Patent classifications
G06F11/1402
Using persistent memory to enable restartability of bulk load transactions in cloud databases
Systems, methods, and computer-readable media for managing storing of data in a data storage system using a client tag. In some examples, a first portion of a data load as part of a transaction and a client identifier that uniquely identifies a client is received from the client at a data storage system. The transaction can be tagged with a client tag including the client identifier and the first portion of the data load can be stored in storage at the data storage system. A first log entry including the client tag is added to a data storage log in response to storing the first portion of the data load in the storage. The first log entry is then written from the data storage log to a persistent storage log in persistent memory which is used to track progress of storing the data load in the storage.
Backup agent scaling with evaluation of prior backup jobs
A number of backup agents to be deployed to a system can be predicted by training one or more machine learning (ML) objects of a first prediction algorithm and training one or more ML objects of a second prediction algorithm. The training can be performed with archived backup job data. Both prediction algorithms can be applied to the backup job data to predict execution duration of the backup jobs. The prediction algorithm with a lower error can be used to predict a total execution duration of a current number of backup jobs. An optimal number of backup agents can be predicted based on the predicted total execution duration and the current number of backup jobs.
System and method for modular construction of executable programs having self-contained program elements
A method for performing a fault tolerant automated sequence of computer implemented tasks including, presenting for selection by a user a plurality of pre-programmed elements, each pre-programmed element being independently executable relative each other pre-programmed element, receiving from the user a selection of one or more of the pre-programmed elements and a sequence for performing each pre-programmed element to form an exemplary routine, creating an instance of the exemplary routine, the instance of the exemplary routine including an instance of each of the selected pre-programmed elements arranged for performance in accordance with the sequence and configured to perform tasks defined by the pre-programmed elements and the sequence, initiating implementation of the instance of the exemplary routine by initiating performance of the instances of the pre-programmed elements in accordance with the sequence, and executing each instance of the pre-programmed elements according to the sequence.
Permitting unaborted processing of transaction after exception mask update instruction
A data processing apparatus has processing circuitry with transactional memory support circuitry to support execution of a transaction using transactional memory. In response to an exception mask updating instruction which updates exception mask information to enable at least one subset of exceptions which was disabled at the start of processing of a transaction, the processing circuitry permits un-aborted processing of one or more subsequent instruction of the transaction that follow the exception mask update instruction.
System and method for hybrid kernel- and user-space incremental and full checkpointing
A system includes a multi-process application that runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
SIMULATION OF UPDATES IN A SOFTWARE DEFINED NETWORK (SDN) VIRTUALIZED COMPUTING ENVIRONMENTS
Described herein are systems, methods, and software to manage the simulation of an update to a software defined networking (SDN) virtualization platform in a computing environment. In one example, an update service identifies a request to simulate the update of a SDN virtualization platform from a first version to a second version. In response to the request, the update service will identify and provide one or more updated files associated with the second version to computing systems in the computing environment and update an application programming interface (API) configuration on the computing systems to direct API requests to the one or more updated files in places of one or more files associated with the first version. The update service further maintains a cache associated with modifications to the computing environment while the API configuration is updated.
MEMORY SYSTEM, MEMORY CONTROLLER AND OPERATING METHOD OF MEMORY SYSTEM
Embodiments of the present disclosure relate to a memory system, a memory controller and an operating method of the memory system. According to embodiments of the present disclosure, the memory system may receive, from an outside of the memory system, a read command, execute a defense code on the data when a failure occurs during an operation of reading data from the memory device in response to the read command, and transmit defense code information, which is information related to the execution of the defense code for data, to the outside of the memory system.
SCALING CLUSTER WITHOUT RE-IMAGING NODES
An information handling system may include at least one processor and a memory. The information handling system may be configured to: add a node to a cluster of information handling systems; while the node is a member of the cluster, cause a plurality of components of the node to be changed according to a first set of changes; for each change in the first set of changes, store a record of the change; and in response to an indication that the node is to be removed from the cluster, cause the plurality of components of the node to be changed according to a second set of changes, wherein the changes in the second set of changes are configured to undo the changes in the first set of changes.
Data migration for a shared database
Methods and systems for coordinating migration for a database of a service are described herein. Multiple releases of the service may be simultaneously implemented, and these multiple releases may access a shared database. As new releases of the service are activated, the database may be incrementally migrated to a new data schema version. The new data schema version may be compatible with each release of the service that is in use. After a migration has begun, instances of the service may be instructed to perform database operations using methods compatible with the new data schema version. Continuation tokens may be returned during the migration, which indicate portions of the shared database that have not yet been migrated. If an error occurs during the migration, the continuation tokens may be discarded, and the migration may be restarted.
Fault tolerant retry subsystem and method
A fault-tolerant retry subsystem, method and computer program product are provided in order to automatically retry to deliver a message. In the context of a fault-tolerant retry subsystem, processing circuitry is provided to receive notification that delivery of a message to a subscriber has failed. The processing circuitry also defines a time interval at which delivery of the message is to be retried. The message is to be subjected to a plurality of retry attempts in an instance in which the delivery of the message to the subscriber continues to fail. The time interval is defined in a manner that depends upon which of the plurality of retry attempts is to be performed. As such, the time interval varies between at least some of the retry attempts. The processing circuitry causes the delivery of the message to be retried following expiration the time interval.