G06F9/442

USING PERIPHERAL COMPONENT INTERCONNECT EXPRESS VENDOR-DEFINED MESSAGE (PCIe-VDM) AND INTER-INTEGRATED CIRCUIT (I2C) TRANSPORT FOR NETWORK COMMUNICATIONS

Systems and methods for using Peripheral Component Interconnect Express Vendor-Defined Message (PCIe-VDM) and Inter-Integrated Circuit (I.sup.2C) transport for network communications are described. In some embodiments, an IHS may include: a host processor; a Basic Input/Output System (BIOS) coupled to the host processor; a Baseboard Management Controller (BMC) coupled to the host processor; and a memory coupled to the BMC, the memory having program instructions stored thereon that, upon execution, cause the BMC to: receive a message over a network while the host processor is powered off, wherein the message originates from a remote IHS and targets the BMC; and in response to a pass-through data transfer rate available to the BMC not meeting a threshold value: power on the host processor; request that the BIOS boot up; and perform a communication with the remote IHS via a PCIe bus using a PCIe-VDM supported by the host processor.

Electronic device and shutdown method based on user state

A shutdown method of an electronic device includes detecting activity of a user; determining whether an activity range of the user is less than a predetermined value; determining whether the user is away from the electronic device when the activity range of the user is less than the predetermined value; capturing user images when the user is not away from the electronic device; determining whether any action has been performed by the user; determining whether the at least one action performed by the user matches a sleep habit when the at least one action has been performed by the user; and shutting down the electronic device when the user is away from the electronic device, or when no action has been performed by the user, or when the at least one action performed by the user match the sleep habit of the user.

Unified and compressed statistical analysis data

Systems and methods for compression and/or unification of statistical analysis system (SAS) data is provided. In one embodiment, a request to open a unified and compressed statistical analysis system (SAS) view file is received. The unified and compressed SAS data step view file including: an SAS data step view; compressed payload data to be used in the SAS data step view when decompressed; and a set of metadata describing characteristics of variables of the SAS data step view. Upon receiving the request, the compressed payload data is automatically decompressed, such that compressed payload data is decompressed and usable with the SAS data step view to render the SAS data step view and decompressed payload data on an electronic display of a client or host providing the request.

Method for controlling functions of electronic device and server employing the method

A method for controlling functions of an electronic device by a server includes establishing a communication connection between the server and the electronic device when a distance between the electronic device and the server is less than or equal to a preset value. Positioning information of the electronic device is acquired at every preset time when the electronic device enters a preset control area. A control mode of the electronic device is determined according to positioning information of the electronic device. Once a control signal is generated according to the control mode of the electronic device, status of an image-capturing device, and/or status of a microphone of the electronic device are controlled according to the control signal.

File pre-fetch scheduling for cache memory to reduce latency
11366757 · 2022-06-21 · ·

Techniques are provided for the scheduling of file pre-fetches from a file system into a cache memory, to reduce subsequent latency associated with future accesses to those files. A methodology implementing the techniques according to an embodiment includes monitoring accesses to files of the file system (e.g., file open and file read operations) and maintaining a record for each of the accessed files. The record includes an identifier of the file, the number of accesses of the file, and the number of cache memory misses associated with those accesses. The method also includes storing the record into a file access history database (FAHD). The method further includes generating, in response to an Operating System (OS) shutdown, a frequently used file list (FUFL) based on the FAHD. The method further includes pre-fetching files identified by a selected subset of the FUFL to the cache memory during an OS boot.

Integrity manifest certificate

Examples disclosed herein relate to using an integrity manifest certificate to verify the state of a platform. A device identity of a device that has the device identity provisioned and stored in a security co-processor to retrieve an integrity proof from the security co-processor. The device includes at least one processing element, at least one memory device, and a bus including at least one bus device, and wherein the device identity is associated with a device identity certificate signed by a first authority. The integrity proof includes a representation of each of a plurality of hardware components including the at least one processing element, the at least one memory device, the at least one bus device, and a system board and a representation of plurality of firmware components included in the device. The integrity proof is provided to a certification station. The certification station determines that the integrity proof is an expected value based on an expected provisioning state of the device and the device identity. The certification station signs, using a second authority, an integrity manifest certificate, based on the integrity proof and the device identity. The integrity manifest certificate is stored.

MANAGING EPHEMERAL STORAGE ON A COMPUTING NODE
20220179472 · 2022-06-09 ·

The present disclosure relates to systems, methods, and computer readable media for identifying and responding to one or more power loss events on a computing node. For example, systems disclosed herein may relate to management of a power loss event on a computing node hosting one or more compute platforms thereon. The systems disclosed herein may implement a power handling configuration that identified a subset of data from a volatile portion of a storage system to prioritize for storage on a non-volatile portion of the storage system. By selectively identifying and flushing data associated with compute platforms hosted by a computing node, systems described herein may significantly reduce demand for capacitance on cloud computing systems while optimizing other performance parameters (e.g., write performance, hardware durability) of devices on cloud computing systems.

NETWORK-MANAGEMENT-CARD-ASSISTED SHUTDOWN OF HYPERCONVERGED INFRASTRUCTURE
20220179660 · 2022-06-09 ·

Techniques for network-management-card-assisted shutdown of hyperconverged infrastructure (HCI) are disclosed. A network management card (NMC) includes: a network interface communicatively coupled with an HCI environment; one or more processors; and one or more non-transitory computer-readable media storing instructions. The instructions, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving, from the HCI environment via the network interface, a selection of a set of shutdown instructions from multiple sets of shutdown instructions supported by the NMC, the multiple sets of shutdown instructions being configured to support shutdown processes for at least two different HCI platforms; detecting that the HCI environment is performing a shutdown; and finalizing the shutdown at least by executing the set of shutdown instructions

Memory management of data processing systems

Techniques for memory management of a data processing system are described herein. According to one embodiment, a memory usage monitor executed by a processor of a data processing system monitors memory usages of groups of programs running within a memory of the data processing system. In response to determining that a first memory usage of a first group of the programs exceeds a first predetermined threshold, a user level reboot is performed in which one or more applications running within a user space of an operating system of the data processing system are terminated and relaunched. In response to determining that a second memory usage of a second group of the programs exceeds a second predetermined threshold, a system level reboot is performed in which one or more system components running within a kernel space of the operating system are terminated and relaunched.

Fast shutdown of large scale-up processes
11720402 · 2023-08-08 · ·

A system for shutting down a process of a database is provided. In some aspects, the system performs operations including tracking, during startup of a process, code locations of a process in the at least one memory. The operations may further include tracking, during runtime of the process and in response to the tracking the code locations, memory segments of the at least one memory allocated to the process. The operations may further include receiving an indication for a shutdown of a process. The operations may further include waking, in response to the indication, at least one processing thread of a plurality of processing threads allocated to a database system. The operations may further include allocating a list of memory mappings to the plurality of processing threads. The operations may further include freeing, by the first processing thread, the physical memory assigned to the processing thread by the memory mappings.