G06F11/16

Processor system, engine control system and control method
09823957 · 2017-11-21 · ·

A processor system includes a master processor that successively processes a plurality of tasks, a checker processor that successively processes at least one of the plurality of tasks, and a control circuit that performs control so that the checker processor operates when the master processor and the checker processor perform a lock-step operation, and the checker processor stops its operation when the master processor and the checker processor do not perform the lock-step operation, the lock-step operation being an operation in which each of the master and checker processors processes the same task, in which the control circuit performs control so that a period from when a task is processed by the lock-step operation to when another task is processed in the next lock-step operation is equal to or shorter than a maximum test period, the maximum test period being a test period acceptable to the processor system.

Processor system, engine control system and control method
09823957 · 2017-11-21 · ·

A processor system includes a master processor that successively processes a plurality of tasks, a checker processor that successively processes at least one of the plurality of tasks, and a control circuit that performs control so that the checker processor operates when the master processor and the checker processor perform a lock-step operation, and the checker processor stops its operation when the master processor and the checker processor do not perform the lock-step operation, the lock-step operation being an operation in which each of the master and checker processors processes the same task, in which the control circuit performs control so that a period from when a task is processed by the lock-step operation to when another task is processed in the next lock-step operation is equal to or shorter than a maximum test period, the maximum test period being a test period acceptable to the processor system.

Method, device, and product for managing scrubbing operation in storage system
11669262 · 2023-06-06 · ·

The present disclosure relates to a method, device and product for managing scrubbing operations in a storage system. In the method for managing scrubbing operations in a storage system, regarding a plurality of extents included in the storage system, respective usage states of the plurality of extents are obtained. A group of target extents in which a failure will occur are detected from the plurality of extents based on the respective usage states of the plurality of extents. A scrubbing interval of the scrubbing operations to be performed on the storage system is adjusted according to the detected group of target extents. A scrubbing operation is performed on at least one part of the plurality of extents in the storage system according to the adjusted scrubbing interval, so as to identify a failed extent.

Mobile flash storage boot partition and/or logical unit shadowing

Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.

DATA RESTORATION USING BLOCK DISK PRESENTATIONS

In one example, a method is described herein. The method includes generating a block device presentation, the block device presentation corresponding to a snapshot to be restored. The method also includes configuring disk transport drivers on a virtual machine to make the block device presentation accessible. The method further includes receiving a disk read request for a specified logical block address. The method also further includes mapping a disk logical address to a backup object logical byte offset range. The method also further includes returning a selected data corresponding to the specified logical block address to a target storage device.

DATA RESTORATION USING BLOCK DISK PRESENTATIONS

In one example, a method is described herein. The method includes generating a block device presentation, the block device presentation corresponding to a snapshot to be restored. The method also includes configuring disk transport drivers on a virtual machine to make the block device presentation accessible. The method further includes receiving a disk read request for a specified logical block address. The method also further includes mapping a disk logical address to a backup object logical byte offset range. The method also further includes returning a selected data corresponding to the specified logical block address to a target storage device.

Extending a database recovery point at a disaster recovery site
11263238 · 2022-03-01 · ·

A DBA may pre-generate database recovery jobs on a convenient schedule at a local site, then recover a database at a disaster recovery site. Archive log files for the database that are generated in the interim between recovery job generation and recovery job execution are automatically incorporated into the recovery job when it executes, extending the recovery point closer to the time of the disruption that triggered the need or desire for recovery.

TWO-WAY REAL TIME COMMUNICATION SYSTEM THAT ALLOWS ASYMMETRIC PARTICIPATION IN CONVERSATIONS ACROSS MULTIPLE ELECTRONIC PLATFORMS

Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first communication request, from a web browser of a user. A request for information is sent to the web browser. A first communication as part of the first conversation is received from the user. A conversation identifier is identified and used to store the conversation of the first user. A request is received from a second, different, responder for the conversation. The conversation identifier is determined based on the request from the second responder. The request for information and first communication are retrieved from a persistent data store and sent to the second responder.

MEMORY SYSTEM HAVING OPTIMAL THRESHOLD VOLTAGE AND OPERATING METHOD THEREOF
20170330607 · 2017-11-16 ·

A semiconductor memory system and an operating method thereof include a memory device; and a memory controller including a sequence generator, a sequence analyzer, and a processor coupled to the memory device and containing instructions executed by the processor, and configured to generate a sequence by the sequence generator, wherein the sequence comprises a sequence of digital data, write the sequence associated with a user data to the memory device, read out a read data including the sequence and the associated user data, analyze the sequence to understand characters of the read data and create analysis result by the sequence analyzer, identify an optimal threshold voltage in accordance with the analysis result, and provide the optimal threshold voltage to an ECC engine.

FAILURE RECOVERY IN A SCALEOUT SYSTEM USING A MATRIX CLOCK
20230168972 · 2023-06-01 ·

One example method includes performing failure recovery operations in a computing system using matrix clocks. Each node or process in a computing system is associated with a matrix clock. As events and transitions occur in the computing systems, the matrix clocks are updated. The matrix clocks provide a chronological and casual view of the computing system and allow a recovery line to be determined in the event of system failure.