Patent classifications
G06F11/16
Device and system including adaptive repair circuit
A device, system, and/or method includes an internal circuit configured to perform at least one function, an input-output terminal set and a repair circuit. The input-output terminal set includes a plurality of normal input-output terminals connected to an external device via a plurality of normal signal paths and at least one repair input-output terminal selectively connected to the external device via at least one repair signal path. The repair circuit repairs at least one failed signal path included in the normal signal paths based on a mode signal and fail information signal, where the mode signal represents whether to use the repair signal path and the fail information signal represents fail information on the normal signal paths. Using the repair circuit, various systems adopting different repair schemes may be repaired and cost of designing and manufacturing the various systems may be reduced.
Memory device having error notification function
A memory device having an error notification function includes an error correction code (ECC) engine detecting and correcting an error bit by performing an ECC operation on data of the plurality of memory cells, and an error notifying circuit configured to output an error signal according to the ECC operation. The ECC engine outputs error information corresponding to the error bit corresponding to a particular address corrected by the ECC operation. The error notifying circuit may output the error signal when the particular address is not the same as any one of existing one or more failed addresses.
Scalable clusterwide de-duplication
A system and method for minimizing duplicate data transfer in a clustered storage system, having compute nodes in a compute plane coupled to data nodes in a data plane is provided. The method may include generating a hash key relating to content of a virtual disk associated with a compute node. During a data replication phase, the method may detect duplicate data stored in respective storage units of the compute node and the data node using the hash key. Further, the method may eliminate redundant data transfers through the use of an index and mapping scheme, where only non-duplicate data is transferred along with a set of logical block addresses associated with duplicate data from the replicating compute node to the data node. During a data recovery phase, the method may transfer duplicate data from a peer compute node or from a virtual machine to the requesting compute node, eliminating excess data transfer.
Two-way real time communication system that allows asymmetric participation in conversations across multiple electronic platforms
Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first communication as part of a conversation, from an unauthenticated user of a web browser. A conversation identifier is determined based on the first communication. A first responder, a communication protocol, and a communication address of the first responder is determined. The first communication is sent to the first responder and a first reply is received. The conversation identifier is determined based on the first reply and the first reply is mapped to the web browser. The first reply is sent to the web browser.
Network virtualization policy management system
Concepts and technologies are disclosed herein for providing a network virtualization policy management system. An event relating to a service can be detected. A first policy that defines allocation of hardware resources to host the virtual network functions can be obtained, as can a second policy that defines deployment of the virtual network functions to the hardware resources. The hardware resources can be allocated based upon the first policy and the virtual network functions can be deployed to the hardware resources based upon the second policy.
MULTIPLE SIGN CONTROLLER
Embodiments of a multiple sign controller are generally described herein. Many embodiments include a multiple sign controller system. In some embodiments, the multiple sign controller can comprise a computer, a single instance of an operating system configured to run on the computer, two or more virtual sign controller instances, one or more physical communication ports coupled to the computer, and two or more virtual ports configured to run on the single instance of the operating system. In many embodiments, a first virtual port of the two or more virtual ports can be associated with a first virtual sign controller instance of the two or more virtual sign controller instances. Other embodiments may be described and claimed.
Data transfer in a data protection system
Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
Data transfer in a data protection system
Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
Method and apparatus, and readable storage medium
A redundant array of independent disks (RAID) management method includes, when detecting that a component in a storage medium fails, recovering, based on a RAID policy, data stored in the failed component, saving the recovered data into a pre-defined redundant space of the RAID, and mapping an address of the failed component with the address of the redundant space, converting, according to the mapping, an address of to-be-accessed data comprised in an accessing request into an address within the redundant space, and accessing the to-be-accessed data from the redundant space according to the address within the redundant space.
Securing crash dump files
In a computer storage system, crash dump files are secured without power fencing in a cluster of a plurality of nodes connected to a storage system. Upon an occurrence of a panic of a crashing node and prior to receiving a panic message of the crashing node by a surviving node loading, in the cluster, a capturing node to become active, prior to a totem token being declared lost by the surviving node, for capturing the crash dump files of the crashing node.