G06F3/0662

IMMERSIVE DATA VISUALIZATION
20200097239 · 2020-03-26 ·

A system and method for visualizing multiple datasets in a virtual 3-dimensional interactive environment. Multiple datasets may be related and virtually cast as 3-dimensional type structures. User interfaces, such as game controllers or headsets, may be used to present the dataset from differing perspectives including the appearance of moving through the data. Certain embodiments provide for mirror image views that allow for presentation of higher order datasets. Other embodiments provide for animation or motion indicia to show how the data is changing and the results on the display. The datasets may represent physical areas or virtual areas as well as demographic, sensors and financial information.

VIRTUAL FIBRE CHANNEL PORT MIGRATION

This disclosure is directed to a computer-implemented method, systems, and devices to migrate a virtual fibre channel (VFC) connection from a first hardware communication path to a second hardware communication path within a fibre channel (FC) network prior to failure of a device in the first hardware communication path. For example, a hypervisor database may contain health status with respect to recoverable failure incidents across host bus adaptor (HBA) ports for a source HBA port and a target HBA port associated with a first VFC connection using the first hardware communication path. If it is determined that a number of recoverable failure incidents on at least one component in the first hardware communication path has occurred, migration of the first VFC connection from the first hardware communication path to a second hardware communication path may be initiated prior to actual hard failure.

Storage system and storage control method

This storage system comprises a block interface, a block control unit, a file control unit, and shared memory. The file control unit and block control unit are coupled via a first memory-through path structured to pass through a first area of the shared memory, and via a second memory-through path structured to pass through a second area of the shared memory. The block control unit has a protocol control unit and a virtual driver; exchanges control information for the file control unit with the file control unit via the first memory-through path; uses the virtual driver to convert an I/O request passed from the file control unit via the second memory-through path and processes the result with a protocol processing unit; and bypasses the virtual driver and uses the protocol processing unit to process a block I/O request transferred from the block interface via a physical path.

Virtualizing Isolation Areas of Solid-State Storage Media

The present disclosure describes apparatuses and methods for virtualizing isolation areas of solid-state storage media. In some aspects, a storage media accelerator determines, via a storage media interface, a geometry of solid-state storage media. The accelerator selects, based on the geometry, an area of the solid-state storage media as an isolated unit of storage. A physical address of the isolated unit of storage is then mapped to a virtual address. The accelerator exposes, via the virtual address, the isolated unit of storage through a host interface to enable host access of the isolated unit of storage. The accelerator may also remap the isolated unit of storage to other areas of the solid-state storage media without host interaction. By so doing, the accelerator may provide virtualized isolation and partitioning functionalities to a host, while efficiently handling lower-level storage media functions, such as wear leveling and load balancing, without host involvement.

MEMORY PROTECTION IN VIRTUALIZED COMPUTER SYSTEMS USING SHADOW PAGE TABLES
20200050364 · 2020-02-13 ·

Aspects of the disclosure provide for mechanisms for memory protection of virtual machines in a computer system. A method of the disclosure includes: obtaining, by a hypervisor, a guest page table associated with a virtual machine, wherein the guest page table comprises a first guest page table entry associated with a privilege flag indicating that a first virtual page of a guest memory of the virtual machine is accessible to unprivileged code; and in view of a determination that the virtual machine is running in a kernel mode, generating a first host page table in view of the guest page table, wherein the first host page table comprises a first host page table entry corresponding to the first guest page table entry, and wherein the first host page table entry is associated with a privilege flag indicating that the first virtual page is not accessible to the unprivileged code.

CONSIDERATION OF CONFIGURATION-BASED INPUT/OUTPUT PREDICTIONS IN MULTI-TIERED DATA STORAGE SYSTEM MANAGEMENT

A computer-implemented method, according to one embodiment, includes: detecting that a configuration change for a virtualization layer in a multi-tiered data storage system has been received, and determining whether the configuration change corresponds to a tiering adjustment. In response to determining that the configuration change corresponds to a tiering adjustment, I/O pattern changes are predicted. Moreover, a determination is made as to whether each specific extent is stored in a tier of the multi-tiered data storage system suitable to satisfy the predicted I/O pattern changes which correspond to the respective specific extent. In response to determining that one of the specific extents is stored in a tier of the multi-tiered data storage system which is not suitable to satisfy the predicted I/O pattern changes, the at least one specific extent is migrated to another one of the tiers determined as being suitable to satisfy the predicted I/O pattern changes.

DATA VALIDITY TRACKING IN A NON-VOLATILE MEMORY
20200050556 · 2020-02-13 ·

A computer device reads an indicator from a configuration file that identifies a granularity of units of data at which to track validity. The granularity is one of a plurality of granularities ranging from one unit of data to many units of data. The computer device generates a machine-readable file configured to cause a processing device of a memory system to track validity at the identified granularity using a plurality of data validity counters with each data validity counter in the plurality of data validity counters tracking validity of a group of units of data at the identified granularity. The computer device transfers the machine-readable file to a memory of the memory system.

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR MANAGING DATA STORAGE
20200042617 · 2020-02-06 ·

There is disclosed techniques for managing data storage. In one embodiment, the techniques comprises detecting a corrupted state in connection with a leaf indirect block (IB). The IB comprises a deduplication mapping pointer (MP) pointing to an extent in a virtual block map (VBM). The techniques further comprising determining, in response to the detection, that an VBM address associated with the MP is a valid VBM address and that a sum of weights describing a total number of MPs pointing to the extent in the VBM is missing a weight after traversing an IB tree comprising multiple IBs including the M. The techniques further comprising connecting the MP to the extent in the VBM based on the determination.

SECURE ACCESS OF VIRTUAL MACHINE MEMORY SUITABLE FOR AI ASSISTED AUTOMOTIVE APPLICATIONS
20200042341 · 2020-02-06 ·

In various examples, access to VM memory by virtualization software is secured using a trusted firmware of a host controller to validate one or more of a command to read a VM's memory and/or the data read from VM memory in order to protect against improper access to data in VM memory. If validation fails, the firmware may refrain from reading the data and/or from providing the virtualization software with access to the data. The data may include a request command from a VM regarding establishing or modifying a connection using the host controller to another entity, such as another device within or outside of the virtualization environment. The virtualization software may use the request command to facilitate the connection. The host controller may provide an eXtensible Host Controller Interface (xHCI) or a different type of interface for the connection.

Managing file system namespace in network attached storage (NAS) cluster

A technique for managing data storage provides multiple physical computing machines and block storage arranged in a NAS (network attached storage) cluster. The physical computing machines run NAS servers, with each NAS server including an FSDB (file system database) that identifies a set of file systems that belong to the NAS server. LUNs (Logical UNits) in the block storage provide backing store for the set of file systems of each NAS server. The NAS cluster manages access to a file system namespace for a set of file systems, including for example Distributed File System (DFS) typically accessed using the Server Message Block (SMB) protocol, by clients of different types, including for example clients using the Network File System (NFS) protocol.