Patent classifications
G06F11/004
Action recommendation to reduce server management errors
An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
Learning machine behavior related to install base information and determining event sequences based thereon
Methods, apparatus, and processor-readable storage media for learning machine behavior related to install base information and determining event sequences based thereon are provided herein. An example computer-implemented method includes parsing data storage information based at least in part on parameters related to install base information comprising temporal parameters and event-related parameters; formatting the parsed set of data storage information into a parsed set of sequential data storage information compatible with a neural network model; training the neural network model using the parsed set of sequential data storage information and additional training parameters; predicting, by applying the trained neural network model to the parsed set of sequential data storage information, a future data unavailability event and/or a future data loss event; and outputting an alert based at least in part on the predicted future data unavailability event and/or predicted future data loss event.
Virtual fibre channel port migration
This disclosure is directed to a computer-implemented method, systems, and devices to migrate a virtual fibre channel (VFC) connection from a first hardware communication path to a second hardware communication path within a fibre channel (FC) network prior to failure of a device in the first hardware communication path. For example, a hypervisor database may contain health status with respect to recoverable failure incidents across host bus adaptor (HBA) ports for a source HBA port and a target HBA port associated with a first VFC connection using the first hardware communication path. If it is determined that a number of recoverable failure incidents on at least one component in the first hardware communication path has occurred, migration of the first VFC connection from the first hardware communication path to a second hardware communication path may be initiated prior to actual hard failure.
Storage device that uses a host memory buffer and a memory management method including the same
A storage device is provided which shares a host memory with a host. The storage device includes an interface that exchanges data with the host and implements a protocol to use a partial area of the host memory as a buffer of the storage device. A storage controller of the storage device monitors deterioration information of a first area of the buffer and transmits a corruption prediction notification associated with the first area to the host based on a result of the monitoring.
Processor core debugging with processor virtualization
A device, such as a system on a chip (SoC), includes a plurality of processor cores, a broadcaster module, a plurality of decoder units, and an aggregator module. The broadcaster module broadcasts a debug request from a debugger device to one or more of the plurality of processor cores via a bus, the debug request including an address specifying a logical identifier associated with a target processor core of the plurality of processor cores. The decoder units, associated with the processor cores, forward the debug request to a debug module of the respective processor core in response to detecting a match. If no match is detected, the decoder units forward the debug request to a subsequent processor core via the bus. The aggregator module forward a response message to the debugger device, the response message originating from the target processor core.
APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ML ASSISTED SERVICE RISK ANALYSIS OF UNRELEASED SOFTWARE CODE
Methods, apparatuses, or computer program products provide for generating a service risk analysis score data object. A service risk analysis request associated with an unreleased code object is received. One or more service risk analysis attributes are extracted using a service risk analysis layer based at least in part on the unreleased code object. A service risk analysis score data object is generated using a service risk analysis machine learning model based at least in part on the one or more service risk analysis attributes. The service risk analysis score data object is output.
STORAGE DEVICES AND OPERATING METHODS OF STORAGE CONTROLLERS
Storage devices and an operating method of a storage controller configured to control storage devices. For example, the storage device may include a non-volatile memory and a storage controller. The non-volatile memory includes a first block and a second block, the first block including first memory cells each storing N-bit data, and the second block including second memory cells each storing M-bit data. During a read reclaim operation on the first block, the storage controller determines read hot data stored in the first block and writes the read hot data to the second block. The storage controller may select a first word line corresponding to a first page in which a number of error bits is equal to or greater than a threshold value and determine data stored in a page corresponding to a second word line adjacent to the first word line as the read hot data.
Data set overlay protection
A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
STORAGE MEDIA SCRUBBER
Aspects of the present disclosure relate to detecting and correcting a storage array's drive sectors to prevent data loss. In embodiments, a storage array's telemetry information is monitored. Further, one or more state or operational metrics of the storage array's storage drives are measured. Additionally, each storage drive is scrubbed based on each drive's relative scrubbing priority defined by the telemetry information and each storage drive's state or operation metrics.
RESOURCE SELECTION FOR COMPLEX SOLUTIONS
Techniques described herein relate to a method for composition for complex solutions. The method may include receiving, by a system control processor manager, a composition request to compose a composed information handling system, the request comprising a solution manifest file; parsing, by the system control processor manager, the solution manifest file to identify a solution requirement set; performing, using the solution requirement set, an analysis of a telemetry data map and a topology and connectivity graph; making a determination, based on the analysis, that the composition request may be satisfied using resources represented in the topology and connectivity graph; and composing the composed information handling system based on the determination.