G06F3/0662

Uniquified FPGA virtualization approach to hardware security

Novel methods of virtualization with unique virtual architectures on field-programmable gate arrays (FPGAs) are provided. A hardware security method can include providing one or more field-programmable gate arrays (FPGAs), and creating an application specialized virtual architecture (or overlay) over the one or more FPGAs (for example, by providing an overlay generator). Unique bitfiles that configure the overlays implemented on the FPGAs can be provided for each deployed FPGA. The application specialized virtual architecture can be constructed using application code, or functions from a domain, to create an overlay represented by one or more hardware description languages (e.g., VHDL).

Cloud-based storage system storage management

A cloud-based storage system contained in a cloud computing environment, the cloud-based storage system including: determining, at the cloud-based storage system and in response to a request for data, that the data previously stored within one or more virtual instances of a virtual instance layer is no longer stored within the one or more virtual instances; generating, within the virtual instance layer, a quantity of virtual instances to receive data restored from a cloud-based storage layer of the cloud-based storage system; and restoring, into the quantity of virtual instances at the virtual instance layer, data from the cloud-based storage layer of the cloud-based storage system.

Identifying performance impact events in data storage equipment based on queue depth metrics
11023169 · 2021-06-01 · ·

A technique manages data storage equipment. The technique involves receiving queue depth metrics from data storage performance data describing data storage performance of the data storage equipment. The technique further involves performing a performance impact detection operation on the queue depth metrics to determine whether a performance impacting event has occurred on the data storage equipment. The technique further involves, in response to a result of the performance impact detection operation indicating that a performance impacting event has occurred on the data storage equipment, launching a set of performance impact operations to address the performance impacting event that occurred on the data storage equipment. Such a technique may be performed by an electronic apparatus coupled with the data storage equipment (e.g., over a network).

Utilizing redundant resources in a storage system

Deploying client-specific applications in a storage system utilizing redundant system resources, including: identifying a redundant controller in the storage system, wherein the storage system includes at least a first controller and the redundant controller; and executing one or more applications on the redundant controller, wherein the one or more applications are executed in a container.

METHOD FOR PROVIDING APPLICATION DATA OF AT LEAST ONE APPLICATION EXECUTABLE ON A CONTROL UNIT OF A VEHICLE, METHOD FOR CALIBRATING A CONTROL UNIT, CONTROL UNIT AND EVALUATION UNIT

A method for providing application data of at least one application executable on a control unit of a vehicle. The control unit includes components for running an operating system including a virtual memory management. In the method, an application address space of a first virtual memory is initially read out, the application address space being assigned to a process of the application and representing an area of a physical memory of the control unit occupied by the application data. The application address space is mapped in a further step into a virtual address space, which is assigned to a process of a communication application for exchanging data via a communication interface to a control unit-external evaluation unit. The application data are therefore retrievable via the communication interface.

METHODS AND SYSTEMS FOR SECURELY AND EFFICIENTLY CLUSTERING DISTRIBUTED PROCESSES USING A CONSISTENT DATABASE

Certain embodiments described herein are directed to methods and systems for adding one or more nodes to a first cluster including a first node in a computer system. A method performed by the first node comprises receiving a first request from a second node to join the first cluster. The method also comprises retrieving a first cluster configuration associated with the first cluster from a distributed database through a first database server (DBS) and creating a second cluster configuration using the first cluster configuration and information received from the second node as part of the request. The method further comprises populating a first one or more local trust stores of a first one or more processes executing on the first node with a second one or more security certificates of a second one or more processes executing on the second node. The method further comprises writing the second cluster configuration to the distributed database and returning the second cluster configuration to the second node.

FORWARD AN IO REQUEST WITH USE OF KERNEL-LEVEL INSTRUCTIONS
20210103387 · 2021-04-08 ·

Examples may forward an input/output (IO) request with use of kernel-level instructions. Examples may receive the IO request via a port of a standby controller, generate an alternate version of the IO request using at least kernel-level instructions of the standby controller, and provide the alternate version of the IO request to physical memory of the active controller by providing the alternate version of the IO request to a designated region of physical memory of the standby controller that is mapped to a designated region of the physical memory of the active controller.

Handling pattern identifiers in a data storage system

Techniques for handling pattern identifiers in a data storage system. By replacing a block pointer with a pattern identifier, the techniques can identify a data block (or an indirect data block) as a bad block, without resorting to the use of a separate flag or bad block (BB) bit in per-block metadata (e.g., a mapping pointer) of the data block. The techniques can also avoid waste of valuable metadata space by using pattern identifiers at various levels of a mapping tree, leveraging pointer granularity at lower levels, mid-levels, and progressively higher levels of the mapping tree.

PERFORMANCE OPTIMIZATION IN A STORAGE SYSTEM ENVIRONMENT
20210109671 · 2021-04-15 · ·

An aspect of performance optimization in a storage system environment includes providing a metadata structure that describes a storage space of a storage system. For each storage object of a plurality of storage objects, an aspect includes monitoring input/output (IO) patterns for IO operations conducted, monitoring deduplication characteristics of the storage object, and configuring local mapping layer parameters. An aspect further includes modifying local object metadata in the metadata structure as a function of the monitoring and the configuring.

TRAFFIC CLASS MANAGEMENT OF NVMe (NON-VOLATILE MEMORY EXPRESS) TRAFFIC
20210096749 · 2021-04-01 · ·

Embodiments of the present disclosure relate to traffic class management of NVMe (non-volatile memory express) traffic. One or more input/output (I/O) operations are received at a device interface coupled to one or more storage devices of a storage array. A service level (SL) corresponding to each of the one or more I/O operations is determined. Each of the one or more I/O operations is transmitted to the one or storage devices over a virtual channel of a set of virtual channels based on the determined SL corresponding to each of the one or more I/O operations.