G06F2213/0008

Implementing management commands utilizing an in-band interface

A computer-implemented method according to one embodiment includes receiving, at a peripheral device via an in-band interface, a predetermined command; determining, by the peripheral device, a predetermined identifier within the predetermined command; and implementing, by the peripheral device, parameter data associated with the predetermined identifier, in response to the determining.

PERFORMANCE-DRIVEN MOVEMENT OF APPLICATIONS BETWEEN CONTAINERS WITH DIFFERENT ACCESS PROTOCOLS
20220179580 · 2022-06-09 ·

An apparatus in one embodiment comprises at least one processing device. The at least one processing device is configured to monitor performance of respective ones of a plurality of paths for accessing a logical storage device, and responsive to detection of at least one specified condition in the monitored performance relating to at least a subset of the paths, to move at least one application from a first container that utilizes a first access protocol to access the logical storage device to a second container that utilizes a second access protocol different than the first access protocol to access the logical storage device. For example, in some embodiments, the at least one processing device is configured to move an application from first container that utilizes a SCSI access protocol to a second container that utilizes an NVMe access protocol, and vice versa, responsive to detected performance issues.

Maintenance of access for security enablement on a host system

A host port is enabled for security. In response to a determination by the host port that authentication or security association negotiation with a storage port cannot be completed successfully, the host port determines whether an audit mode indicator has been enabled in a login response from the storage port. The host port preserves input/output (I/O) access to the storage port based on determining whether the audit mode indicator has been enabled in the login response from the storage port.

Optical module for CXL standard

An optical module includes first circuitry configured to receive data transmitted from a host over an electrical communication link at a first data rate, the data transmitted from the host being either one of PCIe data and CXL data and change a data rate for transmission of data from the optical module, the data transmitted from the optical module being transmitted at a second data rate different from the first data rate. Second circuitry is configured to convert the data transmitted from the host at the first data rate from an electrical format to an optical format for transmission from the optical module at the second data rate and convert data received from an optical receiver at the second data rate from the optical format to the electrical format for transmission from the optical module to the host at the first data rate via the first circuitry.

EXPANSION (E)-PORT SPOOFING DETECTION AND COUNTERMEASURES
20230297726 · 2023-09-21 · ·

Systems and methods for detecting cybersecurity attacks comprise monitoring switches in a Fibre Channel (FC) fabric to obtain and examine network information to identify indicators of compromise (IoC), such as an attempt of a compromise or an actual compromise of the FC fabric by an unauthorized device. Exemplary IoCs comprise changes in zoning and/or the number of switches in the fabric.

SYSTEM AND METHOD FOR PROVIDING IN-STORAGE ACCELERATION (ISA) IN DATA STORAGE DEVICES
20230016328 · 2023-01-19 ·

A data storage device includes: a data storage medium; a processor comprising a plurality of processor cores; a plurality of application acceleration black-box (AABB) slots including reconfigurable logic blocks, interconnects, and memories; a host interface that receives a host command from a remote application running on a remote host computer, wherein the host command includes an image file including a register-transfer level (RTL) bitstream and a firmware driver; and a configuration controller that downloads the RTL bitstream to an AABB slot of the plurality of AABB slots and reconfigure the AABB slot, and load the firmware driver to a processor core of the processor. The processor core loaded with the firmware driver runs a data acceleration process of the remote application to access and process data stored in the data storage medium using the RTL bitstream downloaded in the AABB slot.

Dynamic background scan optimization in a memory sub-system

Aspects of the present disclosure are directed to performing varying frequency memory sub-system background scans using either or both a timer and an I/O event limit. This can be accomplished by identifying a background scan trigger event from one of multiple possible types of background scan trigger events, such as a timer expiration or reaching an event count limit. In response to the background scan trigger event, a background scan can be initiated on a memory portion. The background scan can produce results, such as CDF-based data. When a metric based on the results exceeds a background scan limit, a refresh relocation can be performed and logged. A metric can be generated based on the CDF-based data, obtained error recovery depth data, or refresh relocation event data. When the metric is above or below corresponding background scan thresholds, a background scan frequency can be adjusted.

Performance-driven movement of applications between containers utilizing multiple data transmission paths with associated different access protocols

An apparatus in one embodiment comprises at least one processing device. The at least one processing device is configured to monitor performance of respective ones of a plurality of paths for accessing a logical storage device, and responsive to detection of at least one specified condition in the monitored performance relating to at least a subset of the paths, to move at least one application from a first container that utilizes a first access protocol to access the logical storage device to a second container that utilizes a second access protocol different than the first access protocol to access the logical storage device. For example, in some embodiments, the at least one processing device is configured to move an application from first container that utilizes a SCSI access protocol to a second container that utilizes an NVMe access protocol, and vice versa, responsive to detected performance issues.

Network systems and methods for CXL standard

A first processing unit for a computer server apparatus includes a first circuit configured to process a first type of data to be transmitted and received over a communication channel in accordance with a peripheral component interconnect express (PCIe) protocol, a second circuit configured to process a second type of data to be transmitted and received over the communication channel in accordance with a compute express link (CXL) protocol, and an optical communication interface configured to modulate the first type of data and the second type of data into a first signal in a PAM format to be transmitted over the communication channel to a second processing unit and receive, from the second processing unit over the communication channel, a second signal including either one of the first type of data and the second type of data modulated in the PAM format.

Data copy offload command support across multiple storage access protocols

An apparatus includes at least one processing device, with the at least one processing device comprising a processor and a memory coupled to the processor. The at least one processing device is configured to generate a data copy offload command to offload a data copy operation from a host device to a storage system, the command comprising a multi-protocol indicator that specifies that data is to be copied from a source logical storage device that utilizes a first access protocol to a destination logical storage device that utilizes a second access protocol different than the first access protocol, and to send the data copy offload command from the host device to the storage system over a network for performance of the offloaded data copy operation in the storage system in accordance with the command. The first and second access protocols illustratively comprise respective SCSI and NVMe access protocols.