G06F2201/805

Information processing device, external storage device, host device, relay device, control program, and control method of information processing device
11544131 · 2023-01-03 · ·

According to the embodiments, an external storage device switches to an interface controller for supporting only a read operation of nonvolatile memory when a shift condition for shifting to a read only mode is met. A host device switches to an interface driver for supporting only the read operation of the nonvolatile memory when determining to recognize as read only memory based on information acquired from the external storage device.

Servicing of network software components of nodes of a cluster storage system

Described herein are method and apparatus for servicing software components of nodes of a cluster storage system. During data-access sessions with clients, client IDs and file handles for accessing files are produced and stored to clients and stored (as session data) to each node. A serviced node is taken offline, whereby network connections to clients are disconnected. Each disconnected client is configured to retain its client ID and file handles and attempt reconnections. Session data of the serviced node is made available to a partner node (by transferring session data to the partner node). After clients have reconnected to the partner node, the clients may use the retained client IDs and file handles to continue a data-access session with the partner node since the partner node has access to the session data of the serviced node and thus will recognize and accept the retained client ID and file handles.

Scalable byzantine fault-tolerant protocol with partial tee support
11546145 · 2023-01-03 · ·

A method is provided for preparing a plurality of distributed nodes to perform a protocol to establish a consensus on an order of received requests. The plurality of distributed nodes includes a plurality of active nodes, the plurality of active nodes including a primary node, each of the plurality of distributed nodes including a processor and computer readable media. The method includes preparing a set of random numbers, each being a share of an initial secret. Each share of the initial secret corresponds to one of the plurality of active nodes. The method further includes encrypting each respective share of the initial secret, binding the initial secret to a last counter value to provide a commitment and a signature for the last counter value, and generating shares of a second and of a plurality of subsequent additional secrets by iteratively applying a hash function to shares of each preceding secret.

Metadata control in a load-balanced distributed storage system
11544226 · 2023-01-03 · ·

A plurality of computing devices are communicatively coupled to each other via a network, and each of the plurality of computing devices is operably coupled to one or more of a plurality of storage devices. A plurality of failure resilient address spaces are distributed across the plurality of storage devices such that each of the plurality of failure resilient address spaces spans a plurality of the storage devices. The plurality of computing devices maintains metadata that maps each failure resilient address space to one of the plurality of computing devices. The metadata is grouped into buckets. Each bucket is stored in a group of computing devices. However, only the leader of the group is able to directly access a particular bucket at any given time.

Data recovery validation test

Techniques are described for a data recovery validation test. In examples, a processor receives a command to be included in the validation test that is configured to validate performance of an activity by a server prior to a failure to perform the activity by the server. The processor stores the validation test including the command on a memory device, and prior to the failure of the activity by the server, executes the validation test including the command responsive to an input. The processor receives results of the validation test corresponding to the command and indicating whether the server performed the activity in accordance with a standard for the activity during the validation test. The processor provides the results of the validation test in a user interface.

Management Method, Management Terminal, And Management System

A management terminal, which manages one of a tractor, a rice transplanter, and a combine harvester, as a plurality of types of work machines that perform a plurality of types of work, respectively, on a field, is provided with a storage portion which stores a management application for managing the plurality of types of work machines, a control device which activates the management application, and a display portion. When the control device activates the management application, the control device displays, on the display portion, a plurality of app activation icons corresponding to the plurality of types of work machines, respectively, in such a way that the plurality of app activation icons are selectively operable. Also, the control device activates, in response to selective operation of any one of the plurality of app activation icons, an individual application for operating the work machine corresponding to the selectively operated app activation icon.

Assisted problem identification in a computing system

A method, system and computer program product for providing support for identification of the problem root cause in a computing system. Knowledge base mapping monitoring programs with respective to one or more technical problem definitions and a predefined system configuration are provided. The technical problems are defined using a predefined data structure. An inquiry relating to the computing system is received from a requester. The inquiry indicates a technical problem statement of the computing system. The received inquiry is parsed for constructing a problem description in accordance with the predefined data structure. A set of monitoring programs of the knowledge base may be identified using the problem description. Using software and/or hardware configuration data of the computing system, the set of monitoring programs may be instantiated in a monitor system. The instantiated programs may be provided to the requester as support for identification of the problem root cause.

Reducing service disruptions in a micro-service environment
11537458 · 2022-12-27 · ·

Aspects of the disclosure provide for reducing service disruptions in a computer system. A method of the disclosure may include identifying a plurality of services running on a node of a computer system, determining a plurality of priorities corresponding to the plurality of services, determining a plurality of service capacity factors for the plurality of services in view of the plurality of priorities, and determining a lost impact factor in view of the plurality of service capacity factors.

Automation and optimization of data recovery after a ransomware attack

In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.

Method for protecting application data and terminal

A method for protecting application data includes detecting a deleting operation performed by a first application on first data. The method also includes determining, based on a preset condition, whether to delete the first data of the first application. The method further includes renaming the first data of the first application based on a determination that the first application meets the preset condition. The method additionally includes storing the renamed first data in a memory.