Patent classifications
G06F2213/0008
Transmission and reception system, data reception apparatus, and data reception method using plural transmision paths
A data reception apparatus connected to a data transmission apparatus via transmission paths includes: error detection circuits that are each provided for each of the transmission paths and that each detect an error in received data that has been received from the data transmission apparatus; storage circuits that are each provided for each of the transmission paths and that each store the received data and read the received data at a reported read position at a reported read timing; a selection circuit that selects one of the transmission paths according to error detection results provided by the error detection circuits; and a report circuit that compares received data stored by a storage circuit corresponding to a selected transmission path with received data stored by each of other storage circuits and, according to a comparison result, reports the read timing and the read position to each of the storage circuits.
Dynamic background scan optimization in a memory sub-system
Aspects of the present disclosure are directed to performing varying frequency memory sub-system background scans using either or both a timer and an I/O event limit. This can be accomplished by identifying a background scan trigger event from one of multiple possible types of background scan trigger events, such as a timer expiration or reaching an event count limit. In response to the background scan trigger event, a background scan can be initiated on a memory portion. The background scan can produce results, such as CDF-based data. When a metric based on the results exceeds a background scan limit, a refresh relocation can be performed and logged. A metric can be generated based on the CDF-based data, obtained error recovery depth data, or refresh relocation event data. When the metric is above or below corresponding background scan thresholds, a background scan frequency can be adjusted.
MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT ON A HOST SYSTEM
A host port is enabled for security. In response to a determination by the host port that authentication or security association negotiation with a storage port cannot be completed successfully, the host port determines whether an audit mode indicator has been enabled in a login response from the storage port. The host port preserves input/output (I/O) access to the storage port based on determining whether the audit mode indicator has been enabled in the login response from the storage port.
IMPLEMENTING MANAGEMENT COMMANDS UTILIZING AN IN-BAND INTERFACE
A computer-implemented method according to one embodiment includes receiving, at a peripheral device via an in-band interface, a predetermined command; determining, by the peripheral device, a predetermined identifier within the predetermined command; and implementing, by the peripheral device, parameter data associated with the predetermined identifier, in response to the determining.
Lite network switch architecture
Disclosed embodiments include a network switch having a first group of switch elements and a second group of switch elements. The second group of switch elements is cross-connected to the first group of switch elements to passively route network traffic through the network switch in accordance with a predefined configuration.
I/O expansion device, control system, and automotive system
According to one embodiment, an I/O expansion device configured to communicate with a master circuit and an electrical component includes a port circuit configured to transmit an output signal to the electrical component based on a first input signal from the master circuit, a memory that stores first setting data set by the first input signal from the master circuit, a comparison circuit configured to compare second setting data set by a second input signal from the master circuit with the first setting data stored in the memory and transmit an abnormality signal to the master circuit when the second setting data is not identical with the first setting data.
RAID PERFORMANCE BY OFFLOADING TASKS TO EXPANDERS
A RAID storage management system includes a plurality of RAID storage devices and a controller configured to manage the plurality of RAID storage devices. The RAID storage management system also includes at least one expander operatively connected to the controller and operatively connected to the plurality of RAID storage devices. The expander is configured to receive a request from the controller for a RAID operation. The expander is also configured to, upon receiving the request, operate to assist the controller in performing the requested RAID operation.
CONNECTIVITY TYPE DETECTION FOR A DATA STORAGE SYSTEM
Connectivity type detection for a data storage system in accordance with the present description includes, in one aspect of the present description, automated host-target discovery logic which is configured to automatically discover the connectivity type for a connection path between a host and a storage system, and select and initiate target discovery procedures which are appropriate for the discovered connectivity type. As a result, mapping a target volume of the target storage system which is connected to the host, may be facilitated, reducing or eliminating delays which may have otherwise resulted from the change in connectivity type. In this manner, efficiency of the computing system may be improved. Other aspects and advantages may be realized, depending upon the particular application.
SYSTEM AND METHOD FOR PROVIDING IN-STORAGE ACCELERATION (ISA) IN DATA STORAGE DEVICES
A data storage device includes: a data storage medium; a processor comprising a plurality of processor cores; a plurality of application acceleration black-box (AABB) slots including reconfigurable logic blocks, interconnects, and memories; a host interface that receives a host command from a remote application running on a remote host computer, wherein the host command includes an image file including a register-transfer level (RTL) bitstream and a firmware driver; and a configuration controller that downloads the RTL bitstream to an AABB slot of the plurality of AABB slots and reconfigure the AABB slot, and load the firmware driver to a processor core of the processor. The processor core loaded with the firmware driver runs a data acceleration process of the remote application to access and process data stored in the data storage medium using the RTL bitstream downloaded in the AABB slot.
SYSTEM AND METHOD FOR SECURELY CONNECTING TO A PERIPHERAL DEVICE
A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.