Patent classifications
G06F11/2005
Semiconductor device and method for protecting bus
The master interface generates copy data by copying the first data, and generates an error detection code based on the copy data. The protocol conversion unit generates the second data by converting the first data from the first protocol to the second protocol. The slave interface detects errors in the copy data based on the error detection code. The slave interface also generates the first verification data by performing a conversion from one of the first protocol or the second protocol to the other for one of the second data or copy data. In addition, the slave interface compares the second verification data with the first verification data, using the other of the second data or copy as the second verification data.
Tiering Valid Data after a Disaster Recovery Operation
Staging data on a storage element integrating fast durable storage and bulk durable storage, including: receiving, at a storage element integrating fast durable storage and bulk durable storage, a data storage operation from a host computer; storing data corresponding to the data storage operation within fast durable storage in accordance with a first data resiliency technique; and responsive to detecting a condition for transferring data between fast durable storage and bulk durable storage, transferring the data from fast durable storage to bulk durable storage in accordance with a second data resiliency technique.
SELECTING INTERFACES FOR DEVICE-GROUP IDENTIFIERS
In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.
Vehicle communication system
A vehicle communication system includes a switching hub incorporated in a vehicle and including a switch IC and an external CPU. The switch IC includes an internal CPU and performs a transfer process of transferring information to a communication device. The external CPU is provided outside the switch IC and connected to the switch IC, and has higher information processing capability than the internal CPU. The external CPU can perform a transfer order process of ordering to transfer information to the communication device and perform a security process of securing the security of the information to be transferred when the transfer order process is performed. The internal CPU monitors the operation of the external CPU and when the external CPU is abnormal, performs the transfer order process instead of the external CPU.
REDUNDANT CONTROL IN A DISTRIBUTED AUTOMATION SYSTEM
A method for redundant control in a distributed automation system, preferably a real-time automation system, for operating a client device of the distributed automation system is discussed. The method includes using the client device to monitor for the occurrence of a fault in communication between the client device and a first computing infrastructure that is part of the distributed automation system and operates the client device. The method may also include using the client device, once the fault occurs, to instruct a second computing infrastructure of the distributed automation system to operate the client device.
Managing containers on a data storage system
Mechanisms and techniques are employed for managing the allocation and load balancing of storage system resources for the containerized, distributed execution of applications on a storage system. A control component executing on a processing component of the storage system may control reserving the necessary resources on one or more processing components to implement an application, and control a container management module to create, deploy and/or modify one or more containers on one or more processing components of the storage system. The one or more containers then may be executed to implement the application. Multiple processing components of the storage system may have a resource management module executing thereon. The control component may exchange communications with the one or more resource management modules of each processing component to determine the resources available within the processing component; e.g., to determine whether the processing component can satisfy the resource requirements of the application.
PERIPHERAL COMPONENT INTERCONNECT EXPRESS DEVICE AND OPERATING METHOD THEREOF
A Peripheral Component Interconnect Express (PCIe) device includes a plurality of lanes comprising a plurality of ports, a link controller setting a link including the plurality of lanes, wherein the link is set to have a link width that includes the remaining of lanes, except for a fail lane from among the plurality of lanes, and an EQ controller performing an equalization operation for determining a transmitter or receiver setting of each of the remaining lanes, wherein the EQ controller determining a final EQ coefficient using a log information and an error information.
Staging data within a unified storage element
Staging data on a storage element integrating fast durable storage and bulk durable storage, including: receiving, at a storage element integrating fast durable storage and bulk durable storage, a data storage operation from a host computer; storing data corresponding to the data storage operation within fast durable storage in accordance with a first data resiliency technique; and responsive to detecting a condition for transferring data between fast durable storage and bulk durable storage, transferring the data from fast durable storage to bulk durable storage in accordance with a second data resiliency technique.
MANAGING CONTAINERS ON A DATA STORAGE SYSTEM
Mechanisms and techniques are employed for managing the allocation and load balancing of storage system resources for the containerized, distributed execution of applications on a storage system. A control component executing on a processing component of the storage system may control reserving the necessary resources on one or more processing components to implement an application, and control a container management module to create, deploy and/or modify one or more containers on one or more processing components of the storage system. The one or more containers then may be executed to implement the application. Multiple processing components of the storage system may have a resource management module executing thereon. The control component may exchange communications with the one or more resource management modules of each processing component to determine the resources available within the processing component; e.g., to determine whether the processing component can satisfy the resource requirements of the application.
Micro-level network node failover system
An improved core network that can monitor micro-level issues, identify specific services of specific nodes that may be causing an outage, and perform targeted node failovers in a manner that does not cause unnecessary disruptions in service is described herein. For example, the improved core network can include a failover and isolation server (FIS) system. The FIS system can obtain service-specific KPIs from the various nodes in the core network. The FIS can then compare the obtained KPI values of the respective service with corresponding threshold values. If any KPI value exceeds a corresponding threshold value, the FIS may preliminarily determine that the service of the node associated with the KPI value is responsible for a service outage. The FIS can initiate a failover operation, which causes the node to re-route any received requests corresponding to the service potentially responsible for the service outage to a redundant node.