Patent classifications
G06F3/00
Memory system and control method thereof
A memory system includes a non-volatile memory, and a controller configured to issue a first command requesting a first operation to the non-volatile memory and a second command to the non-volatile memory. The second command may be for requesting a duration time of the first operation or for requesting an execution stage of the first operation. In accordance with the information returned by the non-volatile memory in response to the second command, the controller issues a third command requesting a completion status of the first operation to the non-volatile memory. The first operation may be a data read operation, a data write operation, or a data erase operation.
System method for facilitating memory media as file storage device based on real-time hashing by performing integrity check with a cyclical redundancy check (CRC)
A system is provided to receive a request to write data to a storage device, wherein the data is associated with a file name and a file path. The system performs a hash function on an input based on the file name and the file path to obtain a hash value, wherein the hash function comprises a plurality of hash methods performed on the input. The system maps the hash value to a physical location in the storage device, and writes the data to the physical location in the storage device.
Interactive control method and device for voice and video communications
The present invention discloses an interactive control method executed during instant video communication between a user and one or more other users. The method comprises: monitoring video information collected by a camera during the instant video communication between the user and the one or more other users; performing recognition on the video information after acquiring the video information, to acquire user behavior data inputted by the user in a preset manner; determining whether the user behavior data comprises preset trigger information; when it is determined that the user behavior data comprises the preset trigger information, further determining whether the user behavior data comprises a preset gesture action; and when it is determined that the user behavior data comprises the preset gesture action, determining an operation instruction corresponding to the preset gesture action in a preset operation instruction set, and performing an event corresponding to the operation instruction.
Zero footprint robotic process automation system
Computerized RPA methods and systems that increase the flexibility and lower the cost with which RPA systems may be deployed are disclosed herein. In one embodiment, an RPA system and method avoids the need for preinstalled RPA software on a device employed by a user to create and/or execute software robots to perform RPA. In another embodiment, an RPA system and method provides a capability to execute software robots that may have been encoded in one or more programming languages to execute on an operating system different than that employed by a server of the RPA system.
MANAGING SERVICES ACROSS CONTAINERS
Services can be managed across containers. A management service can obtain or compile configuration information for containerized applications and containerized services that are hosted on a computing device. The configuration information can define how a containerized application is dependent on a containerized service. Using the configuration information, the management service can establish data paths between containers to enable container services running in the containers to perform cross-container communications by which a containerized application in one container can access a containerized service in another container. The management service may also enable a container service to perform communications by which a containerized application can access services provided by the host operating system.
Hierarchical memory systems
Apparatuses, systems, and methods for hierarchical memory systems are described. A hierarchical memory system can leverage persistent memory to store data that is generally stored in a non-persistent memory, thereby increasing an amount of storage space allocated to a computing system at a lower cost than approaches that rely solely on non-persistent memory. In an example apparatus, an input/output (I/O) device can receive signaling that includes a command to write to or read data from an address corresponding to a non-persistent memory device, and can determine where to redirect the request. For example, the I/O device can determine to write or read data to and/or from the non-persistent memory device or the persistent memory device based at least in part on one or more characteristics of the data.
CUSTOMIZATIONS IN STANDARD APPLICATION PROGRAMMING INTERFACES (APIs) PROVIDED BY A CLOUD COMPUTING PLATFORM
Technologies are provided for supporting tenant customizations in a cloud computing platform. A standard application programming interface (API) can be defined to support a generic set of parameters that allow tenant-specified custom data to be passed to and from the standard API. The generic set of parameters allow the standard API to process requests and responses that include a payload that comprises tenant-specified custom data. The payload allows the tenant-specified custom data to be passed to and from the standard API. When a request is received at the cloud computing platform, a request payload of the request, that includes tenant-specified custom data, can be processed at the standard API, and a response can be sent from the cloud computing platform that includes a response payload that includes the tenant-specified custom data.
SURFACING RELEVANT TOPICS IN A GROUP-BASED COMMUNICATION SYSTEM
A system, method, and computer-readable media for surfacing relevant topics discussed in a synchronous multimedia collaboration session to interested non-participants of the synchronous multimedia collaboration session. A relevant topic of the synchronous multimedia collaboration session may be determined based in part on audio data from the synchronous multimedia collaboration session. At least one non-participating member with an interest in the relevant topic of the synchronous multimedia collaboration session may be identified. A notification of the synchronous multimedia collaboration session associated with the relevant topic may be surfaced to the at least one non-participating member.
Extended asynchronous data mover functions compatibility indication
A method is provided that is executable by a processor of a computer. Note that the processor is communicatively coupled to a memory of the computer, and the memory stores a response block of a call command. In implementing the method, the processor defines a sub-functions field in the response block of the call command. Further the processor indicates that a set of functions of a set of instructions are installed and available at an interface based on a corresponding sub-functions flag within the sub-functions field being set. Note that the interface is also being executed on the computer and that the set of functions being represented by the corresponding sub-functions flag. The processor further indicates that the set of functions of the set of instructions are not installed based on the corresponding sub-functions flag not being set.
Data storage interface for protocol-agnostic storage services
- Sachin Suresh Bhat ,
- Lionel Bitoun ,
- LiJing Chen ,
- Jaikit Dungarshi Savla ,
- Daniel Wu ,
- Jaden Wright ,
- Adam Tessier ,
- Sourabh Shrivastav ,
- Rutvik Gopalkrishna Hora ,
- Manjunath Tumkur Maheshchandra ,
- Ramanathan Padinjarel Somanathan ,
- Manoj Kumar Dhanger ,
- Nitin Saini ,
- Jeet Nishit Mehta ,
- Ruonan Zhang ,
- Harshaneel Harshal Gokhale ,
- Ravneet Singh Sidhu
A data storage interface provides access to data storage clusters that may not otherwise be accessible to data accessors. The data storage interface can serve as a point of access for data accessors to access stored data via a consistent data access protocol, even when a data storage cluster on which requested data is stored may use a different protocol. The data storage interface can also provide access across network boundaries, such as those between different private cloud computing systems (e.g., virtual private clouds or “VPCs”).