Patent classifications
G06F3/0629
NETWORK FABRIC DEPLOYMENT SYSTEM
A network fabric deployment system includes a fabric deployment management system that is coupled to a DHCP server. The fabric deployment management system generates a cloud-based network fabric that is based on a network fabric topology file and that includes a plurality of cloud-based networking devices that are assigned a physical networking device identifier that identifies a corresponding physical networking device. The fabric deployment management system configures and validates each of the plurality of cloud-based networking devices causing each physical networking device identifier being mapped to an IP address at the DHCP server and then retrieves a deployment image file from each of the plurality of cloud-based networking devices that have been configured and validated, and stores each of the deployment image files in a database in association with the physical networking device identifier such that the corresponding physical networking device boots from that deployment image file.
Distributed storage system for long term data storage
A distributed storage system for the long-term storage of data objects that is implemented utilizing one or more distinct storage sites that may be comprised of system controllers and object storage systems that act in concert to embody a single distributed storage system. A system may include a one or more types and/or instances of object storage systems. A system may include object storage systems that are powered on for a limited time as required to complete queued data operations. A system may further include system controllers associated with logical and/or physical sites that coordinate object, user, device, and system management functionally.
Data scheduling register tree for radix-2 FFT architecture
The present invention discloses a data scheduling register tree structure for radix-2 FFT architecture. The operation method of the proposed invention, there is no need for the Random Access Memory (RAM) to store the data; instead, shift registers with some multiplexers are enough to perform the memory operation with less hardware. There are three steps in the FFT computation such as input storage, data processing and output retrieval. The data processing step is further configured in four different operations. The number of operation mainly depends upon the size of the FFT, which is equal to log.sub.2N modes. During each operation, the DSRT changes its structure and these structures are basically MDC (Multi-path Delay Commutator) structures.
INTERFACE TO MOUNT VIRTUAL DISKS FROM MULTIPLE SOURCES
One example method includes an interface for mounting virtual disks from multiple sources. The interface may interface with different sources using appropriate programming interfaces. The virtual disks are then mounted in the interface. The virtual disks can be analyzed to identify the associated partitions. Volume configurations are determined for the partitions. The files for the partitions are remounted in the interface.
APPARATUS AND METHOD FOR HANDLING MEMORY LOAD REQUESTS
When load requests are generated to support data processing operations, the load requests are buffered in pending load buffer circuitry prior to being carried out. Coalescing circuitry determines for a first load request whether a set of one or more subsequent load requests buffered in the pending load buffer circuitry satisfies an address proximity condition. The address proximity condition is satisfied when all data items identified by the set of one or more subsequent load requests are comprised within a series of data items which will be retrieved from the memory system in response to the first load request. When the address proximity condition is satisfied, forwarding of the set of one or more subsequent load requests is suppressed.
MEMORY ANOMALY PROCESSING METHOD AND SYSTEM, ELECTRONIC DEVICE, AND STORAGE MEDIUM
A memory anomaly processing method and system, an electronic device, and a storage medium. The method includes: reading a memory error quantity of a target memory bank from a memory error register; when the memory error quantity is greater than a preset value, executing a hot-removal operation on the target memory bank; calculating a memory delay parameter, and writing the memory delay parameter into a memory controller, wherein the memory delay parameter is waiting time after the memory controller controls the target memory bank to receive a read/write command; and executing a hot-addition operation on the target memory bank, whereby the memory controller continues to execute a read/write operation on the target memory bank based on the memory delay parameter. It can be seen that, according to the present application, the memory read/write error rate may be reduced.
SOLID-STATE STORAGE DRIVE AND SOLID-STATE STORAGE DRIVE CONTROL METHOD
A solid-state storage drive and a solid-state storage drive control method are provided. The solid-state storage drive includes a controller, a selector, and N NAND flash memory chips, where N is an integer greater than 1. The controller is configured to output a plurality of gating signals to the selector. The plurality of gating signals indicate M of the N NAND flash memory chips, where M is an integer greater than or equal to 1 and less than or equal to N. The selector is configured to select, based on the plurality of gating signals, the M NAND flash memory chips to perform data transmission. This improves an interface rate of the solid-state storage drive, so that performance requirements of a high interface rate and a high storage capacity of the solid-state storage drive can be satisfied.
CONFIGURATION DATA DELETION BASED ON TAMPER STATUS
An example storage medium includes instructions that, when executed, cause a processor of a computing device to read, during start-up of the computing device, first configuration data from a first storage device of the computing device; read second configuration data from a second storage device of the computing device; determine that there is an inconsistency between the first configuration data and the second configuration data; check a tamper status of the computing device; based on the tamper status and the determination that there is an inconsistency between the first configuration data and the second configuration data: (i) clear a secure storage location of the computing device, the secure storage location storing data to access protected data; or (ii) replace the first configuration data on the first storage device of the computing device based on second data and continue the start-up of the computing device.
Data integrity protection of ZNS needs
The present disclosure generally relates to methods of operating storage devices. The storage device comprises a controller comprising first random access memory (RAM1), second random access memory (RAM2), and a storage unit divided into a plurality of zones. When a write command is received to write data to a zone, change log data is generated and stored in the RAM1, the previous delta data for the zone is copied from the RAM2 to the RAM1 to be updated with the change log data, and the updated delta data is copied to the RAM2. The delta data stored in the RAM2 is copied to the storage unit periodically. The controller tracks which delta data has been copied to the RAM2 and to the storage unit. During a power failure, the delta data and the change log data are copied from the RAM1 or the RAM2 to the storage unit.
SHORTCUT KEYS FOR VIRTUAL KEYBOARDS
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, responsive to initiation of an application of the computing device, a display of which including a virtual keyboard, detecting, by the computing device, an input on a shortcut key of the virtual keyboard. The method also includes, by the computing device, translating the shortcut key into one or more keystrokes based on a configuration file for that short key and providing the one or more keystrokes to the application to execute a function of the shortcut key in response to the detected input.