G06F11/1479

BYZANTINE AGREEMENT USING COMMUNICATIONS HAVING LINEAR COMPLEXITY

In some embodiments, a method receives a share of a signature of a decision block from at least a portion of the plurality of replicas. The share of the signature being generated when a respective replica signs the decision block and the decision block includes a set of requests from a client for a service. A combined signature is created based on the share of the signature block from at least the portion of the plurality of replicas. The method broadcasts a message that includes the combined signature to the plurality of replicas. The plurality of replicas use the combined signature to determine whether to process the decision block for the service.

DATA STORAGE VOLUME RE-BIND METHOD
20230244573 · 2023-08-03 ·

Disclosed herein is a technique to automatically re-bind applications and storage volumes during recovery from planned outage or platform failure and disaster recovery. Such implementations can involve managing volume management information that maps volume claim information with a logical volume identifier associated with persistent volume information; and for receipt of a request for a new volume, referencing the volume management information to retrieve an associated logical volume identifier and the persistent volume information based on the volume claim information associated with the request; and providing the retrieved persistent volume information to a volume provisioning function.

Memory management in non-volatile memory

A method for allocating memory in a computing device having a non-volatile main memory is described. The method comprises receiving, by a memory allocator, a request for non-volatile memory allocation of an object from a program executing on the computing device, the request comprising a requested memory size and registration data from the program. The method comprises finding an available address of one of a plurality of portions of a page of the non-volatile memory and searching an active page table in the non-volatile main memory to find the page and if the page is not found in the active page table: inserting the page into the active page table; and waiting for a memory write for inserting the page into the active page table to complete.

Ink jet printing apparatus

An ink jet printing apparatus comprises a controller and a printhead control unit positioned between the controller and the printhead and configured to control the printhead upon an instruction from the controller. The controller comprises a control unit configured to, in a case where transmission of an instruction to the printhead control unit failed, if the instruction is an instruction included in a first communication sequence performed periodically with respect to the printhead control unit in order to control the printhead, not execute a retry of the failed instruction, and in a case where the instruction is an instruction included in a second communication sequence performed aperiodically with respect to the printhead control unit in order to control the printhead, retry the failed instruction.

Method, apparatus, and computer-readable storage medium having instructions for cancelling a redundancy of two or more redundant modules

A method, an apparatus, and a computer-readable storage medium having instructions for cancelling a redundancy of two or more redundant modules. Results of the two or more redundant modules are received; reliabilities of the results are ascertained; and, based on the ascertained reliabilities, an overall result is determined from the results. The overall result is output for further processing.

Anomaly detection of media event sequences

A method and detector for detecting anomalies among media event sequences are disclosed. One method includes obtaining a first profile of media event data over a first time period, where the first profile is a first distribution of different media event sequences. Each sequence is associated with a number of occurrences of the sequence and the first profile having a first profile vector. The method further includes obtaining a second profile of media event data over a second time period less than the first time period. The second profile is a second distribution of the different media sequences and the second profile having a second profile vector. The method also includes comparing the first profile vector and the second profile vector, and determining one of a presence and absence of at least one anomaly in the second profile vector of media event data based on the comparison.

SYSTEMS AND METHODS FOR DETECTING ERRORS OF ASYNCHRONOUSLY ENQUEUED REQUESTS
20220122039 · 2022-04-21 · ·

A system for managing a client request is described herein, which may have at least one processor and a non-transitory computer-readable medium containing a set of instructions executable by the at least one processor. Execution of these instructions may cause the processor to perform steps of: validating a client request received from a remote client device, the client request including request data; transmitting, based on the validating, a response to the remote client device; based on the request data, determining a queue for the client request; asynchronously enqueuing the client request in the queue, the queue being configured to analyze the client request according to a model; analyzing the client request; and based on analyzing the client request, performing a responsive action.

Techniques for LIF placement in SAN storage cluster synchronous disaster recovery

Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.

Application launch support
11789856 · 2023-10-17 · ·

A method of software launch regression testing comprises monitoring an operational parameter of an existing application running on a plurality of client devices and determining a probability interval from the operational parameter of the existing application. A candidate update application is then launched to a subset of the plurality of client devices. The method then proceeds with monitoring a corresponding operational parameter of the candidate update version running on the subset of client devices, determining if the corresponding operational parameter of the candidate update version falls within the probability interval, and, based on the probability interval falling within the probability interval, providing a testing pass notification.

Method, apparatus and system for controlling mounting of file system

Embodiments of the present disclosure disclose a method, apparatus and system for controlling mounting of a file system. A specific embodiment of the method includes: receiving network attribute information of a target client sent by a target server as first network attribute information; determining, based on the first network attribute information, whether the target client has permission to mount to a target file system; and sending, in response to determining that the target client has permission to mount to the target file system, an identification of the target file system to the target server.