G06F12/0684

Stateful Membership Management For Storage Systems Replicating A Dataset

Managing storage systems that are synchronously replicating a dataset, including: detecting a change in membership to the set of storage systems synchronously replicating the dataset; and applying one or more membership protocols to determine a new set of storage systems to synchronously replicate the dataset, wherein the one or more membership protocols include a quorum protocol, an external management protocol, or a racing protocol, and wherein one or more I/O operations directed to the dataset are applied to a new set of storage systems.

Method for cascading interlockings in electronic locks
12148256 · 2024-11-19 · ·

When cascading interlockings of electronic locks, in particular for vaults, it is known to link all locks to a communications bus, wherein each lock has an associated serial number. Additionally, it is provided for additionally associating a sequential number to each lock so as to simplify managing the locks. Preferably, with a main lock, in which a translation table is stored, the sequential number of each lock in the system is associated to the serial number thereof; thereby, negotiating the numbers as follows: if two locks with the number 1 are connected to the communications bus, one lock keeps the number 1 and then adds a line in the translation table, in which a sequential number not yet assigned for the other lock and the serial number thereof are stored, and, if required, also adds all the locks not yet listed in the table.

Apparatus and method for fault detection to ensure device independence on a bus

A method includes transmitting a first value to a first slave device via a communication bus, where the first value is within a first range of values associated with the first slave device. The method also includes receiving a second value via the communication bus and detecting a fault when the second value is not within the first range of values associated with the first slave device. Detecting the fault could include detecting a decoder fault when the second value is within a second range of values associated with a second slave device. The method may further include detecting a fault when the second value is within the first range of values associated with the first slave device but does not equal the first value or detecting no fault when the second value equals the first value.

VERIFYING A COMMUNICATION BUS CONNECTION TO A PERIPHERAL DEVICE
20180081849 · 2018-03-22 ·

An apparatus, system, method, and program product for verifying a communication bus connection to a peripheral device are disclosed. The apparatus includes a data module that receives, over a communication bus, an identifier for a location where a peripheral device is installed. The peripheral device is communicatively coupled to an information handling device using the communication bus. The apparatus includes a verification module that compares the identifier received over the communication bus to a predefined identifier associated with the communication bus. The apparatus includes a notification module that sends a notification in response to the identifier received over the communication bus not matching the predefined identifier associated with the communication bus.

INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN PROGRAM, AND METHOD FOR PROCESSING INFORMATION
20180024749 · 2018-01-25 · ·

An information processing apparatus includes: a first calculator and a second calculator being coupled to each other via a bus, and each making a memory access, designating a logical address; a first memory being coupled to the first calculator; and a second memory being coupled to the second calculator and being accessed from the first calculator via the bus, wherein the first memory determines, based on a time from issue of a request for the memory access to response to the request, whether a memory having a physical address associated with the logical address is the first memory or the second memory. With this configuration, it is possible to specify whether a memory being accessed using a logical address is a local memory or a remote memory.

METHOD AND SYSTEM FOR VALID MEMORY MODULE CONFIGURATION AND VERIFICATION

Aspects of the present disclosure involve a system and method for verifying and validating accurate memory module placement on a printed circuit board. In one embodiment, the printed circuit board is configured to include actuating elements that can be used to verify correct memory module location placement on the printed circuit board. In another embodiment, the actuating elements can be used to validate accurate memory module placement. The actuating elements can be in the form of buttons that may be depressed and configured to trigger light emitting diodes (LEDs) that correspond to the slots on the printed circuit board.

Continuing to service a dataset after prevailing in mediation

Continuing to service a dataset after prevailing in mediation, including: requesting, by a first storage system, mediation from a mediation service that is configured to resolve which storage system continues to service a dataset after the triggering event, wherein the dataset is synchronously replicated by a plurality of storage systems that includes the first storage system and a second storage system; and detaching the second storage system from a plurality of storage systems synchronously replicating the dataset.

Method, apparatus and system for responding to a row hammer event
09761298 · 2017-09-12 · ·

Techniques and mechanisms to facilitate an operational mode of a memory device to prepare for a targeted refresh of a row in memory. In an embodiment, the memory device performs one or more operations while in the mode to prepare for a future command from a memory controller, the command to implement, at least in part, a targeted refresh of a row in a first bank of the memory device. Prior to such a command, the memory device services another command from the memory controller. In another embodiment, servicing the other command includes the memory device accessing a second bank of the memory device while the memory device operates in the mode, and before completion of an expected future targeted row refresh.

LAZY DELETION OF VAULTS IN PACKED SLICE STORAGE (PSS) AND ZONE SLICE STORAGE (ZSS)
20170192688 · 2017-07-06 ·

Methods and systems for compacting a storage structure or file include maintaining a vault byte count for each of a plurality of vaults, where encoded data slices of two or more vaults are stored in at least one common bin file within a storage unit, determining a normalized storage utilization level for the vault, updating a bin file utilization level based on the normalized storage utilization level for each vault and, when the updated bin file utilization level is less than a low bin file utilization threshold level, facilitating compaction of the at least one common bin file. For example, the processing module transfers remaining encoded data slices of other vaults to a new bin file, generates an indicator to indicate that 100% of the new bin file is utilized, and deletes the bin file associated with the encoded data slices of the vault to be deleted.

OPTIMIZING REBUILDS WHEN USING MULTIPLE INFORMATION DISPERSAL ALGORITHMS
20170192692 · 2017-07-06 ·

Systems and methods for performing slice rebuilds when using multiple information dispersal algorithms identify a storage error of an encoded data slice of a first set of data slices encoded utilizing first dispersal parameters and stored in a first set of dispersed storage units. When a second decode threshold number for a second set of encoded data slices stored in a second set of dispersed storage units is less than a decode threshold number of the first set of encoded data slices, a decode threshold number of encoded data slices of the second set of encoded data slices are obtained. A rebuilt encoded data slice is generated using the decode threshold number of second encoded data slices which are decoded. The decoded data segment is then encoded using the dispersal parameters of first the set of dispersed storage units. The rebuilt encoded data slice may then be stored in the set of dispersed storage units.