G06F11/202

Recovery strategy for a stream processing system

The technology disclosed relates to discovering multiple previously unknown and undetected technical problems in fault tolerance and data recovery mechanisms of modem stream processing systems. In addition, it relates to providing technical solutions to these previously unknown and undetected problems. In particular, the technology disclosed relates to discovering the problem of modification of batch size of a given batch during its replay after a processing failure. This problem results in over-count when the input during replay is not a superset of the input fed at the original play. Further, the technology disclosed discovers the problem of inaccurate counter updates in replay schemes of modem stream processing systems when one or more keys disappear between a batch's first play and its replay. This problem is exacerbated when data in batches is merged or mapped with data from an external data store.

Real-time fault-tolerant checkpointing

In part, the disclosure relates to a real-time fault tolerant system. The system may include a first computing device, a second computing, and a hardware interconnect. The first computing device may include one or more memory devices, one or more processors, a first network interface operable to receive device data and transmit output data over a time-slot-based bus, wherein the output data is generated from processing device data, and a first real-time checkpoint engine. The second computing device may include similar components or the same components as the first computing device. The hardware interconnect is operable to permit data exchange between the first computing device and the second computing device. Checkpoints may be generated by checkpoint engines during lower-priority communication time slots allocated on the time slot-based bus to avoid interfering with any real-time communications to or from the first and second computing devices.

SEGMENTED ROW REPAIR FOR PROGRAMMABLE LOGIC DEVICES

Systems or methods of the present disclosure may provide a programmable logic device including multiple logic array blocks each having multiple programmable elements. The multiple logic array blocks are arranged in multiple rows that are segmented into multiple segments. The programmable logic device also includes repair circuitry disposed between the multiple segments. The repair circuitry remaps logic within a first segment of the multiple segments when a first logic array block of the multiple logic array blocks has failed. Moreover, the first segment includes the first logic array block.

REAL-TIME FAULT-TOLERANT CHECKPOINTING

In part, the disclosure relates to a real-time fault tolerant system. The system may include a first computing device, a second computing, and a hardware interconnect. The first computing device may include one or more memory devices, one or more processors, a first network interface operable to receive device data and transmit output data over a time-slot-based bus, wherein the output data is generated from processing device data, and a first real-time checkpoint engine. The second computing device may include similar components or the same components as the first computing device. The hardware interconnect is operable to permit data exchange between the first computing device and the second computing device. Checkpoints may be generated by checkpoint engines during lower-priority communication time slots allocated on the time slot-based bus to avoid interfering with any real-time communications to or from the first and second computing devices.

Data correlation using file object cache
11238152 · 2022-02-01 · ·

Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.

UTILIZING MACHINE LEARNING TO STREAMLINE TELEMETRY PROCESSING OF STORAGE MEDIA
20210334253 · 2021-10-28 ·

Data associated with storage media utilized by one or more storage systems is received. The data is provided as an input to a machine learning model executed by a processing device. The machine learning model identifies one or more deterministic characteristics from the data. The one or more deterministic characteristics associated with the storage media are received from the machine learning model. A data structure comprising the one or more deterministic characteristics is generated for use in a telemetry process to qualify types of storage media.

Data management system

Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine.

System and method for deploying a distributed component-based application

A system and method for deploying a distributed component-based application is disclosed. The system may include a plurality of uniform base components. Each base component of the plurality of uniform base components may host a respective service component, and may include an input port, an output port, a service port, an error, log, and exception port, a monitoring port, and a control port. A first base component may process event messages asynchronously with a second base component and a third base component. The system and method may also support auto-scalability of each base component.

Leveraging a disaster recovery infrastructure to proactively manage cyber security threats to a production environment

Described is a system that leverages an isolated disaster recovery (or testing) environment to manage a range of cyber security threats associated with a virtual machine. The system may proactively manage such security threats by creating a second instance (e.g. replica) of a production virtual machine and verifying potential configuration updates that may be applied to the virtual machine to manage such security threats. The configuration updates may be verified by performing various tests on the second instance of the virtual that executes within the secure and isolated environment. Accordingly, the configuration updates may be verified without exposing the production environment to any potential risks. Thus, the system may proactively detect cyber security threats associated with a virtual machine and automatically initiate various corrective or preventative actions.

MALWARE PROTECTION FOR VIRTUAL MACHINES

A computer-implemented method at a data management system comprises: receiving, at a storage appliance from a server hosting a virtual machine, a write made to the virtual machine; computing, at the storage appliance, a fingerprint of the transmitted write; comparing, at the storage appliance, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time.