Patent classifications
G06F9/544
Improving the responsiveness of an apparatus to certain interrupts
An apparatus and method are described, the apparatus comprising processing circuitry to perform data processing operations, microarchitecture circuitry used by the processing circuitry during performance of the data processing operations, and an interface to receive interrupt requests. The processing circuitry is responsive to a received interrupt request to perform an interrupt service routine, and the apparatus comprises prediction circuitry to determine a predicted time of reception of a next interrupt of at least one given type. The apparatus also comprises microarchitecture control circuitry arranged to vary a configuration of the microarchitecture circuitry between a performance based configuration and a responsiveness based configuration in dependence on the predicted time, so as to seek to increase the responsiveness of the apparatus to interrupts as the predicted time is approached.
Method and system for distributed data storage with enhanced security, resilience, and control
A method and system for encrypting and reconstructing data files, including related metadata, is disclosed. The method involves separately encrypting data and metadata as chaining processes and integrating a plurality of encryption/encoding techniques together with strategic storage distribution techniques and parsing techniques which results in the integrated benefits of the collection of techniques. As disclosed, the content data is separated from its metadata, encryption keys may be embedded in the metadata, and in a content data encryption chaining process, the method chunks, encrypts, shards, and stores content data and separately shards and stores metadata, and stored in a flexible, distributed, and efficient manner, at least in part to assure improved resiliency In addition, the processes are preferably implemented locally, including at the site of the content data or a proxy server.
Global coherence operations
A method includes receiving, by a L2 controller, a request to perform a global operation on a L2 cache and preventing new blocking transactions from entering a pipeline coupled to the L2 cache while permitting new non-blocking transactions to enter the pipeline. Blocking transactions include read transactions and non-victim write transactions. Non-blocking transactions include response transactions, snoop transactions, and victim transactions. The method further includes, in response to an indication that the pipeline does not contain any pending blocking transactions, preventing new snoop transactions from entering the pipeline while permitting new response transactions and victim transactions to enter the pipeline; in response to an indication that the pipeline does not contain any pending snoop transactions, preventing, all new transactions from entering the pipeline; and, in response to an indication that the pipeline does not contain any pending transactions, performing the global operation on the L2 cache.
Method and system for processing data using a processing pipeline and processing units
A method for processing data includes receiving an offload request by a first virtual machine (VM), issuing, in response to the offload request and based on a processing pipeline, a processing request to a processing unit, and servicing, by the processing unit, the processing request to obtain a result.
TYPED STORE BUFFERS FOR HARDENING STORE FORWARDING
A method comprises receiving, in a store buffer, at least a portion of a store instruction, the at least a portion of the store instruction comprising a data operand and a first object capability register operand which comprises a first object type identifier for a first object, obtaining, from a corresponding load instruction, a second object capability register operand which comprises a second object type identifier, and determining whether the first object type identifier matches the second object type identifier.
Memory control method, memory storage device, and memory control circuit unit
A memory control method for a rewritable non-volatile memory module is provided according to embodiments of the disclosure. The method includes: receiving at least one first read command from a host system; and determining, according to a total data amount of to-be-read data indicated by the at least one first read command, whether to start a pre-read operation. The pre-read operation is configured to pre-read data stored in at least one first logical unit, and the first logical unit is mapped to at least one physical unit.
Controller, operating method thereof and storage device including the same
A controller may include a memory configured to store a map update list in which information of map segments whose mapping information is to be updated is registered The controller may also include an unmap module. The unmap module may, in response to receiving an unmap command, generate a list information bitmap indicating map segments which are already registered in the map update list, check, using the generate list information bitmap, whether one or more unmap target map segments corresponding to the unmap command overlap the map segments registered in the map update list, using the generate list information bitmap, and selectively register the one or more unmap target map segments into the map update list according to the check result.
Systems, methods, and apparatuses for using shared memory for data between processes
Techniques for implementing an on-demand serverless compute system that uses shared memory to share data between on-demand serverless compute applications are described. In some examples, a daemon of an edge device providing on-demand serverless compute is to: register launched one or more launched on-demand serverless applications, read a deployment configuration for an application using the one or more launched on-demand serverless applications, per the read deployment configuration, launch at least one data source and at least one data sink, per launched data source, register the launched data source with the device daemon, per launched data sink, register the launched data sink thread with the device daemon, match registered, launched data sources with registered, launched data sinks and launched on-demand serverless applications as defined in the deployment configuration, and for each match, register a connection first in, first out structure to be used to share data on an event driven basis between launched on-demand serverless applications.
Memory buffer management for microkernel operating system
In one embodiment, a kernel of an operating system receives a request to store a message in a message buffer, which includes a plurality of chunks. Each chunk of the message buffer is associated with a message-occupancy indicator. The kernel determines a start and end position of the message when stored in the message buffer. The kernel determines, based on the start and end positions, whether the message, when stored, will occupy more than one chunk. Responsive to determining that the message will occupy more than one chunk, the kernel determines each chunk that will contain the message when stored. If a message occupancy-indicator associated with each chunk indicates that at least each chunk after a first chunk associated with the start position is unoccupied, the kernel stores the message in the message buffer and updates the message-occupancy indicator for each chunk containing the stored message.
Method and system optimizing the use of sub-data confidence fabrics
In general, in one aspect, the invention relates to a method for managing data, the method includes obtaining, by a data management system, a first resource usage of a local data system associated with a first data confidence fabric (DCF) pipeline, wherein the first DCF pipeline is associated with a first workload, obtaining second resource usage of the local data system associated with a second DCF pipeline, wherein the second DCF pipeline is associated with a second workload, analyzing the first resource usage and the second resource usage to obtain a workload ranking, and performing an action set based on the workload ranking.