Patent classifications
G06F11/1658
Cross cluster replication
Methods and systems for cross cluster replication are provided. Exemplary methods include: periodically requesting by a follower cluster history from a leader cluster, the history including at least one operation and sequence number pair, the operation having changed data in a primary shard of the leader cluster; receiving history and a first global checkpoint from the leader cluster; when a difference between the first global checkpoint and a second global checkpoint exceeds a user-defined value, concurrently making multiple additional requests for history from the leader cluster; and when a difference between the first global checkpoint and the second global checkpoint is less than a user-defined value, executing the at least one operation, the at least one operation changing data in a primary shard of the follower cluster, such that an index of the follower cluster replicates an index of the leader cluster.
Programmable climate controller for a vehicle
A programmable replacement controller that has a number of embedded applications corresponding to a number of OEM vehicle systems and a selected application within the controller can be called to service or activated through the programming feature of the replacement controller.
Servicing data storage devices in a data storage array
Systems and methods for replacing and testing a data storage device are disclosed. In disclosed embodiments, a system including a data storage array (DSA) including a plurality of data storage devices (DSDs) in an enclosure. The system further includes an I/O server coupling the DSA to a client node and configured to provide data access between the client node and the DSA. The system further includes a management server coupled to the DSA, configured to detect a failed DSD in the DSA, detect a replacement DSD in the enclosure that replaces the failed DSD, and add the replacement DSD to a logical path of the DSA. The management server is further configured to display an indication of a state of the DSA based on the comparing.
SYSTEMS AND METHODS FOR PROVIDING CONTINUING ACCESS TO A REMOTE COMPUTER PROGRAM
Systems and methods are provided for using a file-sharing service to identify, execute, and provide continuing access to remote computer programs. In certain embodiments, a list of files to be accessed remotely is provided to a first device, a selection is received from a user at the first device identifying a file from the provided list, and an application is executed on a second device to access a copy of the identified file, which is synchronized with a file-sharing service.
Active-active environment control
The present disclosure provides a method, system, and device for security object synchronization at multiple nodes of an active-active environment. To illustrate, a source node may generate a corresponding security object sync request for each of multiple target nodes. The source node may send the security object sync request to the target nodes via a source queue and, for each target node, a corresponding distribution queue. A distribution queue may be closed based on an acknowledgement received from a corresponding target node, after a time period, or after a number of transmission attempts. A synchronization log may be maintained to indicate which security object sync requests have been delivered to which target nodes. In some implementations, the source node and the target nodes are part of an active-active environment that may be synchronized in time so the nodes resolve conflicts between received security object updates initiated from two different nodes.
SYNCHRONIZING CONFIGURATION OF PARTNER OBJECTS ACROSS DISTRIBUTED STORAGE SYSTEMS USING TRANSFORMATIONS
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
Layer 7 health check automated execution framework
A method, computer readable medium, and computer network are provided for performing a synchronization operation. The method may comprise retrieving a list of network addresses of all standby servers in a standby server pool. The method may further include, using the list of network addresses, sending a health check query to each standby server in the standby server pool, and receiving response messages from the standby servers in the standby server pool. A positive response may indicate that the standby server is active in the standby server pool, and a negative response may indicate that the standby server is inactive in the standby server pool. The method may include, when any standby server returns the positive response, sending a message to an administrator. The method may further include, when every standby server returns the negative response, initiating a synchronization operation on a standby database connected to the standby servers.
METHOD AND SYSTEM FOR AUTOMATED HEALING OF HARDWARE RESOURCES IN A COMPOSED INFORMATION HANDLING SYSTEM
In general, the invention relate to providing computer implemented services using information handling systems. One or more embodiments includes after being allocated to a composed information handling system of the composed information handling systems: monitoring health of a hardware resource of the composed information handling system, making a determination, based on the monitoring of the health of the hardware resource, that the hardware resource is in a compromised state, and based on the determination, initiating a hardware replacement operation using replacement option information (ROI) for the hardware resource and replacement conditions for the hardware resource.
SERIAL PRESENCE DETECT RELIABILITY
A serial presence detect (SPD) device includes nonvolatile memory to store SPD information. Parity information suitable for single error correct and double error detect (SEC-DED) is also stored in association with the SPD information in the nonvolatile memory. The combination of SPD information and parity information is organized into codewords addressable at each memory location. During an initialization period occurring after a power on reset and before the SPD device is accepting I2C commands, the SPD device checks each memory location (codeword) for errors. Each error detected is counted to provide an indicator of device health. Before the initialization period expires, the SPD device writes a corrected codeword back to the nonvolatile memory.
Data Storage Method and Device
Embodiments of this application disclose a data storage method. The method includes: A data storage service system including two nodes is deployed on a wheeled mobile device (for example, an intelligent vehicle, an autonomous vehicle, or a connected vehicle). A first node is a primary node, and a second node is a secondary node. A first process and a second process respectively run on the first node and the second node. When the first node receives a data write request, the first node first invokes a first database engine by using the first process to write data to a first storage module on the first node, and then in a blocking mode, the first node enables the second node to invoke a second database engine by using the second process to perform a same data write operation on a second storage module on the second node.