G06F11/1458

Ticketing system for managing computing services

Examples include a ticketing system for managing performance of computer services. The ticketing system includes a ticket database to store a plurality of tickets, each ticket defining a job to be performed on a computing system, and a master to create a ticket, store the ticket in the ticket database, and update the ticket. The ticketing system includes a scheduler to determine whether to create the ticket based at least in part on a set of conditions, and to request the master to create the ticket when the ticket is to be created, and a worker to get the ticket from the master, perform the job defined by the ticket, and request the master to update the ticket with a status of the ticket. The ticketing system includes a supervisor to request the master to find a stale ticket, and, if found, to request the worker to abort performance of the job defined by the stale ticket.

UPDATING A VIRTUAL MACHINE BACKUP

A virtual machine disk image file backup is selected among a plurality of virtual machine disk image file backups stored on a backup storage based on a backup update policy. A version of the selected virtual machine disk image file backup is mounted. Based on the backup update policy, an update to the mounted version of the selected virtual machine disk image file backup is applied without restoring the selected virtual machine disk image file backup. The updated version of the selected virtual machine disk image file backup is stored on the backup storage.

METHOD FOR CONTROL, BACKUP SYSTEM, AND CONTROL DEVICE
20230058752 · 2023-02-23 · ·

A method includes storing owner information indicating one or more owners of one or more storage devices and one or more owners of one or more backup storages; and enabling at least one of a backup processing and a restoration processing between a first backup storage of the one or more backup storages and a first storage device of the one or more storage devices, under a condition an owner of the first storage device and an owner of the first backup storage match.

Adaptive rebuilding of encoded data slices in a storage network
11588892 · 2023-02-21 · ·

A method for execution by a computing device of a storage network begins by obtaining scoring information for a rebuilding encoded data slices for one or more storage units of a set of storage units of the storage network, where the scoring information includes two or more of a plurality of rebuilding rates, a plurality of input/output rates, a plurality of scores, and a plurality of selection rates. The method continues with determining a rebuilding rate of the plurality of rebuilding rates to utilize for the rebuilding based on the scoring information. The method continues by implementing the rebuilding of the encoded data slices in accordance with the rebuilding rate.

Transparent checkpointing and process migration in a distributed system

A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library.

Log monitoring

A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing.

USING UTILITIES INJECTED INTO CLOUD-BASED VIRTUAL MACHINES TO SPEED UP VIRTUAL MACHINE BACKUP OPERATIONS

An executable utility is injected into cloud-based virtual machines (VMs) that are subject to backups by a data storage management system tasked with protecting the cloud-based VMs and their associated data. The utility is injected into a target VM which is “live” and operating. The utility analyzes the VM’s live volume to discover data extents therein, and for each extent computes a respective checksum and determines whether the extent is a “hole.” Afterwards, checksums help identify changed data in successive snapshots of the live volume, so that only changed data will be read and backed up in incremental backups. Time is saved in performing the backup operation first by pre-warming the backup’s source volume in parallel with the utility analyzing the live volume, and second by skipping read operations for extents unchanged since a preceding backup. The resulting incremental backup operation is sped up as compared to prior art approaches.

VERTICAL TRANSISTOR AND METHOD OF FORMING THE VERTICAL TRANSISTOR
20230042711 · 2023-02-09 ·

A semiconductor device including a fin structure formed on a first semiconductor region, and a first semiconductor structure controlling the first semiconductor region, the first semiconductor structure formed on a substrate and spaced apart from the first semiconductor region including the fin structure.

Computing system with hardware reconfiguration mechanism and method of operation thereof
11494322 · 2022-11-08 · ·

A method of operation of a computing system includes: providing a first cluster having a first kernel unit for managing a first reconfigurable hardware device; analyzing an application descriptor associated with an application; generating a first bitstream based on the application descriptor for loading the first reconfigurable hardware device, the first bitstream for implementing at least a first portion of the application; and implementing a first fragment with the first bitstream in the first cluster.

Method and System for Remote Data Access
20230097735 · 2023-03-30 ·

A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.