G06F2201/83

Restoring Lost Data
20230273865 · 2023-08-31 ·

Restoring lost data including detecting that a portion of the dataset stored in a first storage system has become unavailable, obtaining an identifier for the portion of the dataset, locating, using the identifier, a replacement portion of the dataset that is stored at one or more other storage systems, and writing, to the dataset that is stored in the first storage system, the replacement portion of the dataset as a replacement of the portion of the dataset that has become unavailable, where the writing occurs automatically, without user intervention.

Methods and apparatus to facilitate distributed data backup
11740979 · 2023-08-29 · ·

Methods, apparatus, systems and articles of manufacture are disclosed to facilitate distributed data backup. An example apparatus includes a controller to detect a trigger event for a distributed backup mode; and, in response to detection of the trigger event, trigger the distributed backup mode. When in the distributed backup mode, the controller of the example apparatus is to identify one or more receiving devices within communication range of the apparatus available to receive a data backup from the apparatus. The example apparatus includes a data distributor to distribute data from the apparatus among the one or more receiving devices. The controller of the example apparatus is to confirm receipt of the distributed data by the one or more receiving devices.

Apparatuses, methods, and systems for hardware-assisted lockstep of processor cores
11340960 · 2022-05-24 · ·

Systems, methods, and apparatuses relating to circuitry to implement lockstep of processor cores are described. In one embodiment, a hardware processor comprises a first processor core comprising a first control flow signature register and a first execution circuit, a second processor core comprising a second control flow signature register and a second execution circuit, and at least one signature circuit to perform a first state history compression operation on a first instruction that executes on the first execution circuit of the first processor core to produce a first result, store the first result in the first control flow signature register, perform a second state history compression operation on a second instruction that executes on the second execution circuit of the second processor core to produce a second result, and store the second result in the second control flow signature register.

SYSTEM AND METHOD FOR FACILITATING MANAGEMENT OF APPLICATION INFRASTRUCTURE FOR PLURALITY OF USERS
20220156121 · 2022-05-19 ·

A system and method for facilitating management of application infrastructure for plurality of users is disclosed. The method includes identifying a set of infrastructure components corresponding to an application and determining configuration information associated with the application based on the set of infrastructure components. The method further includes identifying a plurality of patterns of the application based on the configuration information of the set of infrastructure components and generating one or more application fingerprints corresponding to the application based on the plurality of patterns. Further, the method includes determining one or more anomalies in the application based on the one or more application fingerprints and generating one or more recommendations for resolving the one or more anomalies based on the one or more application fingerprints and prestored information. Furthermore, the method includes outputting the one or more anomalies and the one or more recommendations to one or more user devices.

Method and apparatus for redundant data processing in which there is no checking for determining whether respective transformations are linked to a correct processor core

An arrangement for redundant data processing has an integrated circuit in which the functionality of a multi-core processor is implemented. Processor cores (40; 50) of the multi-core processor are each designed to execute a useful program. The results which emerge from the execution of the useful program by the different processor cores are compared by a comparison module of the arrangement. The processor cores differ from one another with respect to an address or data structure (AS1, AS2; DS1, DS2) which is used by a processor core to respectively store and read data in or from a memory area (70; 80) that is assigned to the particular processor core. In terms of hardware, the individual processor cores are at least partially implemented separately in the integrated circuit.

Method and system to discover and manage distributed applications in virtualization environments

A method for managing a plurality of computing machines includes accessing a catalogue memory structure storing a plurality of component signatures, discovering one or more of the software components being instantiated in a software image of each computing machine according to corresponding ones of the component signatures, detecting one or more connections each being established between at least two instantiated software components of different computing machines, receiving a restore command for restoring a target recovery point selected among a plurality of recovery points, and restoring the target recovery point in response to the restore command by restoring the snapshots associated with the target recovery point on corresponding computing machines.

Systems and methods for efficient transfer of log data

According to one general aspect, a non-transitory computer readable medium includes instructions that, when executed by at least one processor, cause a computing device to read a string of a log file for an application, where the log file comprises multiple strings of log data, compare the string to signatures stored in a memory to find a matching signature, where each of the signatures is encoded with a signature identifier (ID), determine a deviation between the string and the matching signature, encode the string with the signature identifier (ID) of the matching signature and the deviation, and transfer the string to a destination computing device using the signature identifier (ID) of the matching signature, the deviation, and a timestamp of the string.

SKIPPING DATA BACKED UP IN PRIOR BACKUP OPERATIONS

Certain embodiments described herein relate to an improved selective data backup system. In some embodiments, one or more components in an information management system can determine that a portion of the primary data scheduled for backup was previously backed up or is scheduled to be backed up as part of another backup operation. For example, a data agent performing a cluster-level backup operation for an entire cluster of storage servers may check whether any part of the primary data was previously backed up by a prior server-level backup operation for one of the storage servers in the cluster. If so, the data agent may skip, in the cluster-level backup operation, any portion of the primary data stored in the storage server previously backed up as part of the prior server-level backup operation.

Source code issue assignment using machine learning
11726775 · 2023-08-15 · ·

Technologies are provided for assigning developers to source code issues using machine learning. A machine learning model can be generated based on multiple versions of source code objects (such as source code files, classes, modules, packages, etc.), such as those that are managed by a version control system. The versions of the source code objects can reflect changes that are made to the source code objects over time. Associations between developers and source code object versions can be analyzed and used to train the machine learning model. Patterns of similar changes to various source code objects can be detected and can also be used to train the machine learning model. When an issue is detected in a version of a source code object, the model can be used to identify a developer to assign to the issue. Feedback data regarding the developer assignment can be used to re-train the model.

Multi-tiered backup indexing

Certain embodiments disclosed herein reduce or eliminate a communication bottleneck at the storage manager by reducing communication with the storage manager while maintaining functionality of an information management system. In some implementations, a client obtains information for enabling a secondary storage job (e.g., a backup or restore) from a storage manager and stores the information (which may be referred to as job metadata) in a local cache. The client may then reuse the job metadata for multiple storage jobs reducing the frequency of communication with the storage manager. When a configuration of the information management system changes, or the availability of resources changes, the storage manager can push updates to the job metadata to the clients. Further, a client can periodically request updated job metadata from the storage manager ensuring that the client does not rely on out-of-date job metadata.