-30 |
20200133806 | STORAGE DEVICE AND METHOD OF OPERATING THE SAME - A memory controller controls a memory device including a plurality of memory blocks and a plurality of power modules respectively providing voltages to a plurality of word line groups, the memory controller comprising: a fail block detector detecting fail blocks on which an erase operation has failed among the plurality of memory blocks, and detecting fail word line groups among a plurality of word line groups included in each of the fail blocks; a fail block manager detecting, among the plurality of power modules, a defective power module providing the voltages to two or more fail word line groups each included in a different fail block among the fail blocks; and a power defect controller controlling the memory device such that the defective power module is changed to another power module among the plurality of power modules. | 2020-04-30 |
20200133807 | CONCURRENT REMOTE IO PROCESSING FOR SYNCHRONOUS REPLICATION - In a data storage system in which a first storage array and a second storage array maintain first and second replicas of a production volume, the first storage array is responsive to a write command from a host to send a notification to the second storage array indicating that the replicated production volume will be updated. The notification has information that enables the second storage array to implement pre-processing steps to prepare for subsequent receipt of data associated with the write command. Both storage arrays implement the pre-processing steps at least partly concurrently. When the data associated with the write command is subsequently received, the first storage array writes the data to cache and then sends a copy of the data to the second storage array, i.e. in series. The second storage array then writes the data to cache. Elapsed time between receipt of the write command and returning an acknowledgment to the host may be improved by concurrent pre-processing. | 2020-04-30 |
20200133808 | REDUCING THE SIZE OF FAULT DOMAINS - A separate family space is provisioned as a separate fault domain for each production device in a storage system. The space provisioned for each family has contiguous logical block addresses that do not overlap with the address space of any other family. Snaps and clones in a first family space are used for fault recovery without interrupting IOs to a second family space. If the first family space points to the same virtual block as other families as a result of deduplication then the virtual block is un-deduped. For example, another instance of the virtual block may be created and pointers updated such that only the first family space points to one of the virtual block instances. | 2020-04-30 |
20200133809 | METHOD, DEVICE AND PROGRAM PRODUCT FOR MANAGING DATA OF STORAGE DEVICE - A technique involves: in response to receiving a request to write data to a storage device, acquiring metadata of a redundant array of independent disks (RAID) extent that is associated with the request to write data, the RAID extent being built based on disk slices comprised in a plurality of disks of the storage device; determining, based on the metadata, a disk slice of data write-enabled RAID extent to write the data; and copying an identification and a degradation number into a metadata page associated with a mapper for data recovery, the identification and degradation number being comprised in the metadata and associated with the data write-enabled RAID extent, the mapper being used to map a physical space and a virtual logical space, and the degradation number indicating the number of times that the disk slice comprised in the RAID extent changes from being normal to being degraded. | 2020-04-30 |
20200133810 | METHOD FOR MANAGING MULTIPLE DISKS, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - Techniques involve: detecting whether a first set of disks include an inaccessible disk, respective disk sections in the first set of disks forming a first set of stripes; in response to detecting the first set of disks including the inaccessible disk, determining faulty stripes in the first set of stripes, the faulty stripes including a first number of inaccessible disk sections; and in response to the first number exceeding a second number of free sections of the first set of disks, moving data in at least one stripe in the first set of stripes to free sections of the second set of disks to release sections of the at least one stripe, respective disk sections in the second set of disks forming a second set of stripes, each stripe in the first set of stripes and the second set of stripes having the same number of sections. | 2020-04-30 |
20200133811 | METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR REBUILDING DATA - Techniques provide for rebuilding data. Such techniques involve: obtaining health status information related to a first disk of a storage system, the first disk being divided into a plurality of disk units, and the health status information indicating a failure of a first disk unit of the plurality of disk units; determining a data block stored in the first disk unit based on a mapping between data blocks for the storage system and storage locations; and rebuilding the data block into a second disk of the storage system when maintaining accessibility of other data blocks in other disk units of the first disk than the first disk unit. Accordingly, it is possible to improve the data rebuilding efficiency when a disk fails partly and to continue utilizing the storage space portion in the disk that is not failed, without making the disk be offline temporarily. | 2020-04-30 |
20200133812 | CONTROL APPARATUS, CONTROL METHOD, AND COMPUTER PROGRAM - A control apparatus that communicates with a plurality of on-vehicle control devices through in-vehicle communication lines, and includes an acquisition unit configured to acquire electric energy of a battery supplying electric power to the plurality of on-vehicle control devices, and a control unit configured to instruct, in a case where predicted electric energy of the battery at a time when a process by a target device that is one of the plurality of on-vehicle control devices is completed is lower than a first threshold, other on-vehicle control devices to stop respective processes by the other on-vehicle control devices executed in parallel with the process by the target device. | 2020-04-30 |
20200133813 | OUT-OF-SPECIFICATION DETECTION - Particular embodiments described herein provide for an electronic device that can be configured to include a system condition engine and non-volatile memory. The system condition engine is configured to monitor a condition associated with an electronic device and non-volatile memory. The non-volatile memory can store a predetermined specification range or a specification threshold for the condition and when the condition is outside of the predetermined specification range or exceeds the specification threshold, the system condition engine can record that the condition was outside of the predetermined specification range or exceeded the specification threshold in the non-volatile memory. In an example, the non-volatile memory may be a fuse, especially a field programmable fuse. | 2020-04-30 |
20200133814 | APPLICATION PERFORMANCE ANALYTICS PLATFORM - Various embodiments are generally directed to techniques of collecting analyzing information on various types of applications in an environment by an application performance analytics platform and acting on the analyzed information. The application performance analytics platform may include at least a monitoring system, a time series database, and an APM tool collector, all of which may be programmatically interfaced with or connected to each other. The APM tool collector may access or pull APM metrics from one or more APM tools and input the metrics to the monitoring system. The time series database may access or pull log files and extract log data for analysis. Based on the analysis, the application performance analytics platform may generate one or more alerts. | 2020-04-30 |
20200133815 | TRANSACTION-BASED EVENT TRACKING MECHANISM - A request is received from a client device to connect to a wireless network associated with a cloud computing device. A first notification is received to indicate that a first client transaction has started. Using a first timer, a first timestamp associated with a start time of the first client transaction is identified. A first data frame having the first client transaction and the first timestamp is generated. A second notification indicating that the first client transaction has completed is received. Using the first timer, a second timestamp associated with an end time of the first client transaction is identified. Using the second timestamp, the first data frame is updated using the second timestamp. The first data frame is sent to the cloud computing device. | 2020-04-30 |
20200133816 | MONITORING AN ARTIFICIAL INTELLIGENCE (AI) BASED PROCESS - An Artificial Intelligence (AI)-based automated process is monitored via a process monitoring system that identifies components used in the execution of the sub-processes of the automated process. Various metrics are selected for collection prior to or during the execution of the AI-based automated process. The values of the metrics are collected as step outputs corresponding to the sub-processes. A final output generated upon the execution of the automated process is also collected. The step outputs can be used to determine the reason why the automated process produced a certain final output. | 2020-04-30 |
20200133817 | SYSTEM AND METHOD FOR PROACTIVELY HEALING A MAINFRAME COMPUTER SYSTEM - A system and method for generating a data set structured for recognition of time series data by a machine learning computer are provided. The method includes acquiring time series data, generating tensor units based on the time series data, and identifying a target tensor unit including a time of failure of a mainframe computer system. The method further includes generating tensor sets, in which at least one tensor set includes the target tensor unit. The generated tensor sets are then migrated to a machine learning computer for generating or updating of a computer model based on the time series data, the computer model recognizing a data pattern preceding the time of failure of the mainframe computer system. The computer model is then applied to data in a production environment for identifying a production data pattern corresponding to a data pattern recognized in the tensor sets. | 2020-04-30 |
20200133818 | INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM - An information processor includes an operation history obtaining unit configured to obtain operation histories created user operations at a terminal device; a function identifying unit configured to, based on the obtained operation histories, identify a function performed by the user operations as an operation target function; an operation extracting unit configured to, based on information about the operation target function identified by the function identifying unit, extract predetermined operation histories from the obtained operation histories; an index calculating unit configured to calculate an index which indicates a level of efficiency of the operations for the operation histories extracted by the operation extracting unit; an operation selecting unit configured to, based on the index, select the operation histories having a predetermined efficiency; and an output controller configured to output a guide information based on the operation histories selected by the operation selecting unit. | 2020-04-30 |
20200133819 | TECHNIQUES FOR ANALYZING THE PROFICIENCY OF USERS OF SOFTWARE APPLICATIONS - A command map GUI that illustrates command usage patterns of a first entity and/or a comparison between the first entity and a second entity. A server receives and stores command usage data from a plurality of clients, each client executing a software application that enables a set of commands. A client displays the GUI based on command usage data received from the server. The GUI displays a circle chart comprising a plurality of segments representing various command categories, each segment including a wedge that represents the amount of usage of the corresponding command category. The GUI also displays a plurality of data points, each data point representing a command, wherein the distance from the center of the circle chart represents the amount of usage of the corresponding command. The GUI may display a certification and/or an unused command recommended for a user based on command usage patterns of the user. | 2020-04-30 |
20200133820 | PERFORM PREEMPTIVE IDENTIFICATION AND REDUCTION OF RISK OF FAILURE IN COMPUTATIONAL SYSTEMS BY TRAINING A MACHINE LEARNING MODULE - A machine learning module is trained by receiving inputs comprising attributes of a computing environment, where the attributes affect a likelihood of failure in the computing environment. In response to an event occurring in the computing environment, a risk score that indicates a predicted likelihood of failure in the computing environment is generated via forward propagation through a plurality of layers of the machine learning module. A margin of error is calculated based on comparing the generated risk score to an expected risk score, where the expected risk score indicates an expected likelihood of failure in the computing environment corresponding to the event. An adjustment is made of weights of links that interconnect nodes of the plurality of layers via back propagation to reduce the margin of error, to improve the predicted likelihood of failure in the computing environment. | 2020-04-30 |
20200133821 | LOG EVENT MANAGEMENT MECHANISM - Techniques and structures to facilitate management of log event messages, including transmitting one or more messages, each having a unique identifier (ID), to a computing device, generating a comparison checksum for each of the one or more messages, wherein each comparison checksum is associated with a unique ID corresponding to a message from which the comparison checksum was generated, performing an encryption on each comparison checksum and associated unique ID to generate encryption data and transmitting the encryption data to the computing device. | 2020-04-30 |
20200133822 | SYSTEM AND METHOD FOR ANALYZING BIG DATA ACTIVITIES - A system and method for analyzing big data activities are disclosed. According to one embodiment, a system comprises a distributed file system for the entities and applications, wherein the applications include one or more of script applications, structured query language (SQL) applications, Not Only (NO) SQL applications, stream applications, search applications, and in-memory applications. The system further comprises a data processing platform that gathers, analyzes, and stores data relating to entities and applications. The data processing platform includes an application manager having one or more of a MapReduce Manage, a script applications manager, a structured query language (SQL) applications manager, a Not Only (NO) SQL applications manager, a stream applications manager, a search applications manager, and an in-memory applications manager. The application manager identifies if the applications are one or more of slow-running, failed, killed, unpredictable, and malfunctioning. | 2020-04-30 |
20200133823 | IDENTIFYING KNOWN DEFECTS FROM GRAPH REPRESENTATIONS OF ERROR MESSAGES - According to at least one embodiment, a known defect record, which includes a unique identifier for the known defect and one or more log files associated with the known defect, is accessed. A log file of the known defect record is accessed, and an error message is identified. The error message indicates one or more classes involved in producing the error and one or more methods associated with each class. A pattern object is generated based on the error message and the classes and methods indicated in the error message, and a known defect graph is updated based on the pattern object. The known defect graph includes vertices representing pattern objects for error messages identified in known defects of the defect management system, and edges representing relationships between the pattern objects, with each vertex indicating one or more defect identifiers for known defect records associated with the pattern object. | 2020-04-30 |
20200133824 | COMPUTING SYSTEM WITH GUI TESTING DEVICE AND RELATED METHODS - A computing system may include a client computing device configured to execute a software application with an associated GUI. The GUI includes fields, and each field is to hold a text string. The computing system may include a GUI testing device in communication with the client computing device and configured to execute a testing framework for interacting with the software application to generate versions of the GUI, each of the versions being in a different language, and defining expected text strings in the fields. The GUI testing device may be configured to extract the fields from the versions of the GUI, perform OCR processing on the fields to generate actual text strings, and compare the actual text strings with the expected text strings. | 2020-04-30 |
20200133825 | SYSTEMS AND METHODS FOR DEBUGGING APPLICATIONS CREATED WITH A GRAPHICAL PROGRAMMING LANGUAGE - A graphical programming debugging system and method are provided. The system, for example, may include, but is not limited to a graphical programming debugger comprising a processor and a memory, the processor configured to receive a selection of one of a plurality of interconnected nodes of an application, each of the plurality of interconnected nodes associated with a screen displayed to a user executing the application, execute the selected node, capture a log of the execution of the selected node, the log including a history of any variables used while the selected node was executed, a history of any processes which occurred during the execution of the selected node, and any errors encountered while executing the selected node, and simultaneously display the screen associated with the node as executed with the captured log. | 2020-04-30 |
20200133826 | TESTING AN ONLINE SYSTEM FOR SERVICE ORIENTED ARCHITECTURE (SOA) SERVICES - The present invention generally relates to system test, and more specifically, related to online system test. In an aspect, a computer-implemented method for online system test is provided. In this method, a test rule for testing the online system is obtained. And a test result from a real user action of the online system based on the test rule will be retrieved. And a test report is generated at least based on the test result from the real user action. | 2020-04-30 |
20200133827 | SERVICE VIRTUALIZATION PLATFORM - Various embodiments are generally directed to techniques of creating or managing one or more virtual services using at least one application programming interface (API). At a plugin layer, a plugin integrator programmatically interfaces with and integrates one or more virtualization tools. The plugin integrator may be programmatically interfaced with the at least one API. At least one proxy agent may be used to run or consumer the one or more virtual services. The at least one API and the at least one proxy agent may be implemented in an abstraction layer. | 2020-04-30 |
20200133828 | Conducting Automated Software Testing Using Centralized Controller and Distributed Test Host Servers - Aspects of the disclosure relate to conducting automated software testing using a centralized controller and one or more distributed test host servers. A computing platform may receive a test execution request. Subsequently, the computing platform may retrieve test specification details information and may identify one or more tests to execute. Then, the computing platform may generate one or more remote test execution commands directing a test host server farm to execute the one or more tests. In addition, generating the one or more remote test execution commands may include constructing one or more command line instructions to be executed by the test host server farm and inserting the one or more command line instructions into the one or more remote test execution commands. Thereafter, the computing platform may send the one or more remote test execution commands to the test host server farm. | 2020-04-30 |
20200133829 | METHODS AND SYSTEMS FOR PERFORMANCE TESTING - A method includes executing a web-based application within a first browser, executing and displaying a second browser inside of the web-based application, receiving, via the second browser, data indicative of one or more inputs including a browser session and recording and storing the one or more inputs on a computer readable medium. | 2020-04-30 |
20200133830 | FORECASTING A QUALITY OF A SOFTWARE RELEASE USING MACHINE LEARNING - In some examples, a server may retrieve and parse test results associated with testing a software package. The server may determine a weighted sum of a software feature index associated with a quality of the plurality of features, a defect index associated with the defects identified by the test cases, a test coverage index indicating a pass rate of the plurality of test cases, a release release reliability index associated with results of executing regression test cases included in the test cases, and an operational quality index associated with resources and an environment associated with the software package. The server may use a machine learning algorithm, such as a time series forecasting algorithm, to forecast a release status of the software package. The server may determine, based on the release status, whether the software package is to progress from a current phase to a next phase of a development cycle. | 2020-04-30 |
20200133831 | SYSTEM, METHOD AND APPARATUS FOR DATA MANIPULATION - A system, apparatus and method for utilizing a transpose function to generate a two-dimensional array from three-dimensional input data. The use of the transpose function reduces redundant elements in the resultant two-dimensional array thereby increasing efficiency and decreasing power consumption. | 2020-04-30 |
20200133832 | Data processing method for memory and related data processor - The present invention provides a data processing method for a memory and a related data processor for performing the method. A page of data may be divided into multiple groups. In each group, the number of “1”s and the number of “0”s are determined, so as to determine whether to reverse or keep the bit data in the group. The encoding scheme may make the bit value “0” more concentrated on the middle states of the state distribution than the bit value “1”. The data processor thereby reverses the bit data in a group if the number of “1”s is greater than the number of “0”s in the group, and keeps the bit data in a group if the number of “1”s is less than the number of “0”s in the group. As a result, the occurrence probability of the states at two sides becomes lower and the occurrence probability of the middle states becomes higher. This improves data retention of the memory. | 2020-04-30 |
20200133833 | WRITE ATOMICITY MANAGEMENT FOR MEMORY SUBSYSTEMS - Exemplary methods, apparatuses, and systems include receiving an instruction to atomically write data to a memory component. A plurality of write commands for the first data are generated, including an end of atom indicator. The first plurality of write commands are sent to the memory component while accumulating a plurality of translation table updates corresponding to the write commands One or more translation tables are updated with the plurality of translation table updates in response to determining that the final write command has been successfully sent to the memory component. | 2020-04-30 |
20200133834 | POWER-ON-TIME BASED DATA RELOCATION - A total estimated occupancy value of a first data on a first data block of a plurality of data blocks is determined. To determine the total estimated occupancy value of the first data block, a total block power-on-time (POT) value of the first data block is determined. Then, a scaling factor is applied to the total block POT value to determine the total estimated occupancy value of the first data block. Whether the total estimated occupancy value of the first data block satisfies a threshold criterion is determined. Responsive to determining that the total estimated occupancy value of the first data block satisfies the threshold criterion, data stored at the first data block is relocated to a second data block of the plurality of data blocks. | 2020-04-30 |
20200133835 | DATA STORING METHOD, MEMORY CONTROLLING CIRCUIT UNIT AND MEMORY STORAGE DEVICE - A data storing method, a memory controlling circuit unit and a memory storage device are provided. The method includes: receiving a first data; determining whether a wear degree value of a rewritable non-volatile memory module is less than a threshold; if the wear degree value of the rewritable non-volatile memory module is less than the threshold, storing the first data into the rewritable non-volatile memory module by using a first mode; and if the wear degree value of the rewritable non-volatile memory module is not less than the threshold, storing the first data into the rewritable non-volatile memory module by using a second mode. A reliability of the first data stored by using the first mode is higher than a reliability of the first data stored by using the second mode. | 2020-04-30 |
20200133836 | DATA MANAGEMENT APPARATUS, DATA MANAGEMENT METHOD, AND DATA MANAGEMENT PROGRAM - A storage system includes: a memory for caching of data according to input and output to a storage device; and a CPU connected to the memory. The memory includes: a DRAM high in access performance; and an SCM identical in a unit of access to the DRAM, the SCM being lower in access performance than the DRAM. The CPU determines whether to perform caching to the DRAM or the SCM, based on the data according to input and output to the storage device, and caches the data into the DRAM or the SCM, based on the determination. | 2020-04-30 |