Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


State recovery (i.e., process or data file)

Subclass of:

714 - Error detection/correction and fault detection/recovery

714100000 - DATA PROCESSING SYSTEM ERROR OR FAULT HANDLING

714001000 - Reliability and availability

714002000 - Fault recovery

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
714016000 Forward recovery (e.g., redoing committed action) 82
714019000 Undo record 52
714018000 Transmission data record (e.g., for retransmission) 34
714020000 Plural recovery data sets containing set interrelation data (e.g., time values or log record numbers) 28
714021000 State validity check 9
714022000 With power supply status monitoring 7
Entries
DocumentTitleDate
20130031407IDENTIFYING A SLICE ERROR IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module identifying a set of collections of records corresponding to a data segment that is stored in a dispersed storage network (DSN) as a set of encoded data slices, wherein a collection of records includes an event record including information regarding an event, a first record including information regarding a dispersed storage (DS) processing module processing an event request to produce a plurality of sub-event requests, and a plurality of records including information regarding a set of DS units processing the plurality of sub-event requests. The method continues with the DS processing module determining whether an error exists for one of the set of encoded data slices based on at least some of the set of collections of records and when the error exists, flagging the one of the set of encoded data slices for potential rebuilding.01-31-2013
20120173925METHOD AND A STORAGE SERVER FOR DATA REDUNDANCY - A method and a storage server for backing up data involves mass storage devices of users of the service that connect to the storage server of the service provider over a public data network. The customers store the data with their terminals. The data is stored to the file system of the mass storage device which encrypts the stored data and transfers the data in encrypted form over the public data network to the storage server. The storage server calculates error correction data from the encrypted data. The error correction data is stored in the mass memory of the storage server. When recovering the stored data of the users, the storage server requests the stored data of all the users whose data was used for the error correction data calculation over the public data network to be used for the recovery calculation.07-05-2012
20120173923ACCELERATING THE PERFORMANCE OF MATHEMATICAL FUNCTIONS IN HIGH PERFORMANCE COMPUTER SYSTEMS - Enabling application instructions to access mathematical functions from an accelerated function library to perform instructions. In the performance of the instructions, applying a predefined test instruction on a value, the value being at least one of an input argument, an intermediate result or a final result to determine if the value is a general-case or a predetermined special-case. Responsive to a determination that the value is a special-case, performing a predetermined set of special-case instructions for the performance of the mathematical function.07-05-2012
20100023806TR-069 savepoints - A method for improving the security of actions performed by Remote Procedure Calls RPC invoked during a TR-069 Remote Management Protocol session between an Auto-Configuration Server ACS and a Customer Premises Equipment CPE of a DSL telecommunication system. The TR-069 session comprises several RPC's executing actions on parameters of an object model and the method comprises the steps of 01-28-2010
20090193292Methods And Computer Program Products For Defing Synchronous Replication Devices In A Subchannel Set Other Than Subchannel Set Zero - Exemplary embodiments of the present invention define PPRC devices within subchannel sets other than subchannel set zero. Further, for all PPRC paired n devices an additional N/2 PPRC primary device numbers and subchannels are provided within subchannel set zero by moving PPRC secondary devices to any subchannel set other than subchannel set zero.07-30-2009
20100083041FILE UPDATE SYSTEM AND BOOT MANAGEMENT SYSTEM OF MOBILE COMMUNICATION TERMINAL, METHOD OF UPDATING FILE IN MOBILE COMMUNICATION TERMINAL, AND METHOD OF BOOTING MOBILE COMMUNICATION TERMINAL - Disclosed are a file update system of a mobile communication terminal which is capable of recovering Same Owner ID Error caused by damage of a file header in an EFS (Embedded File System) area of the mobile communication terminal, a boot management system of a mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal, a method of updating a file in the mobile communication terminal, and a method of booting the mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal.04-01-2010
20130212430ELECTRONIC DEVICE WITH FIRMWARE RECOVERY FUNCTION AND METHOD FOR RECOVERING FIRMWARE - An electronic device with firmware recovery function includes a connecting port to connect the electronic device to an external device and a BMC. The BMC includes a firmware memory storing firmware data of the BMC and a microprocessor. The microprocessor determines whether the BMC is able to execute the firmware data in the firmware memory, and determines whether a download command for downloading firmware data is received from the external device when the BMC is not able to execute the firmware data in the firmware memory. The microprocessor further reads the firmware data from the external device into a memory space of the microprocessor upon receiving the download command, and recovers the firmware data in the firmware memory by writing the firmware data from the memory space of the microprocessor into the firmware memory. A related method is also provided.08-15-2013
20100050018SATA primitive prediction and correction - A method of correcting corrupted primitives transmitted between a serial advanced technology attachment (SATA) host and a SATA device includes analyzing a current state, a previously transmitted primitive, or a previously received primitive; selecting at least one candidate primitive according to at least one of the current state, the previously transmitted primitive and the previously received primitive; predicting the identity of a current primitive according to at least one candidate primitive and a received current primitive; and replacing the corrupted primitive with the predicted primitive when the predicted primitive is different from the current primitive.02-25-2010
20110202794METHOD OF RESTORING MASTER BOOT RECORD OF STORAGE MEDIUM, STORAGE MEDIUM DRIVING DEVICE, AND STORAGE MEDIUM - A storage medium driving device including a storage medium having a user area and a non-user area, and to record master boot record information that is backed up in the non-user area, and a controller to compare the backup master boot record information with master boot record information read from the user area, and to restore master boot record information recorded in the user area according to the comparison results.08-18-2011
20100077254METHOD AND APPARATUS FOR REPLACING A DEVICE IN A NETWORK - The invention relates to a method for replacing a device in a network comprising a plurality of devices. The method includes a step of storing (03-25-2010
20130086418DATA PROCESSING FAILURE RECOVERY METHOD, SYSTEM AND PROGRAM - When reproducing the running state after a failure has occurred in stream data processing, all window operations are used while minimizing the storage amount necessary for obtaining backup data. While an operator is performing stream data processing in response to a query, a query analysis unit analyzes the operator, which holds the running state of the window, etc., and the recovery points of said operator. When obtaining backup data, a backup data management unit manages the capacity necessary to obtain snapshots of the analyzed recovery points, calculates the storage area capacity needed for backing up input data up to each recovery point and the storage area capacity needed to obtain a snapshot for a window that cannot be reproduced in that way, and records the execution state by selecting a recovery point which minimizes the total value of necessary storage capacity.04-04-2013
20130080831STORAGE APPARATUS, SYSTEM, AND CONTROL METHOD - A storage apparatus includes a storage drive which writes and reads out a block of data with respect to a storage medium loaded on the storage apparatus, a processor which executes access control on a plurality of volumes assigned to the storage medium and a memory which stores a piece of management information that includes a piece of information indicating a usage frequency of each of the volumes. The processor executes a procedure including: determining a reallocation target volume from among a plurality of volumes assigned to the storage medium based on the management information, and moving the data of the reallocation target volume to a reallocation destination storage medium which is different from the storage medium.03-28-2013
20130036328MANAGING CONTINUOUS SOFTWARE DEPLOYMENT - Concepts and technologies are described herein for managing continuous software deployment. A deployment controller can manage deployment of code to a data center. The deployment controller can execute workflows for checking in, verifying, deploying the code, or other processes. The code can be deployed using a differencing disk that includes data indicating changes between software hosted by the data center and a version of software resulting from deployment of the code. The differencing disk can be linked to the disk or virtual resource hosting the software and executed collectively to provide an updated version of the software. Traffic to one or more virtual machines of the data center can be controlled by the deployment controller. If errors are detecting during deployment or after updating, the update can be rolled back.02-07-2013
20130080830SETTING DATA STORAGE FOR SEMICONDUCTOR DEVICES INCLUDING MEMORY DEVICES AND SYSTEMS - A setting data storage circuit includes a setting data storage block configured to store setting data; an access unit configured to access the setting data of the setting data storage block; an error detection unit configured to detect an error in the setting data; and an error recovery unit configured to recover an error in the setting data storage block when the error detection unit detects an error.03-28-2013
20090158089METHOD FOR RECOGNIZING A POWER FAILURE IN A DATA MEMORY AND RECOVERING THE DATA MEMORY - To detect a power failure in a volatile data memory containing useful data units and test data units associated with the useful data units, the associated test data unit is also read when the useful data unit is read-accessed, and a decision is made as to whether the useful data unit is corrupted based on the test data unit. A power failure is identified when at least two read useful data units within a predefined number of successive read accesses are found to be corrupted.06-18-2009
20100332898NONVOLATILE MEMORY DEVICE AND COPYBACK PROGRAM METHOD THEREOF - A nonvolatile memory device includes a plurality of memory blocks each configured to include a plurality of pages, a plurality of page buffers configured to correspond to the plurality of memory blocks and send copyback data, a controller configured to send the copyback data to a page buffer selected from among the page buffers, and a register configured to store an address of a page that has been failed, from among the pages, during a copyback program operation.12-30-2010
20100107007SYSTEM RECOVERY IN A HEATING, VENTILATION AND AIR CONDITIONING NETWORK - The disclosure provides a system and method of retrieving data for an active subnet controller of a subnet in an HVAC network. In an embodiment, a device on said subnet reports a loss of internal memory settings to said active subnet controller. The device is recognized by the active subnet controller. At least one list of parameters is requested from the device by the active subnet controller. An order of said at least one list of parameters is employed to convey corresponding stored values of these parameters from the active subnet controller to the coupled device.04-29-2010
20100107006Method and Semiconductor Memory With A Device For Detecting Addressing Errors - A semiconductor memory and a data processing system having hardware for carrying out a method for the improved internal monitoring of addressing circuits in semiconductor memories or in a data processing system, in which logic levels addressing lines are tapped off, the actually selected address or subaddress is represented by additional address bit lines, the actually accessed address/subaddress is recovered using the address bit lines, and the actually selected address/subaddress is compared with the applied address/subaddress, obtained from the additional address bit lines, in order to recognize an error in the addressing circuit.04-29-2010
20100031086REPAIR OF A CORRUPT DATA SEGMENT USED BY A DE-DUPLICATION ENGINE - In a method for repairing a corrupt data segment used by a de-duplication engine, a data segment indexed by a de-duplication index is identified as being as a corrupt data segment. A search is made to find a duplicate data segment with which to replace the corrupt data segment, where the duplicate data segment comprises an uncorrupted version of the data segment. The corrupt data segment is replaced with the duplicate data segment.02-04-2010
20120185727COMPUTING SYSTEM RELIABILITY - Systems, methods, and computer-readable and executable instructions are provided for computing system reliability. A method for computing system reliability can include storing, on one of a plurality of devices, a checkpoint of a current state associated with the one of the plurality of devices. The method may further include storing the checkpoint in an erasure-code group across the plurality of devices.07-19-2012
20130047032DATA SET AUTORECOVERY - An approach to providing auto recovery of data sets in volumes. When an error condition results from an attempt to access an unintentionally deleted data set, an event is generated and sent to other systems with access to the volume in which the data set existed. The volume is also locked to prevent corruption during the recovery process. A system that has the unintentionally deleted data set open retrieves location information for the data set from control blocks in the system's memory. This location information is used to build a new entry for the data set in the VTOC for the volume. When the data set is thus recovered, the data set is validated, the lock removed, and the data set is made available to the systems sharing the volume.02-21-2013
20130047033INDICATION OF A DESTRUCTIVE WRITE VIA A NOTIFICATION FROM A DISK DRIVE THAT EMULATES BLOCKS OF A FIRST BLOCK SIZE WITHIN BLOCKS OF A SECOND BLOCK SIZE - A disk drive receives a request to write at least one block of a first block size, wherein the disk drive is configured to store blocks of a second block size that is larger in size than the first block size. The disk drive stores a plurality of emulated blocks of the first block size in each block of the second block size. The disk drive generates a read error, in response to reading a selected block of the second block size in which the at least block of the first block size is to be written via an emulation. The disk drive performs a destructive write of selected emulated blocks of the first block size that caused the read error to be generated. The disk drive writes the at least one block of the first block size in the selected block of the second block size.02-21-2013
20130047031SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system.02-21-2013
20090044050WATCHDOG MECHANISM WITH FAULT RECOVERY - A method for handling watchdog events of an electronic device includes detecting a watchdog fault in a normal mode, which is a watchdog event in which a watchdog trigger is not correctly serviced; entering from the normal mode into a first escalation level of nx escalation levels upon detection of the watchdog fault, wherein nx is an integer equal to or greater than 1; detecting correct watchdog events, which are watchdog events in which a watchdog trigger is correctly serviced; and concurrently detecting watchdog faults, leaving the first escalation level if a first escalation condition is met, and recovering in a recovering step back from any of the nx escalation levels to a previous level or mode, if a de-escalation condition is met. An electronic device embodiment includes a CPU and program instructions for carrying out the method.02-12-2009
20090307527DATA RETRIEVAL AND HANDLING SYSTEMS, VIRTUAL WAREHOUSING, PRICE COMPARISON, PRICE AGGREGATION AND STOCK AVAILABILITY ENGINE - Systems in accordance with this invention obtain data over a plurality of networks from a plurality of sources which enable accurate analysis of data so obtained and subsequent manipulation and storage of the data. In particular, but not exclusively, systems in accordance with this invention relate to virtual warehousing of products as well as price comparison, price aggregation, and stock availability engines.12-10-2009
20120192008OPERATION MANAGEMENT DEVICE AND OPERATION MANAGEMENT METHOD - An operation management device includes a collecting unit to receive management data of elements provided in a plurality of management target devices, an analyzing unit to obtain a dependency relation of problematic data defined as data of devices with occurrence of the problem in the received management data according to definition information which defines a dependency relation between the elements and to obtain a dependency relation of non-problematic data defined as data of the devices with non-occurrence of the problem in the received management data according to the definition information, and a comparing unit to obtain management data of a common element by comparing the problematic data with the non-problematic data and to extract a difference between the problematic data and the non-problematic data with respect to management data of elements dependent on the common element.07-26-2012
20090094483METHOD OF MAINTAINING TASK SEQUENCE WITHIN A TASK DOMAIN ACROSS ERROR RECOVERY - Tracks of data or other data units are copied from a primary storage system to a secondary storage system. For multiple-track or multiple-data unit transfers, a group of tracks or data units which are sequentially related are transferred. A respective task is defined at the primary storage system for monitoring a progress of the transfer of each of the respective data units in a group. A state is maintained for monitoring a progress of the transfer of the group responsive to the progress of each of the tasks. A normal state is selected when there are no failed tasks. A recovery state is selected when there is a failure, and the status of the remaining tasks is being ascertained. A retry state is selected following the recovery state to retry the failed tasks. A failed state indicates an unrecoverable failure.04-09-2009
20130073903EXCEPTION NOTIFICATION SYSTEM AND METHOD - A system and method for distributing prepaid cash alternatives and resolving exceptions related to the sale of prepaid cash alternatives such as traveler's cheques or prepaid cards. Reports of sales may be reviewed to identify exceptions, and information explaining the exceptions may be made available electronically. Sellers may be notified of exceptions by e-mail, which may include a link or address to information explaining the exceptions. The information may be provided in real time through a secure site on a network, such as the Internet. A company may contract with business partners to sell the prepaid cash alternatives to customers, and the business partners may report the sales to the company via reports. After being notified of exceptions, business partners may provide corrected information or new information to resolve the exceptions.03-21-2013
20130073902FILE HANDLING FOR NAMING CONFLICTS - A file operations engine is provided that manages many user interactions with their files via a computer system. The operation engine may provide a user with the option to keep both files that have a file name conflict. It may further permit the user to rename a file involved with a file name conflict. The operations engine may also automatically rename one of the files of a file name conflict by appending a character to a root of the filename. The character may include the lowest integer available for the root in a destination for the files. The operations engine may provide the option to keep both files as part of a pre-calculation of potential errors for a requested operation. The operations engine may place file name conflicts in an error queue and permit the user to select an option to keep both files after the conflict is encountered.03-21-2013
20130061089EFFICIENT APPLICATION-AWARE DISASTER RECOVERY - Embodiments are directed to efficiently backing up portions of data and to performing a scoped data recovery. In an embodiment, a computer system preloads data images with data corresponding to various different software applications or operating systems. The computer system chunks the data images, so that each data image is divided into multiple data chunks, and where each data chunk is represented by a hash value. The computer system then receives, from a user, portions of delta data representing data differences between the received user data and the data in the preloaded data images. The computer system also generates a logical backup representation that includes the data chunk hash values for the preloaded data images as well as the delta data received from the user. This logical representation allows restoration of the user's data using only the hash values and the delta data.03-07-2013
20090271660MOTHERBOARD, A METHOD FOR RECOVERING THE BIOS THEREOF AND A METHOD FOR BOOTING A COMPUTER - A motherboard, a method for recovering a BIOS thereof, and a method for booting a computer are provided. In the method for booting the computer, a first boot block of a first BIOS unit is executed first, and then a second boot block of a second BIOS unit is executed. Afterwards, BIOS main program codes of the second BIOS unit are executed. When the second BIOS unit is down, a recovery mechanism of the first boot block is used to overwrite data in the second BIOS unit with a backup file.10-29-2009
20130067276SOFTWARE AND METHODS FOR RECOVERING A NETWORK NODE THAT HAS EXPERIENCED A FAULT - A method and system of recovering a system that has experienced a fault includes a backup device to enable access of a network through the interface in response to the fault. The system includes a main operational portion that controls operation of the system under normal conditions. However, if a fault occurs, then the backup device can be selected to take over control of the system so that data can be retrieved from a backup storage to recover the system. The backup device includes software and/or hardware components to enable the system to access a network even though the main operational portion may not be functioning properly.03-14-2013
20120117422DISASTER RECOVERY IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide a DR solution for a networked computing environment such as a cloud computing environment. Specifically, a customer or the like can select a disaster recovery provider from a pool (at least one) of disaster recovery providers using a customer interface to a DR portal. Similarly, using the interface and DR portal, the customer can then submit a request for DR to be performed for a set (at least one) of applications. The customer will then also submit (via the interface and DR portal) DR information. This information can include, among other things, a set of application images, a set of application files, a set of recovery requirements, a designation of one or more specific (e.g., application) components for which DR is desired, dump file(s), database file(s), etc. Using the DR information, the DR provider will then generate and conduct a set of DR tests and provide the results to the customer via the DR portal and interface. In one embodiment, a temporary DR environment can be created (e.g., by the DR provider or the customer) in which the DR tests are conducted.05-10-2012
20120117421SYSTEM AND METHOD FOR REMOTE RECOVERY WITH CHECKPOINTS AND INTENTION LOGS - Accurate recovery of a primary server at a recovery server is accomplished with reduced network overhead by maintaining at the recovery server checkpoints taken over time of the primary server and an intention log of logical transactions pending and complete by the primary server. The recovery server is brought to the operational state of the primary server as of failure at the primary server by recovering the most recent checkpoint and then executing the transactions indicated by the intention log as received but not complete as of the time that the checkpoint was taken.05-10-2012
20110022890CLOCK AND DATA RECOVERY CIRCUIT WITH ELIMINATING DATA-DEPENDENT JITTERS - The present invention relates to a clock and data recovery circuit (CDR), and in particular, to a CDR circuit in a full digital scheme which cancels the data-dependent jitter. A DDJ cancellation circuit according to the present invention efficiently cancels the data-dependent jitter, making it possible to configure the reliable clock and data recovery circuit in the serial link data communication through the channel of the predetermined bandwidth.01-27-2011
20090235116Systems and Methods for Regenerating Data from a Defective Medium - Various embodiments of the present invention provide systems and methods for data regeneration. For example, a system for data regeneration is disclosed that includes a data input derived from the medium. A data detector and a data recovery system receive the data input. The data detector provides a first soft output, and the data recovery system provides a second soft output. The first soft output and the second soft output are provided to a multiplexer. A media defect detector performs a media defect detection process, and provides a defect flag that indicates whether the data input is derived form a defective portion of the medium. The defect flag is provided to the multiplexer where it is used to select whether the first soft output or the second soft output is provides as an extrinsic output.09-17-2009
20130166948UNFUSING A FAILING PART OF AN OPERATOR GRAPH - Techniques for managing a fused processing element are described. Embodiments receive streaming data to be processed by a plurality of processing elements. Additionally, an operator graph of the plurality of processing elements is established. The operator graph defines at least one execution path and wherein at least one of the processing elements of the operator graph is configured to receive data from at least one upstream processing element and transmit data to at least one downstream processing element. Embodiments detect an error condition has been satisfied at a first one of the plurality of processing elements, wherein the first processing element contains a plurality of fused operators. At least one of the plurality of fused operators is selected for removal from the first processing element. Embodiments then remove the selected at least one fused operator from the first processing element.06-27-2013
20130166949SEMICONDUCTOR MEMORY DEVICE AND METHOD FOR OPERATING THE SAME - A semiconductor memory device includes, a memory cell array configured to include a plurality of memory cells each having a plurality of logic pages, an error detector configured to detect a recovery target data among the data stored in the memory cell array, and output a logic page information of the recovery target data, a data recoverer configured to recover the recovery target data by using adjustment of a read reference voltage in response to the logic page information of the recovery target data, and a page buffer configured to read the recovery target data output from the memory cell array and write a recovered data output from the data recoverer in the memory cell array.06-27-2013
20120239974DISASTER RECOVERY FAILBACK - Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system, and ownership of the storage device is designated as the source storage system for each of the instance and the replicated instance of the storage device.09-20-2012
20120239973Managing Errors In A Data Processing System - A method of managing errors in a data processing system (09-20-2012
20080294937DISTRIBUTED PROCESSING METHOD - According to an aspect of the embodiment provides a method for controlling a processing device for distributing jobs among a plurality of job processing devices for executing the jobs, respectively. The method comprises the steps of: transmitting a job to one of the job processing devices to have the job executed by the one of the job processing devices; generating a procedure information for transmitting a continuation data from the one of the job processing devices before completion of execution of the job back to the processing device, the continuation data enabling another job processing device to continue execution of the job; and transmitting the procedure information to and receiving the continuation data from the one of the job processing devices.11-27-2008
20110035624INTELLIGENT POWER CONTROL - In accordance with the techniques discussed herein, a smart monitor module (SMM) can apply the rules to information gathered about a device to determine whether a device has entered a failed state. Upon entry into the failed state, the system reboots the device to restore the device to the active state.02-10-2011
20110035623DETECTION OF FUSE RE-GROWTH IN A MICROPROCESSOR - A microprocessor includes a first plurality of fuses, a predetermined number of which are selectively blown. Control values are provided from the fuses to circuits of the microprocessor to control operation thereof. A second plurality of fuses are blown with the predetermined number of the first plurality of fuses that are blown and a Boolean complement of the predetermined number. In response to being reset, the microprocessor: reads the predetermined number and the Boolean complement of the predetermined number from the second plurality of fuses, Boolean complements the predetermined number read from the second plurality of fuses to generate a result, compares the result with the Boolean complement of the predetermined number read from the second plurality of fuses, and prevent itself from fetching and executing user program instructions if the result does not equal the Boolean complement of the predetermined number read from the second plurality of fuses.02-10-2011
20110035622DETECTION AND CORRECTION OF FUSE RE-GROWTH IN A MICROPROCESSOR - A microprocessor includes a first plurality of fuses selectively blown with control values, a second plurality of fuses selectively blown collectively with an error correction value computed from the control values, control hardware that receives the control values and provides them to circuits of the microprocessor for controlling operation thereof. A state machine, serially coupled to the control hardware and to the fuses, serially scans the control values from the first fuses to the control hardware and serially scans the control values and the error correction value to a first register. The microprocessor reads the control values and error correction value from the first register, detects and corrects an error in the control values using the error correction value, writes the corrected control values to a second register, and causes the state machine to serially scan the corrected control values from the second register to the control hardware.02-10-2011
20090055683Method of restoring previous computer configuration - A method of handling and storing data in a computer by establishing a plurality of zones or sessions with different levels of write protection, writing attempted changes to data stored in a protected zone to a temporary zone, creating representative maps of some or all of the zones or sessions to track such attempted changes, reading the changes from the temporary zone such that it seems as though the changes were successful, and erasing the temporary zone when the computer is restarted, thereby allowing for “restoring” the data, or, more generally, the computer's configuration, to a state prior to the attempted change. One of the zones may contain working files which are relatively frequently changed, and such changes are treated, e.g., saved, in a substantially conventional manner and not affected by restarting the computer. Access to specific non-temporary zones may be restricted.02-26-2009
20110283138Change Tracking and Management in Distributed Applications - A monitoring and management system for distributed and interacting systems stores configuration settings after a successful installation or modification and compares values to the stored configuration settings. When a discrepancy is found, a messaging system may relay the information to a console where the issue may be dispositioned. In some cases, the configuration settings may be updated, while in other cases, the monitored setting may be restored to the stored configuration setting. A set of wizards or other user interface mechanisms may be used to restore the system to order.11-17-2011
20090158090DATA ENTRY RETRIEVAL - The present invention provides for the recovery of characters entered into at least one data entry zone of a data entry window. A method in accordance with an embodiment includes: storing a first image of the data entry window during data entry; subtracting a reference image from the first image to obtain a delta image, wherein the reference image is an image of the data entry window without data entered; identifying at least one non empty zone of the delta image and the location of the at least one data entry zone on the data entry window from the location of the at least one non empty zone on the delta image; extracting at least one character by applying optical character recognition to the least one non empty zone; and inputting the at least one character into the location of the at least one data entry zone.06-18-2009
20110202793FAILURE SYSTEM FOR DOMAIN NAME SYSTEM CLIENT - A method performed by a domain name service client includes storing DNS entries in a local cache; sending a DNS query to another device to obtain an update to one of the DNS entries; determining whether a DNS response is received; and resetting a time-to-live (TTL) timer associated with the one of the DNS entries when the DNS response is not received.08-18-2011
20110302449COLLECTION ORDERING FOR REPLICATED STATE MACHINES - A replicated state machine with N replica servers may be configured to tolerate a count of F faults. A first operation (of a first ordering type) executes when a first quorum of correctly functioning replicas is available. A second operation (also of the first operation type) executes when a second quorum of correctly functioning replicas is available. A third operation (of a second ordering type) executes when a third quorum of correctly functioning replicas are available. The operations are executed by the replicated state machine such that: (1) the replicated state machine does not guarantee operational ordering between the first operation and the second operation; (2) the replicated state machine guarantees ordering between the first operation and the third operation; and (3) the replicated state machine guarantees ordering between the second operation and the third operation.12-08-2011
20110276825DEVICE AND METHOD FOR COORDINATING AUTOMATIC PROTECTION SWITCHING OPERATION AND RECOVERY OPERATION - The present invention relates to a device and a method for coordinating an APS operation and a recovery operation. The device includes a working channel detection unit, a protection channel detection unit, a protection protocol unit and a recovery protocol unit. The method comprises: when the working channel of current service fails, the working channel detection unit reporting a working channel alarm to the protection protocol unit and a recovery protocol unit of current node; the recovery protocol unit starting up a timer after receiving the working channel alarm, and the protection protocol unit determining whether the recovery operation needs to be started up immediately after receiving the working channel alarm, and if yes, the protection protocol unit notifying the recovery protocol unit to start up the recovery operation immediately; the recovery protocol unit starting up the recovery operation immediately after receiving the notification. The present invention reduces the damage time of the service in the case of the APS function failure.11-10-2011
20120005527APPARATUS AND METHODS FOR DATA COLLECTION AND VALIDATION - Methods and apparatus for collection, validation, analysis, and automated error correction of data regarding user interaction with content. In one embodiment, statistical methods are used to arrive at expected values for the collected data. The data is compared to the expected value and must meet one or more acceptance criteria (e.g., be within a prescribed range) to be considered valid. The prescribed range is determined by the network operator, or a computer program adapted to generate this value. The invention enables a network operator to assess a large volume of data without requiring significant amounts of manual monitoring and/or error correction. The ability to collect, validate and analyze data across multiple platforms is also provided. Still further, an automated system capable of learning evaluation and error correction patterns is disclosed.01-05-2012
20120005526Storage Device and Method and for Storage Device State Recovery - A storage device and method for storage device state recovery are provided. In one embodiment, a storage device commences an authentication process to authenticate a host device. The authentication process comprises a plurality of phases, and the storage device stores the state of the authentication process, wherein the state indicates the phase(s) of the authentication process that have been successfully completed. After a power loss, the storage device retrieves the state of the authentication process and resumes an operation with the host device without re-performing the phase(s) of the authentication process that have been completed.01-05-2012
20120017113Control Device - The control device has a receiving device, an output stage, a checking device and a reset device. The receiving device is used to receive at least one data block including control commands from a data bus, the output stage is used to output an output signal in response to the control commands, the checking device is used to output an error signal if the at least one received data block is faulty and/or if no data block is received within a predetermined time, and the reset device is used to reset the output stage in a predefined state if the checking device outputs the error signal. The control device is thus able to react automatically to faultily transmitted data blocks without having to wait for return messages from a transmitting central processor unit.01-19-2012
20110296237SELECTING A DATA RESTORE POINT WITH AN OPTIMAL RECOVERY TIME AND RECOVERY POINT - Embodiments of the invention relate to selecting a data restore point with an optimal recovery time and recovery point. An exemplary embodiment includes generating a problem search criterion for an entity with corrupted data. Dependencies relied on by the entity to function are determined. At least one event signature match is found that comprises information for an event being logged in a event log, and is associated with the dependencies. At least one data restore point created prior to an occurrence of a particular event in the at least one event signature match is selected. The particular event having caused the data to be corrupted. The at least one data restore point is selected to restore data to a storage system with the corrupted data.12-01-2011
20100115334Lightweight application-level runtime state save-and-restore utility - Embodiments of the present invention are directed to computer-management tools and utilities that allow computer users to save and restore current application-level runtime states of computational environments created by users on computer systems. Certain embodiments of the present invention are particularly directed to time-and-memory efficient state-saving and state-restoring tools and utilities that allow a user to save snapshots of the user's application-level runtime environment, to manage and review stored snapshots, and to subsequently restore the application-level runtime state of a computer system from a previously saved snapshot.05-06-2010
20080215915 Mechanism to Change Firmware in a High Availability Single Processor System - A “high availability” system comprises multiple switches under the control of a control processor (“CP”). The firmware executing on the processor can be changed when desired. Consistent with the high availability nature of the system (i.e., minimal down time), a single CP system implements a firmware change by loading new firmware onto the system, saving state information pertaining to the old firmware, preventing the old firmware from communicating with the switches, bringing the new firmware to an active state and applying the saved state information to the new firmware.09-04-2008
20120110379FIRMWARE RECOVERY SYSTEM AND METHOD - A firmware recovery system includes a baseboard management controller (BMC) module, a south bridge, a basic input and output system (BIOS) module, a multiplexer and a storage module. The BIOS module is connected to the BMC module by the south bridge and determines whether a firmware file of the BMC module is corrupt. The multiplexer selectively connects the BIOS module or the BMC module to the south bridge. The storage module stores a new firmware file. When the firmware file of the BMC module is corrupt, the BIOS module controls the multiplexer to select the BMC module to connect to the south bridge. The BIOS module reads the new firmware file from the storage module to recover the corrupt firmware file from the BMC module.05-03-2012
20120110378FIRMWARE RECOVERY SYSTEM AND METHOD OF BASEBOARD MANAGEMENT CONTROLLER OF COMPUTING DEVICE - A firmware recovery method of a baseboard management controller (BMC) of a computing device detects whether a firmware of a default firmware memory of the BMC is damaged by sending a detection command to the BMC at a regular interval. When the firmware of the default firmware memory of the BMC is damaged, the method recovers the firmware according to firmware data of a backup firmware memory of the BMC.05-03-2012
20090327807TRANSPARENT CHECKPOINTING AND PROCESS MIGRATION IN A DISTRIBUTED SYSTEM - A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library.12-31-2009
20110197092A METHOD FOR REQUESTING A FILE REPAIR DISTRIBUTION MODE - The present invention concerns a receiver terminal and method at the receiver for requesting a missing symbol from a repair service, the method comprising the steps of receiving from a first server a list of at least one repair server and at least one transmission mode used by the at least one repair server, receiving from a second server a file comprising a plurality of symbols, checking the correct reception of the symbols, and if a missing has been identified, selecting a repair server and a transmissions mode and requesting the repair server to transmit missing symbols using the transmission mode.08-11-2011
20120036395DETECTING DATA-WRITE ERRORS - An embodiment of a data read path includes recovery and decoder circuits. The recovery circuit is operable to recover coded data from a storage medium, and the decoder circuit is operable to detect, in the recovered data, a write error that occurred during a writing of the coded data to the storage medium. For example, such an embodiment may allow detection of a write error that occurred while writing data to a bit-patterned storage medium.02-09-2012
20100011243Methods, systems and media for software self-healing - Methods, systems, and media for enabling a software application to recover from a fault condition, and for protecting a software application from a fault condition, are provided. In some embodiments, methods include detecting a fault condition during execution of the software application, restoring execution of the software application to a previous point of execution, the previous point of execution occurring during execution of a first subroutine in the software application, and forcing the first subroutine to forego further execution and return to a caller of the first subroutine.01-14-2010
20090094482Data restoration in case of page-programming failure - The present invention discloses systems and methods for restoring data in flash memory after an operational failure. The method includes: setting bits of a data buffer in accordance with the data; programming a plurality of memory cells in accordance with the data buffer; and upon failure of the programming step, restoring the data buffer to be set in accordance with the data, wherein the restoring is based only on a present state of the data buffer and on a present state of the plurality of memory cells. A memory device includes: at least one cell; and a controller operative to store data in at least one cell by steps including those described in the method above. The system includes: a memory device that includes at least one cell; and a processor operative to store data in at least one cell by steps including those described in the method above.04-09-2009
20100088543Restarting Mehtod Using a Snapshot - The active server A04-08-2010
20110197093REDUCED WIRELESS INTERNET CONNECT TIME - A method for reducing the connect time for server access by wireless devices connecting to the server via a gateway is described. A connection from the wireless device to the gateway is established and a request for information on the server is received from the wireless device and transmitted to the server. A determination is made that a response from the server is not forthcoming and a busy indicator response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted. In another embodiment, a response is received from the server and a determination is made that the received server response is not the requested information and a response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted.08-11-2011
20090276659Method and apparatus for handling failure in address line - An address line failure handling apparatus includes a failed address line specifying unit that examines the address line connected to each bit and specifies a failed address line, an address line substituting unit in which an upper address line connected to an upper bit of the memory is connected with a branch address line branched off from a lower address line connected to a lower bit other than the upper bit, and that switches between an input from the upper address line and an input from the branch address line, and outputs any of the inputs to the upper bit, and an address line substitution instructing unit that instructs the address line substituting unit to switch from the upper address line to the branch address line branched off from the failed address line when the failed address line is specified.11-05-2009
20110208999Method Of Storing Data On A Secondary Storage Device - A backup method relies on a single secondary storage device, such as a tape storage device, which emulates multiple secondary storage devices. The emulated secondary storage devices are coupled to data sources. Data which is received from the data sources is tagged with respective unique identifiers, interleaved and stored on a removable storage medium, such as a tape. This facilitates maximum usage of the media access bandwidth of the single secondary storage device.08-25-2011
20080250271Error recovery following speculative execution with an instruction processing pipeline - An instruction processing pipeline 10-09-2008
20090265579INFORMATION PROCESSING APPARATUS AND ERROR CORRECTION METHOD - According to one embodiment, a memory interface module is configured to read one of instructions stored in a memory in accordance with a memory address designated by a fetch request issued from a processor. An error detection module is configured to detect an error in the read instruction. An instruction transmission module is configured to send to the processor, upon detection of an error in the read instruction, a first instruction to hold on a stack the same memory address as the one designated by the fetch request and a second instruction to jump to an error correction routine for correcting an error of the read instruction.10-22-2009
20080270829CHECKPOINT OF APPLICATIONS USING UNIX® DOMAIN SOCKETS - A computer implemented method, apparatus, and computer program product for managing state data in a workload partitioned environment. Process state data for a process in a workload partition is saved. Process state data is used to restore the process to a given state. State data associated with open sockets and open files bound to the first process is saved. In response to a determination that the process is associated with a domain socket that is bound to a socket file, an absolute pathname for the socket file is saved. A domain socket associated with a connecting process in the workload partition uses the socket file to connect to a domain socket associated with a listening process in the same workload partition to enable the two processes to communicate with each other.10-30-2008
20080270830Data Processing System and Method for Operating a Data Processing System - To improve the availability of a data processing system despite possible memory errors, when reading a data word from a memory cell, the integrity of the data word is checked on the basis of redundant additional information, and if the data word turns out to be corrupted, an error correction procedure is performed in which the reliability performance of the memory cell is checked and, if the memory cell is found to be operational, its contents are restored.10-30-2008
20080288817Gorbadey's Method for Ensuring the Reliable Operation of the Program Computing Means - The invention relates to the computer engineering, and its usage ensures the possibility to recognize in due time the failures being occurred during operation of the program computing means, and to response respectively for the failure of each type. The method is realized in a program computing means (PCM) comprising a processor operating under the control of a predetermined operating system and intended for processing data under the control of at least one program being executed; a core memory intended for storing said at least one program being executed and data being processed; time interval sequence generators. The technical result is achieved owing to performing steps of: defining in advance the states of the program being executed different from the start and end states thereof, hereinafter referred to as the restart points, for resuming the operation of the program being executed after a failure during execution thereof; in the case of failure occurrence, determining the following failures in the PCM operation: a) an error in storing the core memory content, determined by checking a respective part of the core memory content; b) a control transfer to a wrong command, determined by monitoring the correctness of every control transfer in the processor; and c) various time interruptions determined by monitoring a run duration of a respective part of the program being executed and predetermined operating system; while processing a respective interruption and upon occurrence of anyone of the failures being recognizable, in the case of allowable conditions for continuing the operation, restarting the execution of said program being executed beginning with the nearest restart point preceding to this interruption.11-20-2008
20120297247RECOVERING TRANSACTIONS OF FAILED NODES IN A CLUSTERED FILE SYSTEM - Systems. Methods, and Computer Program Products are provided for recovering transactions of failed nodes using a recovery procedure in a clustered file system (CFS). A data segment is determined that the data segment should be copied to a final storage location by validating that an ownership of the data segment is not associated with any other operational node, via a distributed shared memory (DSM) agent. The ownership of the data segment is set to a local DSM agent.11-22-2012
20120297246System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided.11-22-2012
20120297245Bad Column Management with Bit Information in Non-Volatile Memory Systems - Column based defect management techniques are presented. Each column of the memory has an associated isolation latch or register whose value indicates whether the column is defective, but in addition to this information, for columns marked as defective, additional information is used to indicate whether the column as a whole is to be treated as defective, or whether just individual bits of the column are defective. The defective elements can then be re-mapped to a redundant element at either the appropriate bit or column level based on the data. When a column is bad, but only on the bit level, the good bits can still be used for data.11-22-2012
20080276125Data Processing Method - The invention relates to a data processing method comprising generating meta-data for each data file stored by back-up servers of a set of back-up servers on a storage medium of a plurality of storage media. The meta-data of a data file comprises the file name of the data file, a content-specific identifier and an access path for the data file. The content-specific identifier relates to the data content comprised in the data file and the access path specifies on which storage medium on the plurality of storage media the data file is stored. The method further comprises storing the meta-data of each data file in a database, wherein the database enables the identification of data files having the same data content by use of the content-specific identifiers of the data files as these data files have identical content-specific identifiers.11-06-2008
20080270831Rollback method and information processing apparatus executing the same - It is determined that a write access is executed to a stack area of a main memory. It is then determined whether another write access to a corresponding access destination address in the stack area occurred in the past by referring to an access flag table. In contrast, it is determined that a write access is executed to a global area of the main memory. It is then determined whether another write access to a corresponding access destination address in the global area occurred in the past with referring to an access list. Such a configuration can efficiently provide individual advantages of the determination methods using both the access flag table and the address list. The presence or absence of the past saving execution can be efficiently determined at the time of write access.10-30-2008
20100146334FAULT TOLERANT UPDATE PROPAGATION TO VIEWS - In a database system, derived data (often called view data or view tables) depends on other data, often called base data (or base tables). When base data on which derived data depends is updated, including changes, additions, and/or deletions, those updates need to be propagated to derived data. Some types of updates, if repeated, result in an incorrect view data state; these updates are termed non-idempotent. To avoid repeating non-idempotent view data updates, signatures are computed that are repeatable, but yet unique to base data on which the view data is based, the view data being updated, and sequence information for updates to the base data (where applicable) and sequence data for multiple changes to the view being updated. The signatures allow detection of view updates that were committed prior to a failure, but which were not confirmed as having been committed to a process that computes the view updates.06-10-2010
20120198274HOME APPLIANCE DIAGNOSIS SYSTEM, AND METHOD FOR OPERATING SAME - The present invention relates to a home appliance diagnosis system and to a method for operating same, wherein product information is output in a predetermined signal sound by a home appliance product, and the signal sound is transmitted via a communication network connected to a remote service center to enable the service center to easily check the state of the home appliance product. In addition, the product information is encoded into a predetermined format and modulated to enable sound to be outputted by the home appliance product, thereby preventing noise or signal errors. The present invention enables stable signal modulation and accurate sound output, and enables the easy recovery of the sound transmitted to the service center via the communication network.08-02-2012
20120072770Data Corruption Diagnostic Engine - A computer is programmed to execute a diagnostic procedure either on a pre-set schedule or asynchronously in response to an event, such as an error message, or a user command. When executed, the diagnostic procedure automatically checks for integrity of one or more portions of data in the computer, to identify any failure(s). In some embodiments, the failure(s) may be displayed to a human, after revalidation to exclude any failure that no longer exists.03-22-2012
20090164843VIBRATION-AWARE DATA REASSIGNMENT - An aspect of the present disclosure relates to implementing a temporary reassignment of data based on a vibration condition. An exemplary method includes implementing a data operation for a portion of data and detecting a data error during the data operation. The method further includes obtaining an indication of a vibration condition associated with a device with which the data operation is performed and implementing a temporary reassignment of the portion of data based on the vibration condition.06-25-2009
20090177920Automated Configuration of Medical Practice Management Systems - A user (e.g., medical office manager, medical office insurance administrator, doctor) utilizes a medical practice configuration interface (e.g., web page) to input information about the user's medical practice (e.g., address, insurance plans, doctors, hospitals that the doctors utilize). Based on this information and/or rules associated with the insurance plans accepted at the user's medical practice, additional information is requested from the user about the user's medical practice (e.g., information needed for an insurance plan, information needed for a hospital). The user inputs the requested additional information utilizing the medical practice configuration interface. Configuration information for the user's medical practice is generated based on the information and/or the additional information inputted by the user. A user interface (e.g., web pages interfacing with the medical practice management server) and/or rules for the medical practice can be generated based on the configuration information.07-09-2009
20090259887SELF-SERVICE TERMINAL EQUIPMENT AND GUIDANCE SCREEN PROCESSING METHOD - A self-service terminal equipment includes at least one input/output device, a display device, a storage unit, and a control unit, wherein the storage unit includes a guidance information storage unit that stores recovery information in association with guidance information, the control unit includes a user program executing unit, and an input/output interface control unit, and the input/output interface control unit includes a command information control unit that outputs command information to the input/output device such that the input/output device is controlled, a recovery information control unit that inputs the recovery information output from the input/output device controlled, and a guidance screen control unit that obtains the guidance information stored in the guidance information storage unit corresponding to the recovery information input by control of the recovery information control unit and displays a guidance screen that displays the guidance information on the display device.10-15-2009
20090249119USING VOLUME SNAPSHOTS TO PREVENT FILE CORRUPTION IN FAILED RESTORE OPERATIONS - Restore software executing in a computer system may invoke a snapshot of a target volume before restoring a plurality of files from a backup image to the target volume. If the restore operation fails before all the files are restored to the target volume then the restore software may use the snapshot to return one or more of the files to their original states as they existed before the restore operation was initiated.10-01-2009
20110225454METHOD, RECORDING TERMINAL, SERVER, AND SYSTEM FOR REPAIRING MEDIA FILE RECORDING ERRORS - A method, a recording terminal, a server, and a system for repairing media file recording errors are disclosed in embodiments of the present invention. The method includes: generating description information about a recording error when a recording terminal identifies the recording error in live recording of a media file; sending a recording error repair request that carries the description information to a network device; and repairing the media file recorded by the recording terminal according to repair information when receiving the repair information sent by the network device according to the description information. With the present invention, the recording errors are repaired through a bidirectional network between the recording terminal and the network device, and reliability of repairing the recording errors is ensured.09-15-2011
20110225453SYSTEM AND METHOD FOR OPTIMIZING REDUNDANCY RESTORATION IN DISTRIBUTED DATA LAYOUT ENVIRONMENTS - The present disclosure is directed to a system and a method for optimizing redundancy restoration in distributed data layout environments. The system may include a plurality of storage devices configured for providing data storage. The system may include a prioritization module communicatively coupled to the plurality of storage devices. The prioritization module may be configured for determining a restoration order of at least a first data portion and a second data portion when a critical data failure occurs. The system may include a restoration module communicatively coupled to the plurality of storage devices and the prioritization module, the restoration module configured for restoring at least the first data portion and the second data portion based upon the restoration order.09-15-2011
20110145637Performing Mode Switching In An Unbounded Transactional Memory (UTM) System - In one embodiment, the present invention includes a method for selecting a first transaction execution mode to begin a first transaction in a unbounded transactional memory (UTM) system having a plurality of transaction execution modes. These transaction execution modes include hardware modes to execute within a cache memory of a processor, a hardware assisted mode to execute using transactional hardware of the processor and a software buffer, and a software transactional memory (STM) mode to execute without the transactional hardware. The first transaction execution mode can be selected to be a highest performant of the hardware modes if no pending transaction is executing in the STM mode, otherwise a lower performant mode can be selected. Other embodiments are described and claimed.06-16-2011
20110145636SYSTEMS AND METHODS FOR IMPORTING DATA FROM DATA SOURCES OVER A NETWORK WHILE CORRECTING AND TRANSFORMING THE DATA - Systems and methods for importing data from data sources over a network while correcting and transforming the data are described. A data migration server receives data from various data sources. The data migration server repairs and transforms the received data before transmitting the data to a new data server. In some embodiments, the data migration server repairs data before formatting the data, and in other embodiments, the data migration server formats data before repairing the data. The data migration server also verifies the accuracy of the data, either by comparing the data against data requested and received from third-party servers or in reference to other data from the data sources.06-16-2011
20110231701INFORMATION PROCESSING SYSTEM, MANAGEMENT APPARATUS, INFORMATION PROCESSING APPARATUS, AND COMPUTER PROGRAM PRODUCT - A management apparatus is connected to an information processing apparatus via a network, and includes: a determining unit that, when receiving a failure notification that installation of software fails from the information processing apparatus, determines a cause of failure based on the notification; a storing processing unit that, when the determining unit determines that the cause of the failure cannot be solved by remote control, stores registration information in which identifying information of the information processing apparatus and information indicating to-be-installed software which has not been installed on the information processing apparatus are associated with each other, in a storage unit; and a reinstallation instruction unit that, when receiving an inquiry as to whether there is the to-be-installed software from the information processing apparatus, searches the registration information in the storage unit, and instructs the information processing apparatus to install the to-be-installed software thereon if there is the to-be-installed software.09-22-2011
20110231700Management device, correction candidate output method, and computer product - A management device includes a storage unit which stores both an attribute value before correction and an attribute value after correction concerning a configuration item as a management target and type information of the configuration item or relationship information between the configuration item and another configuration item; a determination unit which, when an attribute value input for a new configuration item coincides with the attribute value before correction stored in the storage unit, determines a degree of coincidence between type information or relationship information input for the new configuration item and the type information stored in the storage unit or the relationship information stored in the storage unit; and an output unit which outputs the attribute value after correction based on the determination result of the determination unit.09-22-2011
20080263396Data Processing Device And Data Control Circuit For Use Therein - When data that has been saved outside a circuit is restored, a data control circuit, before resuming the processing that an electronic circuit had been performing before the data was saved, performs particular processing different from that processing. Moreover, the data control circuit has a data saving control function whereby it, via a debugging port (or a general-purpose data input/output port) of a volatile memory storing data to be processed by the electronic circuit, saves that data (or sends an instruction to save that data).10-23-2008
20080263395EMBEDDED DEVICE AND IMAGE LOADING METHOD THEREOF - An embedded device (10-23-2008
20110225455DATA RESTORING METHOD AND AN APPARATUS USING JOURNAL DATA AND AN IDENTIFICATION INFORMATION - The storage system is coupled to a computer and includes a plurality of physical storages being used to configure a first logical storage and a second logical storage, a control unit receiving a read request and a write request from the computer; and a cache memory storing data which is sent to the computer. The control unit determines whether a request from the computer is a write request or a read request. If it is a read request, the control unit reads data from the cache memory or at least one of the plurality of physical storages based on the read request. If it is a write request, the control unit determines whether destination of the write request is the first logical storage.09-15-2011
20090249120REMOTE FIRMWARE RECOVERY - Embodiments of the present invention provide methods, systems, and apparatus for instantiating, by a computing system, a firmware recovery module in response to a detected firmware failure during a system startup. The firmware recovery module establishes access to a remotely disposed recovery server and retrieves from it a replacement or update firmware to address the firmware failure.10-01-2009
20090222690AUTOMATED COMPUTING APPLIANCE DISASTER RECOVERY - A system and method for automatic disaster recovery of a computing appliance including reconstruction of its previous operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover the device's operation state. The system and method can also be utilized to recover a not fully functional member of a clustered computing system from the configuration information stored on other members of the cluster.09-03-2009
20100275059PRESERVING REFERENCES TO DELETED DIRECTORY ENTRIES - A method, system, and computer usable program product for preserving references to deleted directory entries are provided in the illustrative embodiments. An instruction to delete an entry is received. A second entry referencing the entry is identified. The second entry is marked as a ghost reference to the entry. The entry is converted to a deleted entry. A ghost attribute with a value of “false” may be added to the entry. A ghost attribute or tag with a value of “false” may be added to the second entry. The ghost tag may correspond to an attribute of the second entry that references the entry. An entry may be deleted by setting a value of a ghost attribute in the entry to true. The second entry may be marked as the ghost reference by setting a value of a ghost attribute or a ghost tag in the second entry to true.10-28-2010
20080313496Gracefully degradable versioned storage systems - Multiple versions of data on different sets of machines allow a system to degrade gracefully even when experiencing excessive failures. When excessive failures cause the latest versions to be unavailable, the system becomes degraded, but still offers an old version if available. A most recent coherent set of the available older versions is found and provided. The degree of degradation increases gradually as the system experiences more and more failures. Graceful degradation is desirably complementary to fault tolerance.12-18-2008
20080313497Data processing system - A data processing system has a plurality of storage systems. In this system, data replication is performed at high speed and efficiency while maintaining data integrity. In addition, when failure has occurred in a configuration element, the time necessary to resume the data replication is reduced. In accordance with an instruction from first host computer, updating of replication-target data and creation of a journal are performed in a storage system A; and updating of replication data and creation of a journal are performed in a storage system B. A storage system C retrieves a journal from the storage system B in asynchronization with the updating, and performs updating of replication data. When failure has occurred in the storage system B, a journal-retrieving end is altered to the storage system, and the replication data is updated in accordance with the retrieved journal.12-18-2008
20080307257SYSTEM AND METHOD FOR STORING AND RESTORING A DATA FILE USING SEVERAL STORAGE MEDIA - A system and method for storing and restoring a data file using several storage media. The method begins with the step of generating several identical copies of the data file. The identical copies are stored on different storage media. The identical copies are subdivided into data portions according to a predetermined scheme. Selected data portions are simultaneously read out via different data channels from at least two different storage media. The data file is restored from the selected data portions.12-11-2008
20080307256Method for Fault Handling in a Co-operative Workflow Environment - Embodiments herein provide a fault-handling scheme based on forward recovery for cooperative workflow environments. The fault handling scheme relies on the correct placement of transaction scopes and their associated fault and compensation handlers for maintaining correct application semantics, a fault propagation scheme for forwarding faults to a workflow component that has the corresponding fault handler, and a distributed mechanism for collecting data of completed workflow components to facilitate recovering from faults. The fault handling scheme makes use of control flow messages to facilitate compensation of nested transaction scopes (residing in different components). The workflow components are also modified with additional code for aiding with fault propagation and fault recovery.12-11-2008
20100153777PROGRAM UPDATING SYSTEM HAVING CORRECTION STORAGE UNITS AND METHOD THEREOF - A program updating system having correction storage units and methods thereof are described. The control unit checks the first setting section of the first storage unit to determine whether the first setting data associated with the second storage unit is stored in the first setting section. When the first setting data is stored in the first setting section, the control unit reads the first setting data and writes the first setting data to the second storage unit. The first setting data includes a first correcting address and a first correcting code corresponding to the first correcting address. The second storage unit stores a first setting data transmitted from the first setting section. The control unit compares an executed address of the original program with the first correcting address. When the executed address is identical to the first correcting address, the control unit replaces a first error code corresponding to the executed address with the first correcting code.06-17-2010
20100192011COMPUTER SYSTEM AND METHOD HAVING ISOLATABLE STORAGE FOR ENHANCED IMMUNITY TO VIRAL AND MALICIOUS CODE INFECTION - An apparatus and method of supporting the backup and recovery of a computing device. The computing device typically includes both a user computing environment and a supporting environment which enhances the stability and functionality of the user computing environment.07-29-2010
20100153776USING SAFEPOINTS TO PROVIDE PRECISE EXCEPTION SEMANTICS FOR A VIRTUAL MACHINE - One embodiment of the present invention provides a system that provides precise exception semantics for a virtual machine. During operation, the system receives a program comprised of instructions that are specified in a machine instruction set architecture of the virtual machine, and translates these instructions into native instructions for the processor that the virtual machine is executing upon. While performing this translation, the system inserts one or more safepoints into the translated native instructions. The system then executes these native instructions on the processor. During execution, if the system detects that an exception was signaled by a native instruction, the system reverts the virtual machine to a previous safepoint to ensure that the virtual machine will precisely emulate the exception behavior of the virtual machine's instruction set architecture. The system uses a gated store buffer to ensure that any stores that occurred after the previous safepoint are discarded when reverting the virtual machine to the previous safepoint.06-17-2010
20090077417METHOD, DATA PROCESSING APPARATUS AND WIRELESS DEVICE - Embodiments of the invention relate generally to a method, to a data processing apparatus and to a wireless device. In an embodiment of the invention a data processing apparatus is provided. The data processing apparatus may include a chip-integrated unit to select a check location of an external memory and to generate a check value, an internal memory associated with the chip-integrated unit, the internal memory to save the check location and the check value, and an external memory coupled to the chip-integrated unit, the external memory to store the check value at the check location.03-19-2009
20100251016Issuing Instructions In-Order in an Out-of-Order Processor Using False Dependencies - A mechanism is provided for issuing instructions. An instruction dispatch unit receives an instruction for dispatch to one of a plurality of execution units. The instruction dispatch unit analyzes a tag register to determine whether a previous tag associated with a previous instruction has been stored in the tag register. Responsive to the previous tag associated with the previous instruction failing to be stored in the tag register, the instruction dispatch unit storing a tag corresponding to the instruction in the tag register. The instruction dispatch unit dispatches the instruction to an issue queue for issue to the one of the plurality of execution units.09-30-2010
20100241900SYSTEM TO DETERMINE FAULT TOLERANCE IN AN INTEGRATED CIRCUIT AND ASSOCIATED METHODS - A system to determine fault tolerance in an integrated circuit may include a programmable logic device carried by the integrated circuit. The system may also include a configurable memory carried by the programmable logic device to control the function and/or connection of a portion of the programmable logic device. The system may further include user logic carried by said programmable logic device and in communication with a user and/or the configurable memory. The user logic may identify corrupted data in the configurable memory based upon changing user requirements.09-23-2010
20100235681STREAM RECOVERY METHOD, STREAM RECOVERY PROGRAM AND FAILURE RECOVERY APPARATUS - Stream data is structured including data tuples as a query process target and a recovery point tuple for indicating a position of the data tuples in the stream data. Upon detection of a failure at a computer, another computer reads position information in the stream data indicating a position of data tuples already subjected to the query process by a stream processing apparatus from a recovery points, uses the recovery point positioned lastly among the read recovery points as a reenter point of the input stream, and instructs a stream distribution apparatus to reenter the input stream starting from the reenter position into the other computer.09-16-2010
20100229035SYSTEMATIC ERROR CORRECTION FOR MULTI-LEVEL FLASH MEMORY - In accordance with exemplary embodiments, a multi-level flash memory employs error correction of systematic errors when reading multi-level flash memory. Error correction includes i) detection of each systematic error, ii) feedback of the systematic error to circuitry within the memory, and iii) subsequent adjustment within that circuitry to cause a correction of systematic error in the output signal of the multi-level flash memory.09-09-2010
20100218041END USER CONTROL CONFIGURATION SYSTEM WITH DYNAMIC USER INTERFACE - An end user control configuration (EUC) system with dynamic user interface provides a user friendly tool for consumers to self-provision and manage network services such as Voice over Internet Protocol (VoIP) services. The EUC system dynamically generates graphical user interface (GUI) renderings that assist users in the completion of tasks related to provisioning, and managing network services. The EUC system allows telecommunication service providers to effectively hide the complexity of operational support systems (OSS) and the network elements that deliver the network services. The EUC system solves the technical problems of reducing the cycle-time to self-provision network services, assisting users to complete the tasks required to activate, and manage network services, and actually activating and managing the network services.08-26-2010
20100251018MEMORY ACCESS CONTROL DEVICE, MEMORY ACCESS CONTROL METHOD AND MEMORY ACCESS CONTROL PROGRAM - A memory access control device has a memory control unit and a software execution unit executing software. The memory control unit has: a data transmission unit configured to perform multicast transfer that reads a data from the memory and transmits the data to data transfer destinations through a network; a data reception unit configured to receive multicast transfer data from the network; and a reception data counter configured to indicate a number of multicast transfer data received by the data reception unit. The software execution unit instructs the memory control unit to perform a plurality of multicast transfers and then reads respective reception data counters of the data transfer destinations for each checkpoint in sequence of the software to determine completion of the plurality of multicast transfers.09-30-2010
20100251017Soft error processing for multiprocessor - The data processor having CPUs each capable of accessing memories enables the processing of a memory error according to the processing mode of the data processor. The CPUs have a memory, and each include a first storing unit capable of storing CPU-identifying information which enables identification of CPU having accessed the memory. At the time of occurrence of a soft error owing to access to the memory, the CPU, having the memory, stores the CPU-identifying information for identifying the CPU having accessed the corresponding memory in the first storing unit, and notifies the interrupt controller of occurrence of a soft error of the memory. After having received an interruption of the memory soft error from the interrupt controller, the CPU uses information stored in the first storing unit to identify the CPU having made the access, and performs the error processing.09-30-2010
20100251019CONTROL DEVICE - A control device includes: memory diagnosis means for setting a power-on status when an electric power is turned on and diagnosing an ECC memory; restarting means for restarting the control device when the memory diagnosis means detects a correctable error of the ECC memory during the power-on status of the ECC memory; and operation processing means for resetting the power-on status and performing a normal operation when the memory diagnosis means does not detect a correctable error of the ECC memory, while performing the normal operation when a correctable error of the ECC memory is detected because of the restart of the control device by soft reset after the reset of the power-on status but when the control device is not in the power-on status.09-30-2010
20100115333DYNAMIC DRIVER LOADING FOR RECOVERY BOOT MEDIA - In one embodiment a computing device comprises at least one storage media, at least one storage media, a processor, and a memory module comprising logic instructions stored on a computer-readable medium which, when executed by a computer processor, configure the processor to detect, in the computing device, at least one file to support a communication connection with the computing device, store the at least one file on a persistent storage media, and link the at least one file to a restore library.05-06-2010
20090327805MINIMIZING DATA LOSS IN ASYNCHRONOUS REPLICATION SOLUTION USING DISTRIBUTED REDUNDANCY - Architecture that reduces data loss resulting from failover in an asynchronous log shipping deployment, but leveraging mid-tier and frontend servers to fill in lost data. In an asynchronous log shipping operation, a replication component asynchronously replicates messaging data to a backend server in accordance with one or more replication operations, which can be updates to databases on the backend server. These databases can include messaging data, such as email address books, mailboxes, etc. A history component maintains a history of replication operations on a frontend server. In the event of a lossy failover, a replay component is used for replaying the replication operations from the history to the backend server.12-31-2009
20090210743METHOD AND DEVICE FOR REALIZING IP MULTIMEDIA SUBSYSTEM DISASTER TOLERANCE - A method for realizing an Internet protocol (IP) multimedia subsystem (IMS) disaster tolerance includes the steps as follows. An S-CSCF receives a user registration, and backs up necessary data which is required when a user service processing is restored on a storage entity in a network. An I-CSCF of user's home domain receives a service request of the user, and if it is found that the S-CSCF currently providing a service for the user fails, assigns a new S-CSCF to the user, and forwards the service request to the newly assigned S-CSCF. The newly assigned S-CSCF interrogates and acquires subscription data of the user and the necessary data backed up by the original S-CSCF from the storage entity, and then restores the user service processing according to the subscription data and the backup data. A device for realizing an IMS disaster tolerance is also provided.08-20-2009
20090150722Recovering from errors in streaming dsp applications - A data processing system is provided in which processing circuitry performs at least one of a series of data processing operations in dependence upon a set of data values and control circuitry controls execution of the data processing operations. Control path error detection circuitry is provided for detecting a control path error associated with an error in operation of the control circuitry and data path error handling circuitry is arranged to handle recovery from errors in the data values. The control path error detection circuitry is configured to cause the data path error handling circuitry to perform recovery from detected control path errors enabling the series of data processing operations to continue despite the occurrence of the control path error. An associated method and computer program product are also provided.06-11-2009
20110239044MANAGEMENT AND TRACKING OF COMPLEX ENTITLEMENT BENEFITS - Methods and systems for management and tracking of complex entitlement benefits are disclosed. For example, a method can include identifying a processing error within a distributed transaction processing system, assessing an impact of the processing error, and determining a recovery strategy to minimize the impact of the processing error. The processing error can be associated with the application of an entitlement to a plurality of transactions. The entitlement can include a defined benefit and a benefit counter. The benefit counter can control a quantity of transactions allowed to receive the entitlement. The impact of the processing error can be assessed in regard to the plurality of transactions.09-29-2011
20080288818Method and System for Protecting Information between a Master Terminal and a Slave Terminal - In an application system of a liquid crystal display, for protecting transmissions between a master terminal and a slave terminal, effects caused by an unstable power source of the slave terminal have to be reduced to a lowest degree. When the application system is reset or under normal operations with the power source having a suddenly-decreased or suddenly-unstable voltage level, the transmission between the master terminal and the slave terminal have to be terminated, and related data of the terminated transmission is temporarily stored. When the voltage of the slave terminal is confirmed to reach to a stable voltage over a predetermined duration, the transmission may be restored by the stored data.11-20-2008
20090113239METHOD AND APPARATUS FOR INSTRUCTION TRACE REGISTERS - A computer implemented method, apparatus, and computer usable program product for utilizing instruction trace registers. In one embodiment, a value in a target processor register in a plurality of processor registers is updated in response to executing an instruction associated with program code. In response to updating the value in the target processor register, an address for the instruction is copied from an instruction address register into an instruction trace register associated with the target processor register. The instruction trace register holds the address of the instruction that updated the value stored in the target processor register.04-30-2009
20100223498OPERATING SYSTEM-BASED APPLICATION RECOVERY - Methods, systems, and computer-readable media are disclosed for operating system-based application recovery. A particular method saves an application state of an application executing at a computer. When a failure of the application is detected, the operating system provides an option to initiate recovery of the application by reverting to the saved application state. When the option to initiate recovery is selected by a user of the computer, the operating system recovers the application by reverting to the saved application state.09-02-2010
20100299560COMPUTER SYSTEM WITH DAMAGED BIOS DATA RECOVERING FUNCTION AND RECOVERING METHOD THEREOF - A computer system with a damaged BIOS data recovering function is disclosed. When BIOS data in the computer are damaged, the computer system may update and recover the BIOS of the storage unit of the computer system in a standby mode via an external electronic device (another computer or a USB flash disk). The computer system includes a storage unit, a data transferring interface, a power supply unit, and a control unit. The computer system is electrically connected with the external electronic device via the data transferring interface. The power supply unit provides standby power (in the standby mode) when the computer system is shut down. The control unit is electrically connected with the power supply unit and the data transferring interface, respectively. The control unit is actuated via the standby power, receives the external BIOS stored in the external electronic device.11-25-2010
20080229148ENHANCED ERROR IDENTIFICATION WITH DISK ARRAY PARITY CHECKING - When parity checking in a disk array such as a RAID-6 system determines data and parity information is unsynchronized, additional calculations are performed to determine whether the error may be attributed to faulty data on a disk drive or to a more systemic problem such as a faulty controller. In particular, for each particular error detected, the parity generating information is analyzed to determine if each error involves a common disk index. If so, the data can be corrected on that disk; if not other corrective procedures are implemented.09-18-2008
20090106587Software Recovery Method for Flash Media with Defective Formatting - A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table.04-23-2009
20090037769DYNAMIC MODIFICATION OF SCHEMAS IN STREAMING DATABASES - A method for dynamically modifying a database schema in a streaming database management system receives a new database schema, compares the new schema to an existing schema, identifies the differences between the new schema and the existing schema, and applies the identified differences to the database in a single transaction, thereby producing a database organized according to the new database schema.02-05-2009
20090070627SYSTEM AND ARTICLE OF MANUFACTURE FOR TRANSPARENT FILE RESTORE - Provided is a system and program for automatically handling an error when retrieving a file for an application. An error is detected while the application retrieves a file from the storage device. A user defined policy is checked to determine whether a backup copy should be restored, and the file is restored from the backup copy if the user defined policy indicates that the backup copy should be used.03-12-2009
20130132771METHOD AND APPARATUS FOR PROVIDING INFORMATION CONSISTENCY IN DISTRIBUTED COMPUTING ENVIRONMENTS - An approach is provided for providing information consistency in distributed computing environments. An information consistency platform determines one or more finite state machines based, at least in part, on one or more states of one or more respective steps of at least one update operation operating on one or more data items, wherein the one or more finite state machines executes, at least in part, the at least one update operation, one or more other operations, or a combination thereof on the one or more data items.05-23-2013
20130132772EMBEDDED MEMORY WITH SYSTEM REPAIR DATA AND SYSTEM REPAIR METHOD THEREFOR - An embedded memory with system repair data is provided. The embedded memory includes a flash memory unit, a storage unit, and a control unit. The flash memory unit stores an in-system programming (ISP) code. The storage unit stores a system repair code. The system repair code is used for rebuilding the ISP code. The control unit is electrically connected to the flash memory unit and the storage unit. The control unit determines whether the ISP code has been broken and reads the system repair code to rebuild the ISP code when the ISP code has been broken. A system repair method for the embedded memory is also provided, which comprises the steps of determining that the ISP code stored in the flash memory unit has been broken, reading the system repair code stored in the memory unit, and rebuilding the ISP code according to the system repair code.05-23-2013
20130132773FAST RESOURCE RECOVERY AFTER THREAD CRASH - A resource recovery system may maintain a counter in memory that indicates a number of times one or more threads of execution, which use shared resources, have crashed. The system may associate a first value of the counter with a resource allocated to a thread of the one or more threads, and may set an indicator associated with the thread to indicate whether the thread has crashed. The system may determine whether to re-allocate the resource to the thread based on the first value of the counter associated with the resource and based on the indicator associated with the thread.05-23-2013
20100325485SYSTEMS AND METHODS FOR STATEFUL SESSION FAILOVER BETWEEN MULTI-CORE APPLIANCES - The present disclosure presents systems and methods for maintaining operation of stateful sessions by a secondary multi-core appliance upon failover of a first multi-core appliance. A stateful session failover module of primary appliance may receive session states from each of the cores of the primary appliance. The stateful session failover module may communicate the session states of the cores of the primary appliance to a stateful session failover module of the secondary appliance. The stateful session failover module of the secondary appliance may update each of the cores of the secondary appliance with the session states. Upon failover, cores of the secondary appliance may maintain operation and features of the sessions handled by the primary appliance prior to failover using the received state sessions for each session maintained.12-23-2010
20100169708METHOD AND APPARATUS TO PROFILE RAM MEMORY OBJECTS FOR DISPLACMENT WITH NONVOLATILE MEMORY - A memory profiling system profiles memory objects in volatile memory and identifies memory objects as candidates to be stored and read directly from nonvolatile memory. The profiling system monitors memory accesses via page faults and identifies a memory object to be loaded in volatile memory. The profiling system uses page faults to determine a page fault type and a write frequency for the memory object, and determines the memory object's memory access type. The profiling system determines whether the object's memory access type meets the capabilities of the nonvolatile memory technology. If the memory access type meets the nonvolatile memory technology capabilities, the profiling system identifies the memory object as a candidate to be transitioned to and read directly from nonvolatile memory (e.g., NOR and PCM). The profiling system stores the memory object candidates in nonvolatile memory such that the memory objects are read directly from nonvolatile memory.07-01-2010
20110010583ERROR DETECTION, DOCUMENTATION, AND CORRECTION IN A FLASH MEMORY DEVICE - A memory device has an error documentation memory array that is separate from the primary memory array. The error documentation memory array stores data relating to over-programmed bits in the primary array. When the over-programmed bits in the primary array are erased, the error documentation memory array is erased as well, deleting the documentation data relating to the over-programmed bits.01-13-2011
20110119525CHECKPOINTING IN MASSIVELY PARALLEL PROCESSING - One embodiment is a method that performs a local checkpoint at a processing node in a massively parallel processing (MPP) system that executes a workload with a plurality of processing nodes. The local checkpoint is stored in local memory of the processing node. While the workload continues to execute, a global checkpoint is performed from the local checkpoint stored in the local memory.05-19-2011
20110041007Controller For Reading Data From Non-Volatile Memory - The present disclosure includes systems and techniques relating to solid state drive controllers. In some implementations, a device includes a buffer that holds a block of data corresponding to a command from a host. The command identifies the block of data and a logical sequence in which the identified block of data is to be transmitted. In response to the command, a data retriever included in the device retrieves the portions of the block of data from non-volatile memory units in a retrieval sequence that is different from the logical sequence. When the device receives multiple commands identifying multiple blocks of data, the device services the commands in parallel by retrieving portions of blocks of data identified by both commands.02-17-2011
20110041008Clock Data Recovery System - A clock data recovery system is described. It includes a high pass filter for transmitting a filtered data signal in response to receiving an input data signal; an adder for summing the filtered data signal with a feedback signal, wherein the adder produces a summed input signal; a plurality of clocked data comparators for receiving the summed input signal, wherein the clocked data comparators determine an input data bit value; a plurality of clocked error comparators for receiving an error signal associated with clock recovery; an equalization and adaptation logic for selecting an error sample such that a phase associated with the error sample is locked at a second post cursor; and a phase mixer for transmitting a delay in response to receiving the phase and the delay is transmitted to the clocked-data comparators and the clocked-error comparators.02-17-2011
20110113283Apparatus and Method for Reloading Software Images - An apparatus and method are disclosed for reloading software images. A copy module copies application metadata for an application image to an application metadata copy. The application metadata and application image are stored on a writable memory of a data processing device. The application metadata copy is stored remotely from the data processing device. A detection module detects an operational anomaly. An erasure module erases at least the application image on the writeable memory in response to detecting the operational anomaly. An identification module identifies the application image from the application metadata copy. A reload module reloads the application image to the writable memory using the application metadata copy.05-12-2011
20100332899Quality Management in a Data-Processing Environment - A method, system and computer program for quality management of a plurality of documents associated with a data-processing operation of an organization is provided. The documents include several fields, the organization has employees, and the method comprises determination of error rates. Errors are reduced in the plurality of documents by focusing on critical fields. The occurrence of errors is predicted by determining a correlation between the errors and a set of attributes, which is updated. Reducing and predicting errors control the error rate. A method for measuring the quality of a plurality of documents is also provided. The measurement is based on the relative operational impact of the errors and the frequency of errors associated with each field.12-30-2010
20090089614DATA RESTORING METHOD AND AN APPARATUS USING JOURNAL DATA AND AN IDENTIFICATION INFORMATION - A host and a storage system each keep a shared identifier indicating a state of a system. The storage system acquires, at update of data, a data pair including data for a change through processing of the host and data before the update. The storage system relates the data pair to a shared identifier. When the host indicates an identifier, the storage system restores data using the data pair.04-02-2009
20100138692ELECTRONIC DEVICE AND METHOD FOR RESTORING FUNCTION SETTINGS - An electronic device and method for restoring personalized function settings include setting a restoring function, relating the restoring function to one or more function settings of the electronic device, and creating a backup file including retrieved personalized function settings of a designated function setting. The electronic device and method further include determining a backup file, and restoring the personalized function settings of a determined function setting corresponding to the determined backup file.06-03-2010
20090327806METHOD OF HANDLING TRANSACTION IN A SERVICE ORIENTED ARCHITECTURE ENVIRONMENT - A method of handling transactions in a plurality of organization embracing Service Oriented Architecture (SOA) is disclosed. The method includes invoking the transaction when at least one application registers for the transaction, by recognizing one or more services associated to the registered transaction context. The method also includes identifying one or more operations which needs to be initiated for executing each of the respective service. The method further includes revoking the transaction when an error is encountered during the transaction. The process of revoking the transaction includes rolling back the executed operations of the respective services when at least one of the identified operations of the recognized services encounters an error during the transaction.12-31-2009
20090313501METHOD AND ARRANGEMENT FOR PROCESSING TRANSACTIONS IN A FLASH TYPE MEMORY DEVICE - The invention relates to a method and arrangement for processing transactions in a flash type memory device, wherein the transaction is a data update and/or changing operation consisting of one or more suboperations, all of which must be successfully executed in order to regard the discussed transaction as having been successfully completed in its entirety. In the solution according to the invention, memory-block specific status information (12-17-2009
20110083041MEMORY SYSTEM WITH REDUNDANT DATA STORAGE AND ERROR CORRECTION - A system comprises at least two random access memory (RAM) elements arranged to store data redundantly. The system further comprises RAM routing logic comprising comparison logic operably coupled to the at least two RAM elements and arranged to compare redundant data read from the at least two RAM elements, and check and validation logic, independent of the RAM routing logic, operably coupled to the at least two RAM elements and arranged to additionally detect an error in the redundant data read from the at least two RAM elements and provide an error indication signal to the RAM routing logic in response thereto. The RAM routing logic further comprises selection logic arranged to dynamically select redundant data from one of the at least two RAM elements based on the comparison of the redundant data and the error indication signal.04-07-2011
20100131796System and Method for Detecting and Recovering from Errors in an Instruction Stream of an Electronic Data Processing System - A system and method are provided for detecting and recovering from errors in an Instruction Cache RAM and/or Operand Cache RAM of an electronic data processing system. In some cases, errors in the Instruction Cache RAM and/or Operand Cache RAM are detected and recovered from without any required interaction of an operating system of the data processing system. Thus, and in many cases, errors in the Instruction Cache RAM and/or Operand Cache RAM can be handled seamlessly and efficiently, without requiring a specialized operating system routine, or in some cases, a maintenance technician, to help diagnose and/or fix the error.05-27-2010
20110078497AUTOMATED RECOVERY FROM A SECURITY EVENT - In embodiments of the present invention improved capabilities are described for automated recovery from a security event. Automated recovery includes detecting a security event, using metadata to select a target backup for recovery, bringing the recovered environment online in a quarantine mode, initiating automated recovery of the environment, and running at least one of a generic remediation process and a specific remediation process in the quarantine mode prior to releasing the environment from quarantine mode. Related user interfaces, applications, and computer program products are disclosed.03-31-2011
20090259886APPARATUS AND METHODS FOR RESTORING SYSTEM OPERATION STATES - A process for restoring an operational state of a portable handheld device is provided. The device may include multiple computing units and persistent storage. The operational state may be generated by a sequence of events. The operational state may receive signals corresponding to a plurality of event types. The process may include selecting an event type for storage, storing in the persistent storage events corresponding to the selected event type, receiving a signal indicating an interruption of operation, and transmitting the stored events to restore the device to the operational state.10-15-2009
20110258487NAND POWER FAIL RECOVERY - Techniques to recover data from an indirected non-volatile memory system after unexpected power failure, as, e.g., NAND memory in electronic devices are disclosed.10-20-2011
20100064172APPARATUS AND METHOD FOR MACRO OPERATION INVOLVING A PLURALITY OF SESSION PROTOCOL TRANSACTIONS - An apparatus and method for macro operation involving a plurality of session protocol transactions is disclosed. In accordance with an embodiment of the disclosure, a mobile device generates a binary encoded message having an indication from which a server can determine a plurality of session protocol transactions to be performed. The binary encoded message is sent from the mobile device and received by the server. In accordance with an embodiment of the disclosure, the server determines the plurality of session protocol transactions to be performed based on the indication in the binary encoded message and attempts the plurality of session protocol transactions. By reducing the number of messages between the mobile device and the server, and by reducing the message size compared to SIP messages, communication resources for the mobile device can be conserved. Also battery power for the mobile device can be conserved.03-11-2010
20100037095SYSTEM AND METHOD FOR AUTOMATED AND ASSISTED RESOLUTION OF IT INCIDENTS - A computer implemented method for assisted and automated resolving of Information Technology (IT) incidents is provided. The method facilitates one or more users to define repair workflows to resolve the IT incidents. The defined repair workflows are stored in a flow repository. The stored repair workflows are accessed and invoked by the one or more users. The invoked repair workflows are interactively executed for a user assisted resolution of the IT incident. The invoked repair workflows are executed automatically for the automated resolution of the IT incident.02-11-2010
20100037094Application Failure Recovery - A method, apparatus, and article of manufacture to dynamically address and resolve an improper shut-down of an application. Internal state data of the application is stored in persistent memory. New internal state data is dynamically created and authenticated following an improper shut-down of the application. Responsive to the authentication, the application is re-started with the authenticated new internal state data, without being subject to an immediate improper shut-down.02-11-2010
20090217089METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CONNECTION STATE RECOVERY AFTER FAULT - A method, system, and computer program product for connection state recovery of a connection after fault in a networked channel-to-channel computer system are provided. The method includes identifying essential data in response to detecting a state change in a channel of the computer system, the essential data including connection state information used in performing a recovery operation. The method also includes separating the essential data from transient or incidental data, augmenting the essential data with validation data, and storing the augmented essential data in a memory location of a control unit in communication with the channel. In response to initiation of a recovery operation, the method includes retrieving the augmented essential data and validating contents of persistent data fields containing the essential data. The method further includes using the contents to restore the connection to an operational state when it is determined that the contents of the persistent data fields are valid.08-27-2009
20110252275METHOD AND SYSTEM FOR PARTITIONING DATA FILES FOR EFFICIENT PROCESSING - An approach is provided for fast processing of data files. A plurality of records are received from a source system. The records are validated against a predetermined data source. An error notification is generated based on the validation. The validated records are partitioned based on a unique parameter. The partitioned records are transformed according to a format specified by a target system. The transformed records are selectively corrected.10-13-2011
20130013961REBUILDING A DATA SLICE OF A MAINTENANCE FREE STORAGE CONTAINER - A method begins by a dispersed storage (DS) processing module detecting a storage error of an encoded data slice associated with a storage server within a maintenance free storage container. The method continues with the DS processing module determining failure mode information for the storage server and other storage servers and determining a rebuilding protocol for the encoded data. When the determined rebuilding protocol is a zero information gain (ZIG) protocol, the method continues with the DS processing module identifying a decode threshold number of storage servers from the other storage servers of the maintenance free storage container and from storage servers of another maintenance free storage container, retrieving zero information gain (ZIG) partial encoded data slices from the decode threshold number of storage servers, and decoding the ZIG partial encoded data slices utilizing a ZIG dispersed storage error coding function to reproduce the encoded data slice.01-10-2013
20120304003OPERATOR STATE CHECKPOINTS - A checkpoint marker can be received at a first operator. The first operator can process the checkpoint marker by sending the checkpoint marker to a second operator and sending state checkpoint information representing a state of the first operator to a checkpoint writer. The checkpoint information can be used to rehydrate the state of one or more operators. For example, after a system failure, system shutdown, etc., checkpoint information can be received from a reader unit at a checkpoint information input queue of the first operator. A state of the first operator can be rehydrated using the checkpoint information. Processing of information in a data input queue of the first operator can be suspended while the checkpoint information is used to rehydrate the state of the first operator. Other operators in a system with the first operator (e.g., the second operator) may be checkpointed and rehydrated in the same manner as the first operator.11-29-2012
20120304004RECOVERY OF A FAILED REGISTRY - A system, method, and computer-readable medium, is described that enables a registry recovery service to retrieve zone files from a target registry, archive the zone files, publish the zone files to a managed DNS server, reconcile ownership of the zone files, and publish the zone files to a provisioning DNS server. The registry recovery service may also implement a WHOIS server for the zone and ownership information and may also implement zone specific features particular to the target registry's TLD. The registry recovery service may also enable DNSSEC extensions on the recovered registry DNS services.11-29-2012
20120304002MANAGING ROLLBACK IN A TRANSACTIONAL MEMORY ENVIRONMENT - A system and technique for managing rollback in a transactional memory environment is disclosed. The system includes a processor, a transactional memory, and a transactional memory manager (TMM) configured to perform a rollback on the transactional memory. The TMM is configured to, responsive to detecting a begin transaction directive by the processor, detect an access of a first memory location of the transactional memory not needing rollback and indicate that the first memory location does not need to be rolled back while detecting an access to a second memory location of the transactional memory and indicating that a rollback will be required. The TMM is also configured to, responsive to detecting an end transaction directive after the begin transaction directive and a conflict requiring a rollback, omit a rollback of the first memory location while performing rollback on the second memory location.11-29-2012
20110078500PROCESSING TRANSACTIONS IN GRAPH-BASED APPLICATIONS - A graph-based computation has a plurality of nodes representing graph components connected by one or more links representing data flows between the components. Preparing the computation includes: identifying at least a first set of components to process a plurality of transactions in the computation; and associating with a first transaction a first group of one or more data records and data operations corresponding to the data records, and associating with a second transaction a second group of one or more data records and data operations corresponding to the data records. Executing the computation to process at least the first and second transactions includes delaying execution by the first set of components of a data operation corresponding to an initial data record of the second group until after execution by the first set of components of a data operation corresponding to a final data record of the first group.03-31-2011
20110016353SYSTEMS AND METHODS FOR DISTRIBUTED SYSTEM SCANNING - Systems and methods are provided for scanning files and directories in a distributed file system on a network of nodes. The nodes include metadata with attribute information corresponding to files and directories distributed on the nodes. In one embodiment, the files and directories are scanned by commanding the nodes to search their respective metadata for a selected attribute. At least two of the nodes are capable of searching their respective metadata in parallel. In one embodiment, the distributed file system commands the nodes to search for metadata data structures having location information corresponding to a failed device on the network. The metadata data structures identified in the search may then be used to reconstruct lost data that was stored on the failed device.01-20-2011
20110258488Server Failure Recovery - A metadata server configured to maintain storage assignment mappings in non-persistent storage is described herein. The tract storage assignment mappings associate servers with storage assignments, the storage assignments representing the data stored on the servers. Responsive to a failure, the metadata server receives the storage assignments from the servers and rebuilds the storage assignment mappings from the storage assignments. The metadata server is also configured to enable clients to operate during a recovery process for a failed server by providing the storage assignment mappings to the clients during the recovery process. Also during the recovery process, the replacement server for the failed server conditionally overwrites stored data with other data received from other servers as part of the recovery process. The replacement server conditionally overwrites based on version information associated with the data and version information associated with the other data, the version information being associated with one or more versions of the storage assignment mappings10-20-2011
20100306584CONTROLLER AND CONTROL METHOD FOR A CONTROLLER - A controller and a control method for a controller can simplify application development and can improve the performance of device control processes. When a request is received from an application 12-02-2010
20120204060PROVIDING RESTARTABLE FILE SYSTEMS WITHIN COMPUTING DEVICES - In general, techniques are described for enabling a restartable file system. A computing device comprising a processor that executes an operating system may implement the techniques. The processor executes kernel and file system functions of the operating system to perform an operation, where both types of functions call each other to perform the operation. The operating system stores data identifying those of the kernel functions that called the file system functions. In response to determining that one of the file system functions that was called has failed, the operating system accesses the data to identify one of the kernel functions that most recently called one of the file system functions, and returns control to the identified one of the kernel functions without executing any of the file system functions called after the identified one of the kernel functions and prior to the one of the file system functions that failed.08-09-2012
20100281299FILE SYSTEM RECOGNITION STRUCTURE - A set of file system data structure and file system recognition APIs are disclosed that may allow an operating system to identify a partition of a storage device as having a valid file system, even if the operating system does not know how to access the file system a priori. File systems implement these data structures in a standardized, known location within a partition on the storage device such that an operating system may use APIs or other functions to examine that known location for the presence of these data structures. Information on how to interpret the data structure may be obtained using a network or other source.11-04-2010
20110161732SEMICONDUCTOR DEVICE AND SEMICONDUCTOR SYSTEM INCLUDING THE SAME - A semiconductor device includes an internal circuit configured to perform a specified operation in response to a predetermined command; a normal data input/output section configured to input/output a normal data synchronized with a center of a source clock, in response to data input/output commands; and a data recovery information signal input/output block configured to receive and store a data recovery information signal synchronized with an edge of the source clock and having a predetermined pattern, in response to either a command of the data input/output commands or the predetermined command upon entry to a data recovery operating mode, and to output the data recovery information signal after the passage of a predetermined time period.06-30-2011
20120151256Partial fault tolerance in an embedded appliance - A system and method for partial fault tolerance in an embedded appliance is disclosed. The method comprises providing an embedded appliance having first and second digital storage locations, with the second location including a boot manager and a recovery operating system. An image instance of the operational section of the first digital storage location can be copied at a selected frequency to a selected location on the second digital storage location. Files in the image instance can be re-mapped to operate at the second digital storage location. The embedded appliance can be rebooted from the second digital storage location using the boot manager to load an operating system in the image instance to operate the embedded appliance from the image instance at the selected location on the second digital storage location when the operational section of the first digital storage location is inaccessible.06-14-2012
20110258486RESTORING PROGRAMS AFTER OPERATING SYSTEM FAILURE - A state restoration unit tracks opening and closing of programs within a computer operating system. Responsive to detecting opening and closing of programs, a state restoration structure is updated. After the computer operating system restarts from a failure, the state restoration structure is accessed. The state restoration unit restores those of the programs indicated as open in the state restoration structure.10-20-2011
20100064171TARIFF MANAGEMENT DEPLOYMENT AUTOMATION - A method for an operator to deploy tariff and/or billing configurations represented by computer program code, the deployment being effected by operation of a user interface, the method including the steps of the operator identifying at least one configuration to be deployed, selecting the at least one configuration by use of the user interface, and associating the at least one configuration with at least one environment in which the computer program code representing the configuration must be executed to effect the configuration.03-11-2010
20120204061METHOD AND SYSTEM FOR ENABLING CHECKPOINTING FAULT TOLERANCE ACROSS REMOTE VIRTUAL MACHINES - A checkpointing fault tolerance network architecture enables a backup computer system to be remotely located from a primary computer system. An intermediary computer system is situated between the primary computer system and the backup computer system to manage the transmission of checkpoint information to the backup VM in an efficient manner. The intermediary computer system is networked to the primary VM through a first connection and is networked to the backup VM through a second connection. The intermediary computer system identifies updated data corresponding to memory pages that have been least recently modified by the primary VM and transmits such updated data to the backup VM through the first connection. In such manner, the intermediary computer system holds back updated data corresponding to more recently modified memory pages, since such memory pages may be more likely to be updated again in the future.08-09-2012
20110161730SYSTEMS, METHODS, AND APPARATUS TO DEBUG A NETWORK APPLICATION - Methods and apparatus to debug a network application are described. A described example network includes a live control network to collect control messages to create a history of network states, the history of network states reflecting an order in which control messages are processed, the live control network to roll back from a current state to a past state upon detection of an improper sequence of messages and to process the messages in a corrected sequence, the corrected sequence to be stored in the history. The described example network further includes a virtualized network corresponding to the live control network, the virtualized network responsive to a command from an operator to step through the history to facilitate debugging.06-30-2011
20090125755System and method for detection and recovery of malfunction in mobile devices - A method for recovering malfunction of at least one resource of a mobile device in response to a malware attack and a mobile device thereof. The method comprises diagnosing at least one malfunction of at lest on resource of the mobile device without identifying a reason of the attack, and, in response to said diagnosing, recovering at least one resource of the mobile device. The mobile device comprises one or more resources operatively coupled to at least one sensor directly or indirectly coupled to a recovery block, wherein said sensor is configured to monitor at least one of said resources for information, possibly indicative of at least one affected resource, and to report, directly or indirectly this information and/or derivative thereof to the recovery block; and said recovery block is configured to initiate at least one recovery-related action in respect of at least one of said resources in case the received information and/or derivative thereof meets a certain criterion.05-14-2009
20110161731RELOCATING BAD BLOCK RELOCATION (BBR) DIRECTORY UPON ENCOUNTERING PHYSICAL MEDIA DEFECT ON A DISK - Apparatus, method and program product for relocating Bad Block Relocation Directory (BBRD) on a disk storage pre-allocate a number of areas for BBRD in different locations of the disk storage. The locations for the BBRD are calculated based upon the size of the disk and BBRD count. If the update of BBRD fails due to defective media at the location to be updated, that location is abandon and the next pre-allocated location is used. A copy of the BBRD is stored in RAM and maintained by the kernel. By so doing, when a bad block in the BBRD is detected the kernel causes the BBRD to be written in a good one of the locations reserved for BBRD. When the number of alternate BBRD locations used hits a pre-defined threshold, this indicates a situation where many sections of the disk are going bad and the disk needs replacement. If all BBRD locations are used, the disk is presumed bad and all future I/O activities to the disk is suspended. An administrator may be notified that the disk is going bad and needs to be replaced.06-30-2011
20110055629COMPUTER SYSTEM, CONTROL METHOD THEREOF AND RECORDING MEDIUM STORING COMPUTER PROGRAM THEREOF - A computer system, a control method thereof and a recording medium storing a computer program thereof are provided to recover a program efficiently and be resistant to viruses, worms, and user error. The control method of computer system receives a user's request for a recovery of a program which is installed in a first storage unit. A file system of a second storage unit is determined which stores therein a recovery program corresponding to the program for which the recovery is requested. The recovery program is read from the second storage unit with reference to the determined file system, and the program in the first storage unit is recovered by using the read recovery program.03-03-2011
20110055628Method for Determining a State Associated with a Transaction - A computer implemented method, apparatus, and computer program product for determining a state associated with a transaction for use with a transactional processing system comprising a transaction coordinator and a plurality of grouped and inter-connected resource managers, the method comprising the steps of: in response to a communications failure between the transaction coordinator and a first resource manager causing a transaction to have an in doubt state, connecting to a second resource manager; in response to the connecting step, sending by the transaction coordinator to the second resource manager, a query requesting data associated with the in doubt transaction; obtaining at the first resource manager, by the second resource manager, a shared lock to data associated with the in doubt transaction; and in response to the obtaining step, collating, by the second resource manager, data associated with the in doubt transaction associated with the first resource manager.03-03-2011
20110055627Seamless Application Session Reconstruction Between Devices - A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position.03-03-2011
20110264953Self-Healing Failover Using a Repository and Dependency Management System - Systems, devices, methods, and articles of manufacture employing repair modules are provided. The modules may be automatically deployed in conjunction with dependency mechanisms upon identifying a malfunctioning application. The modules may be specifically tailored for certain diagnosis or repair and may be selected for deployment to a second application using information regarding the malfunction of a first application.10-27-2011
20100287409STATE VARIABLE-BASED DETECTION AND CORRECTION OF ERRORS - Embodiments provide methods and apparatuses for detecting errors in a computation using state variables. In various embodiments, corrections of the errors through the state variables are also provided. In various embodiments, the disclosed techniques may be used for power and/or energy minimization/reduction, and debugging, among other goals. Other embodiments and/or applications may be disclosed and/or claimed.11-11-2010
20110078499BUSINESS PROCESS ERROR HANDLING THROUGH PROCESS INSTANCE BACKUP AND RECOVERY - According to one embodiment of the present invention, a method for business process error handling through process instance backup and recovery includes the step of creating a backup profile of selected one or more portions of a business process model at modeling stage. The method also includes the steps of deploying the backup profile into a runtime environment, and upon occurrence of an error in execution instances of the business process model, re-executing at least one of the one or more portions of the backup profile to recover from the error.03-31-2011
20110126048METHOD FOR RECOVERING BASIC INPUT OUTPUT SYSTEM AND COMPUTER DEVICE THEREOF - A method for recovering a basic input output system (BIOS) and a computer device thereof are disclosed. The computer device includes a motherboard, a power button, a BIOS storage unit, and an embedded controller. The BIOS storage unit is disposed on the motherboard, and it stores a first boot block code and a second boot block code. When the computer device is connected with a power supply to supply standby power to the motherboard, and the power button is not pressed, the embedded controller detects whether the first boot block code is damaged. If the first boot block code is damaged, the embedded controller recovers the first boot block code via the second boot block code.05-26-2011
20110126047SYSTEM AND METHOD FOR MANAGING INFORMATION TECHNOLOGY MODELS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for managing information technology models in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for managing planned changes and recovery processes for version-controlled snapshots of the information technology models. For example, a discovery engine may enrich models of an infrastructure with identity information obtained from an identity vault and the infrastructure itself, and a management infrastructure may then manage planned changes to the infrastructure model. In particular, the management infrastructure may construct implementation plans that coordinate interaction between managed entities to implement the planned changes, and may further detect drifts between operational states and planned states for the infrastructure models.05-26-2011
20110138225Self-Managed Processing Device - A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services.06-09-2011
20110138224METHOD AND SYSTEM FOR TRACEPOINT-BASED FAULT DIAGNOSIS AND RECOVERY - A system for tracepoint-based fault diagnosis and recovery includes: a system state tracing model unit for storing state tracing models which are obtained by a modeling technique and are required for fault diagnosis and recovery; a state diagnosis unit for determining whether or not an action event is executable with reference to the state tracing models when the action event is received from a specific tracepoint among multiple tracepoints which exist in each of components within an operating system of the system, and generating a fault recovery command when it is determined that the action is not executable, that is, a fault has occurred; and a fault recovery unit for performing a fault recovery processing based on the state tracing models in response to the generated fault recovery command.06-09-2011
20100313069COMPUTER SYSTEM AND FAILURE RECOVERY METHOD - A computer system, comprising: a server machine; a storage system, which is coupled to the server machine; and a management computer for managing the server machine and the storage system, wherein the server machine has at least one or more programs running therein, wherein the logical storage area provided by storage system stores information about the at least one program, and wherein the computer system further includes: an access recording module for recording storage areas within the logical storage area provided by storage system storing information about the storage areas as storage area information; a boot information storing module for storing the identified boot information; a boot processing monitoring module for monitoring the processing of booting up the programs; and a program recovering module for executing recovery of one of the programs in the server machine.12-09-2010
20110078501System and Methods for Remotely Recovering and Purging Data From a Wireless Device in a Communications Network - A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device.03-31-2011
20120151258SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data.06-14-2012
20090292946REPAIR MODULE FOR MEMORY, REPAIR DEVICE USING THE SAME AND METHOD THEREOF - A repair module for repairing one of n bit lines through m bit bus in a memory, a repair device using the same, and a method thereof are provided herein, wherein m≧n. In the repair method, a switching control signal and a selecting control signal are generated according to an index value of the one of n bit lines. A dummy line is switched to the one of n bit lines by shifting from 111-26-2009
20110264954DISASTER-PROOF DATA RECOVERY - A recovery unit (10-27-2011
20100031088METHOD AND SYSTEM FOR PROCESSING INFORMATION - A method and system for processing information. An apparatus divides target information into N pieces of divided data using a secret sharing scheme in which a predetermined number (K) of pieces of the N pieces of divided data is required to restore the target information, wherein N>K. The apparatus is an information processing device or an external storage device. The apparatus selects M pieces from the N pieces, wherein K≦MM−K.02-04-2010
20100031087METHOD OF CONTROL IN A SYSTEM HAVING A MEDIA READER - A method of control in a system, which includes a media reader and a host unit, includes configuring the host unit to detect whether the media reader is responding, and configuring the host unit to reset the media reader when it is detected that the media reader stops responding. A system that includes the media reader and the host unit is also disclosed.02-04-2010
20100031085METHOD FOR REDUCING HOST DEVICE TO ELECTRONIC DEVICE COMMUNICATION ERRORS - This invention is directed to allowing an electronic device with a failed file system to dynamically direct a host device to reformat it, by making the storage component appear to be in its unformatted state. Upon detection of file system failure, the device writes changes to its disk to make it appear as factory-new to a host device. The host device treats the electronic device as if it is a brand new device that has never been connected to a host device before, and reformats it. By reformatting the device's storage component, the host device thereby provides a way to maintain communication between the host device and electronic device, allowing a more sophisticated application to then diagnose and recover the contents of the storage component, without the involvement of the user or a specialist. This avoids returns of devices with failed file systems, thereby improving the overall user experience.02-04-2010
20100023805METHOD AND SYSTEM FOR DISASTER RECOVERY BASED ON JOURNALING EVENTS PRUNING IN A COMPUTING ENVIRONMENT - A method and system for automated disaster recovery in an information technology computing system including computing resources, is provided. One implementation involves logging system events in a journaling log file, filtering the events of the log file for each resource and storing the filtered log file, reading the filtered log file, and restarting from a backup file by applying the filtered events to a backup file for recovery.01-28-2010
20100017654Device-to-Device Communication Bus for Distributed Power Management - A Device-to-Device Communication Bus protocol may facilitate transmission of a two to four byte packet by any device sharing the bus. All devices on the bus may monitor the bus, receiving all packets transmitted by other devices and recognizing when they may initiate transmission. The first byte of the packet may be an Address byte uniquely identifying the sender and allowing hardware arbitration to uniquely select one of any number of senders who may wish to transmit and begin transmission simultaneously. Arbitration may take place during transmission of the Address byte, with the transmitting device monitoring a bus bit value as it is transmitting the Address byte. If the data value observed by the transmitting device doesn't match the transmitting device's desired transmit value, the transmitting device may recognize loss of arbitration and suspend transmission to retry once the packet is complete. The receive function in every device may accept the packet as a normal received packet. The arbitration scheme may also include a fairness mechanism to insure one or several devices cannot monopolize the bus.01-21-2010
20110307737STATE DISPLAY APPARATUS, PROGRAM AND STATE DISPLAY SYSTEM - According to one embodiment, a state display apparatus comprises a receiving module configured to receive measurement files includes item data representing items executed by an object device to be measured, state-change data representing changes in the state of the items and time data, a storage module configured to store the states of the items of the object device in a form of a stack structure for each items, based on the measurement files received by the receiving module, a display module configured to display the states of the items, which are stored in the storage module, and a display controller configured to erase the state of at least one of the states of the items, stored in the form of the stack structure by the storage module, when the measurement files received by the receiving module comprise error data.12-15-2011
20120210165SYSTEM AND METHOD FOR AUTO-FAILOVER AND VERSION MATCHING OF BOOTLOADER IN AN ACCESS CONTROLLER - In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may include a memory having a bootloader portion including a first memory address and a second memory address a second processor communicatively coupled to the memory. The second processor may be configured to: (i) attempt to execute the a first copy of a bootloader stored at the first memory address; (ii) in the event of a failure to execute the first copy of the bootloader, copy a second copy of the bootloader stored at the second memory address to the first memory address; and (iii) subsequent to copying the second copy to the first memory address, attempt to execute the second copy of the bootloader stored at the first memory address.08-16-2012
20120005528DATA SET INDEX RECORD PRESERVATION - Various embodiments for preserving data set information in a computing storage environment are provided. In one such embodiment, at least one of a selected portion of an index record of the dataset is stored as a record in a subindex data set. The at least one component of the subindex data set is recoverable into the index record in an event of an error detected within the index record.01-05-2012
20120117420PROCESSOR AND METHOD IMPLEMENTED BY A PROCESSOR TO IMPLEMENT MASK LOAD AND STORE INSTRUCTIONS - A method of implementing a mask load or mask store instruction by a processor is provided. The method may include receiving the mask load or mask store instruction, a location of a memory operand and a location of corresponding mask bits associated with the memory operand, breaking the received memory operand into a plurality of sub-operands and executing the mask load or mask store instruction on each of the plurality of sub-operands using a fastpath operation or using microcode, wherein the respective mask load or mask store instruction loads or stores each of the plurality of sub-operands based upon the corresponding mask bits.05-10-2012
20110167296REGISTER FILE SOFT ERROR RECOVERY - Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.07-07-2011
20110167297CLOCK-DATA-RECOVERY TECHNIQUE FOR HIGH-SPEED LINKS - A receiver circuit is described. In the receiver circuit, an analog-to-digital converter (ADC) generates first samples of a data signal based on a first clock signal, and a clock-data-recovery (CDR) error-detection circuit generates second samples of the data signal based on a second clock signal. In addition, the CDR error-detection circuit estimates intersymbol interference (ISI) at a current sample in the second samples from an adjacent, subsequent sample in the second samples. Based on the second samples and the estimated ISI, a CDR circuit generates the first clock signal and the second clock signal, which involves modifying the skews of either or both of these clock signals so that the current sample is associated with a zero crossing of a pulse response of a communication channel from which the data signal was received, thereby reducing or eliminating the ISI from the adjacent, subsequent sample.07-07-2011
20120011398FAILURE RECOVERY USING CONSENSUS REPLICATION IN A DISTRIBUTED FLASH MEMORY SYSTEM - Data replication in a distributed node system including one or more nodes. A consensus protocol for failure recovery is implemented. Data items and information relating to consensus protocol roles of participant nodes are stored in at least some of the plurality of nodes. Logical logs stored in at least some of the plurality of nodes are created. The logical logs contain additional consensus protocol information including container metadata and replicated data.01-12-2012
20120011397Computer apparatus, non-transitory computer-readable medium storing an error recovery control program, and error recovery control method - A computer apparatus includes a managing unit realizing virtual computers including device driver virtual computers and user virtual computers, the user virtual computers communicating with various devices via the device driver virtual computers. Error detection information is received from one of the virtual computers upon detection of error in one of the device drivers used for communication with one of the devices in one of the virtual computers. One or more types of the virtual computers and the contents of recovery process corresponding to the type of device driver and the type of error indicated in the received error detection information are acquired from error recovery control information. A recovery instruction is transmitted to one or more of the virtual computers identified by the one or more acquired types of virtual computers in order to cause the one or more identified virtual computers to perform the acquired contents of the recovery process.01-12-2012
20120017115APPARATUS AND METHOD FOR OPERATING A COMPUTING PLATFORM WITHOUT A BATTERY PACK - An application control engine computing platform having a shut-down mechanism that permits the platform to adequately start up and operate upon return of power after a power interruption, without a need of a battery pack. The mechanism may target the saving of control object runtime values and operational settings of those objects, rather than the saving of the complete set of objects, and all unsaved alarm and history records upon a power interruption.01-19-2012
20120017114Systems, Methods, and Computer Program Products for Instant Recovery of Image Level Backups - Systems, methods, and computer program products are provided for instant recovery of a virtual machine (VM) from a compressed image level backup without fully extracting the image level backup file's contents to production storage. The method receives restore parameters and initializes a virtual storage. The method attaches the virtual storage to a hypervisor configured to launch a recovered VM. The method stores virtual disk data changes inflicted by a running operating system (OS), applications, and users in a changes storage. The method provides the ability to migrate the actual VM disk state (taking into account changed disk data blocks accumulated in changes storage) so as to prevent data loss resulting from the VM running during the recovery and accessing virtual storage, to production storage without downtime. In embodiments, the method displays receives restore parameters in an interactive interface and delivers the recovery results via an automated message, such as an email message.01-19-2012
20120023366TECHNIQUE FOR ACCURATELY DETECTING SYSTEM FAILURE - An apparatus, method and program for dividing a conversational dialog into utterance. The apparatus includes a computer processor; a word database for storing spellings and pronunciations of words; a grammar database for storing syntactic rules on words; a pause detecting section which detects a pause location in a channel making a main speech among conversational dialogs inputted in at least two channels; an acknowledgement detecting section which detects an acknowledgement location in a channel not making the main speech; a boundary-candidate extracting section which extracts boundary candidates in the main speech, by extracting pauses existing within a predetermined range before and after a base point that is the acknowledgement location; and a recognizing unit which outputs a word string of the main speech segmented by one of the extracted boundary candidates after dividing the segmented speech into optimal utterance in reference to the word database and grammar database.01-26-2012
20120060056SEMICONDUCTOR MEMORY DEVICE AND METHOD OF OPERATING THE SAME - A method of operating a semiconductor memory device according to an aspect of the present disclosure includes performing a program loop, including a program operation and a program verification operation, in order to store input data in selected memory cells, performing a first error bit check operation for comparing the number of error bits of data not identical with the input data, with the number of correctable error bits, if the number of error bits is equal to or smaller than the number of correctable error bits, performing a second error bit check operation for comparing the number of error bits with the reference number of bits for replacement determination, and if the number of error bits is greater than the reference number of bits for replacement determination, updating failed column address information by adding the column address of a memory cell, having the error bits, to the failed column address information.03-08-2012
20120159242Method and System For Spinlock Fault Recovery - A method including requesting access to a resource governed by a spinlock; determining an allocation of the resource to a further requester; determining an expiration of a time limit for the spinlock, if the resource is allocated to the further requester; and initiating a fault recovery, if the time limit is expired.06-21-2012
20120159244MEMORY SYSTEM - According to one embodiment, a memory system includes a data manager and a data restorer. The data manager multiplexes difference logs by a parallel writing operation and stores them in a second storage area, the difference logs being difference logs indicating difference information before and after update of a management table; and thereafter multiplexes predetermined data as finalizing logs and stores them in the second storage area. The data restorer determines a system status at startup of the memory system, by judging whether irregular power-off occurs or data destruction occurs in the second storage area, based on a data storage state of the difference logs and the finalizing logs stored in the second storage area.06-21-2012
20120159243Proactive Error Scan And Isolated Error Correction - Processing for file system volume error detection and processing for resultant error correction are separated to support system availability and user satisfaction. File system volumes for storing data structures are proactively scanned while the volumes remain online to search for errors or corruptions thereon. Found errors are scheduled to be corrected, i.e., spot corrected, dependent on the severity of the identified errors, error correction scheduling and/or at the determination of a file system administrator and/or user, to assist in maintaining minimal user and file system impact. When spot correction is initialized, one file system volume at a time is taken offline for correction. Spot correction verifies prior logged corruptions for the offline volume, and if independently verified, attempts to correct the prior noted corruptions. Volumes are retained offline only for the time necessary to verify and attempt to correct prior noted volume corruptions.06-21-2012
20120072769REPAIR-POLICY REFINEMENT IN DISTRIBUTED SYSTEMS - In a distributed system a plurality of devices (including computing units, storage and communication units) are monitored by an automated repair service that uses sensors and performs one or more repair actions on computing devices that are found to fail according to repair policies. The repair actions include automated repair actions and non-automated repair actions. The health of the computing devices is recorded in the form of states along with the repair actions that were performed on the computing devices and the times at which the repair actions were performed, and events generated by both sensors and the devices themselves. After some period of the time, the history of states of each device, the events, and the repair actions performed on the computing devices are analyzed to determine the effectiveness of the repair actions. A statistical analysis is performed based on the cost of each repair action and the determined effectiveness of each repair action, and one or more of the policies may be adjusted, as well as determining from the signals and events from the sensors whether the sensors themselves require adjustment03-22-2012
20110078498RADIATION-HARDENED HYBRID PROCESSOR - A method of providing radiation hardening for a modular computational component having a first memory and a second memory and being connectable to an external platform comprises providing a radiation tolerant field programmable gate array having a pair of processors, processing data from the external platform according to instructions stored in the first memory, and executing instructions stored in the second memory to provide radiation hardening by software. The instructions comprise instructions to execute identical processing operations for the data of the external platform in each of the pair of processors, instructions to identify a data corruption indicia for each of the identical processing operations, instructions to compare the identified data corruption indicia, and instructions to repeat the identical processing operations if the data corruption indicia show corrupted data.03-31-2011
20110107142ULTRASONIC DIAGNOSTIC METHOD AND SYSTEM FOR SUPPORTING SELF DIAGNOSIS AND RESTORATION FUNCTION - An ultrasonic diagnostic method and system are provided. The ultrasonic diagnostic method includes performing booting of a system using a kernel, after a Basic Input/Output System (BIOS) is executed and an error is not recorded in a memory; recording an error in the memory when the error occurs in executing an ultrasonic diagnostic program; transmitting the recorded error to a server via a network; and receiving, from the server, a recovery file used to restore the ultrasonic diagnostic program, and restoring the ultrasonic diagnostic program using the received recovery file.05-05-2011
20110107143CACHE SYSTEM - A write-back cache system includes: a dirty bit section configured to store a dirty indication data indicating that cache data is in a dirty state; and an OR calculation circuit connected with a front-stage to the dirty bit section. The OR calculation circuit includes: a first input node configured to receive a write request signal indicating a write request of a cache data; a second input node configured to receive a correctable error determination signal of the cache data indicating that a correctable error is present in the cache data; and an output node configured to output a signal such that the dirty indication data is stored in the dirty bit section, when receiving at least, one of the write request signal and the correctable error determination signal.05-05-2011
20110099422CONTINUOUS INTEGRATION OF BUSINESS INTELLIGENCE SOFTWARE - A method for automatically testing a business intelligence artifact includes receiving business metric data from a business intelligence system, creating a business intelligence artifact derived from the received business metric data, executing the business intelligence artifact to generate a business intelligence output populated with information related to the business metric data, creating at least one test case for the business intelligence artifact, the test case having at least one assertion associated with the business intelligence output to verify the proper functioning of the business intelligence artifact, testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact for errors by determining whether the output generated by the current version of the business intelligence artifact satisfies the conditions of the assertion after execution of the business intelligence artifact; and if errors are detected, correcting the errors to create a subsequent version of the business intelligence artifact.04-28-2011
20090132852PORTABLE ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - A portable electronic device includes a storage unit in which information indicating correct process contents is stored. A reception unit of the portable electronic device receives a command for requesting a process from an external device, and the portable electronic device determines whether or not process contents to be executed according to the received command are matched with process contents stored in the storage unit. When it is determined that process contents according to the received command are matched with process contents stored in the storage unit, the portable electronic device executes a process according to the command received by the reception unit.05-21-2009
20120166869PREDICTING, DIAGNOSING, AND RECOVERING FROM APPLICATION FAILURES BASED ON RESOURCE ACCESS PATTERNS - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error.06-28-2012
20120166870METHOD AND APPARATUS FOR RECOVERING ERRORS IN A STORAGE SYSTEM - Apparatus and method for recovering errors from erroneous files in a storage system. In order to recover the errors from the erroneous files, each of at least three erroneous files stored in the storage system may be divided in half to form three sets of divided files. Three corresponding, portions from each of the three sets of divided files may be compared. A determination may be made as to whether at least two portions among the three corresponding portions are substantially identical. Based on the determination, substantially identical portions are determined to be non-erroneous portions. Then, a non-matched portion that is not substantially identical to the two substantially identical portions may be replaced with one of the non-erroneous portions.06-28-2012
20120216072HANG RECOVERY IN SOFTWARE APPLICATIONS - Various embodiments provide a guard mechanism that is configured to prevent transmission of synchronous function calls to hung application components. In at least some embodiments, a hang resistance application layer intercepts a synchronous function call that is intended for an application component. Before permitting the synchronous function call to be transmitted to the application component, the hang resistance application layer determines whether the application component is hung by transmitting a message other than the synchronous function call to the application component that requests that a response be received before transmission of the synchronous function call to the application component is permitted. Responsive to determining that the component is hung, a hung component recovery process is initiated.08-23-2012
20120137174METHOD AND SYSTEM FOR FLEXIBLE AUTOMATED INTERACTIONS - A computer platform provides a method and system for establishing scenarios for interactions between users (both individually and as a group) and a web site or other software application over a network. The interactions are described in terms of events, actions, and conditions, where a single mechanism may be used to describe events, actions, and conditions for both individuals and a group. One portion of a scenario may apply to the group, while another portion applies to individuals. Time elements and branches also can be employed to describe the scenario. The scenario may describe a non-deterministic process, but be modeled as a deterministic state machine for execution.05-31-2012
20120137173MULTI-RPO DATA PROTECTION - A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied.05-31-2012
20100174943METHOD FOR RESTORING CLIENT OPERATING SYSTEM-BASED SYSTEM, VIRTUAL MACHINE MANAGER AND SYSTEM USING THE SAME - The present invention provides a method for restoring a client operating system-based system, a virtual machine manager and a virtual machine manager system using the same. The method comprises steps of: receiving a restoration instruction for the client operating system and suspending running the client operating system after receiving the restoration instruction, the restoration instruction including a preset restoration point; determining a first memory snapshot and a first incremental file corresponding to the restoration point, the first memory snapshot being a memory snapshot for the client operating system, which is created when setting the restoration point, and the first incremental file being an incremental file, which is mapped as the first hard disk when setting the restoration point; re-mapping the first incremental file as the first hard disk; and performing a snapshot recovery based on the first memory snapshot. With the present invention, system restoration may be performed rapidly.07-08-2010
20100174942Systemic reset of a mote network - A method may include and/or involve a mote network receiving a signal to reset and applying the signal to reset to place the mote network into a reset condition.07-08-2010
20100174941FILE REPLACEMENT IN SHARED FILE SYSTEM - A method for replacing a first root file system comprising, retrieving a second root file system, mounting the second root file system on a first system in a sysplex as the sysplex root file system, replacing sysplex root mount information associated with the first root file system with sysplex root mount information associated with the mounted second root file system, updating a root on the first system to point to the mounted second root file system, invalidating the first root file system on the first system, updating a first file system to point to the mounted second root file system in the first system, updating an active process with the sysplex root mount information associated with the mounted second root file system, and unmounting the first root file system from the first system.07-08-2010
20120317440COMPILER INTERNAL FAULT HANDLING AND REPORTING - Embodiments of the invention provide systems and methods for handling internal compiler errors encountered during compilation of a computer program without breaking the compilation. Implementations of a computer-implemented compiler system include a compiler driver, configured to compile a computer program according to a set of compiler settings, and a number of compiler components, each corresponding to a portion of the computer program. Each compiler component is configured to detect an internal compiler error during compilation of the component; identify a recovery plan having a recovery target and at least one recovery setting; and direct the driver to continue compiling the computer program according to the recovery plan, such that the compilation recompiles from the recovery target and according to a modified set of compiler settings according to the at least one recovery setting.12-13-2012
20120317441NON-FAULTING AND FIRST FAULTING INSTRUCTIONS FOR PROCESSING VECTORS - The described embodiments include a processor that handles faults during execution of a vector instruction. The processor starts by receiving a vector instruction that uses at least one vector of values that includes N elements as an input. In addition, the processor optionally receives a predicate vector that includes N elements. The processor then executes the vector instruction. In the described embodiments, when executing the vector instruction, if the predicate vector is received, for each element in the vector of values for which a corresponding element in the predicate vector is active, otherwise, for each element in the vector of values, the processor performs an operation for the vector instruction for the element in the vector of values. While performing the operation, the processor conditionally masks faults encountered (i.e., faults caused by an illegal operation).12-13-2012
20120173924DUAL ENDIANESS AND OTHER CONFIGURATION SAFETY IN LOCK STEP DUAL-CORE SYSTEM, AND OTHER CIRCUITS, PROCESSES AND SYSTEMS - An electronic circuit includes a microcontroller processor (07-05-2012
20100050017Intelligent Field Oil and Gas Field Data Acquisition, Delivery, Control, and Retention Based Apparatus, Program Product and Related Methods - An apparatus, program product, and methods for data management, are provided. An exemplary apparatus includes one or more PDHMS surface units each having a serial interface to provide a continuous real-time data stream of captured data, a data storage medium for storing collected downhole process data during a downstream communication link failure, a controller configured to cause the PDHMS surface unit to store recovery data during the downstream communication failure, and a broadband interface to provide recovery file transmission of recovery data stored during the downstream communication link failure. The apparatus can also include a RTU configured to collect the continuous real-time data collected by the PDHMS surface unit and to transmit the collected data to a SCADA system, which can function as a time synchronization master for the RTU and PDHMS surface units, and which can forward the collected data to other systems.02-25-2010
20120226937DISASTER RECOVERY REPLICATION THROTTLING IN DEDUPLICATION SYSTEMS - Communication is arrested between a source data entity and a replicated data entity at a location declared in a DR mode. The DR mode is negotiated to a central replication management component as a DR mode entry event. The DR mode entry event is distributed, by the central replication management component, to each member in a shared group. The DR mode is enforced using at least one replication policy.09-06-2012
20100275060SYSTEM AND METHOD FOR PROTECTING WINDOWS SYSTEM STATE - A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing.10-28-2010
20100017653REFERENCE STATE INFORMATION GENERATION - A method for generating reference state information, the method includes: comparing between at least one sequence of block identifiers that are accessed during a test period and at least one corresponding reference sequence of block identifiers to provide a comparison result; determining whether to generate reference state information in response to the comparison result; and generating reference state information if determining to generate the reference state information.01-21-2010
20120084602FAULT RESTORATION APPARATUS AND METHOD FOR USE IN A VIRTUAL ENVIRONMENT - A fault restoration technique for use in a virtual environment is provided. The fault restoration technique includes monitoring fault state values of a plurality of domains, detecting a faulty domain, if any, from the plurality of, and restoring the faulty domain by reloading the OS of the faulty domain.04-05-2012
20120084601COMPUTER SYSTEM RESCUE METHOD - A computer system rescue method uses the AMtek iTablet Recovery to diagnose, unfold, restore an operating system with a Windows Pre-install Environment (WinPE) component and back up or recover an operating system or data with a Windows APIs image component. Firstly, in the low-level disk formatting, a disk area is selectively partitioned into three primary sectors and n logical partitions, or is unconfigured for installation of Linux. After installing the Windows system and the operating system used by the user in one primary sector, the AMtek iTablet Recovery is particularly installed in another sector or a mass storage device such as a plug-and-play portable hard drive, and then all the old data of the user is moved to the Windows.old directory through the AMtek iTablet Recovery, thus separating the booting system from the operating system, in which manner, when the computer of the user is infected with a virus, the operating system is unstable or the computer fails to boot normally, the AMtek iTablet Recovery can reinstall or recover the operating system.04-05-2012
20120221892COMPUTER SYSTEM, CONTROL METHOD THEREOF AND RECORDING MEDIUM STORING COMPUTER PROGRAM THEREOF - A computer system, a control method thereof and a recording medium storing a computer program thereof are provided to recover a program efficiently and be resistant to viruses, worms, and user error. The control method of computer system receives a user's request for a recovery of a program which is installed in a first storage unit. A file system of a second storage unit is determined which stores therein a recovery program corresponding to the program for which the recovery is requested. The recovery program is read from the second storage unit with reference to the determined file system, and the program in the first storage unit is recovered by using the read recovery program.08-30-2012
20120221890MECHANISM FOR MANAGING KERNEL APPLICATION BINARY INTERFACE/APPLICATION PROGRAMMING INTERFACE-BASED DISCREPANCIES RELATING TO KERNEL PACKAGES - A method for managing kernel interface-based discrepancies may include finding a software package having a first version of a kernel package, and retrieving a first kernel interface information from a first file within the kernel package. The first kernel interface information relates to kernel interfaces associated with the kernel package, wherein the interfaces include kernel application binary interface (kABI). The method may further include forming a first dataset including the first kernel interface information relating to the first version of the kernel package, and detecting kernel discrepancies by comparing the first dataset with a second dataset relating to a second version of the kernel package.08-30-2012
20120221891PROGRAMMABLE CONTROLLER - A CPU saves a portion of device data stored in a device memory into a save memory every time a scanning process is performed so that the device data can be reliably saved even if a voltage holding time is shortened due to degradation of an electrolytic capacitor, and when a power-failure detecting circuit detects power failure of a main power supply, the CPU saves a remaining portion of the device data stored in the device memory using a power supply held by the electrolytic capacitor. When a capacity of the electrolytic capacitor detected by a capacitor-capacity detecting circuit is reduced, the CPU changes a size of the device data to be saved by a saving process performed every time the scanning process is performed according to the capacity of the electrolytic capacitor detected by the capacitor-capacity detecting circuit such that the size of the device data to be saved every time the scanning process is performed is increased.08-30-2012
20120260128METHOD FOR CONTROLLING CHANGES OF REPLICATION DIRECTIONS IN A MULTI-SITE DISASTER RECOVERY ENVIRONMENT FOR HIGH AVAILABLE APPLICATION - A running of an application resource of a first site of at least two sites is stopped from accessing a storage device of the first site. A running of a replication resource is brought to a stop. The replication resource is configured to control a replication of data between the storage device on the first site on which data from the running application resource on the first site are stored to the storage device on the second site. A replication request is submitted to the automation engine for changing a replication direction to run from the second site to the first site. The application resource is started on the second site only after changing the replication direction to start from the storage device on the second site instead of from the storage device of the first site.10-11-2012
20120239972SYSTEM AND METHOD FOR CURING A READ INABILITY STATE IN A MEMORY DEVICE - A system and method for correcting a boot error is disclosed. The system comprises a solid-state nonvolatile memory device, the solid-state nonvolatile memory device storing a boot loader at a predetermined block having a first address on the solid-state nonvolatile memory device. The system further comprises a main controller that retrieves the boot loader from the predetermined block upon powering up. The system also includes a monitoring module configured to monitor an initial boot sequence of the main controller and to determine when the predetermined block has a read inability error. The main controller obtains a backup boot loader from a backup block when the monitoring module determines that the predetermined block is corrupted.09-20-2012
20120239975Reducing Application Downtime During Failover - Reducing application downtime during failover including identifying a critical line in the startup of an application, the critical line comprising the point in the startup of the application in which the application begins to use dependent resources; checkpointing the application at the critical line of startup; identifying a failure in the application; and restarting the application from the checkpointed application at the critical line.09-20-2012
20120239971MITIGATING KNOWN SOFTWARE DEFECTS - A method, system, and computer program product for mitigating known software defects are provided in the illustrative embodiments. A code containing the defect is executed in a data processing system. An error caused by the defect is detected. A function implemented external to the code is called, where the function is a part of a library accessible to the code, and where the function is called for the code for a purpose other than to correct the error. A corrective code embedded in the function is executed, the corrective code attempting to correct the error. Executing the code is continued after the corrective code has corrected the error.09-20-2012
20110047413METHODS AND DEVICES FOR DETECTING SERVICE FAILURES AND MAINTAINING COMPUTING SERVICES USING A RESILIENT INTELLIGENT CLIENT COMPUTER - Intelligent client computing devices track and record the changes they make to data, applications, and services. Systems, devices, and computer readable media for detecting service tier failures and maintaining application services provide a resilient client architecture that allows a client application on an intelligent client to automatically detect the unavailability of server tiers or sites and re-route requests and updates to secondary sites to maintain application services at the client tier in a manner that is transparent to a user. The resilient client architecture understands the level of currentness of secondary sites in order to select the best secondary site and to automatically and transparently bring this secondary site up to date to ensure no data updates are missing from the secondary site.02-24-2011
20120324281Recovery Node Testing - There is disclosed a recovery node testing system and method. The system and method include copying a protected server image associated with a protected server to a test node and creating a test environment for the test node, the test environment including at least one of the network characteristics of the protected server. The test node may then be activated using the protected server image which may then be connected to the virtual network. Once connected, at least one test is performed on the test node to confirm that the protected server image operating on the test node responds in the same manner as the protected server.12-20-2012
20110214015NETWORK HANG RECOVERY - A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.09-01-2011
20110214013Data Transfer and Recovery Process - A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and a remote storage server. In the event of a failure of the primary server, the failure can be diagnosed to develop a recovery strategy. Based on the diagnosis, at least one delta image may be applied to a copy of the primary image to generate an updated primary image at either the network attached storage or the remote storage server. The updated primary image may be converted to a virtual server in a physical to virtual conversion at either the network attached storage device or remote storage server and users may be redirected to the virtual server. The updated primary image may also be restored to the primary server in a virtual to physical conversion. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure.09-01-2011
20120324280SYSTEM AND METHOD FOR DATA DISASTER RECOVERY - A system includes a production computer machine that includes an operating system and a driver stack. The driver stack includes a file system layer, a recovery driver, a storage layer, a driver layer, a bus driver layer, and a storage device. The system also includes a backup computer processor coupled to the production computer machine via the recovery driver. The recovery driver is configured to commence a recovery of data from the backup computer processor, receive a disk access request from the file system layer, determine if the disk access request accesses data that has not yet been recovered from the backup computer processor, and initiate an on-demand recovery request from the backup computer processor when the data has not been recovered from the backup computer processor.12-20-2012
20120324279Method and Apparatus of Backing up Subversion Repository - The present disclosure provides a method and apparatus for backing up a subversion repository. In one embodiment, a method of backing up a subversion repository wherein a version attribute of a backup repository is preset and identifies a latest version of the backup repository, the method comprises: synchronizing the backup repository based on the version attribute of the backup repository; in an event of successful synchronization, updating the version attribute of the backup repository with an identification of a synchronized version; and in an event of unsuccessful synchronization, determining that a current version to be a non-synchronizable version, backing up an original repository by duplicating a copy of the original repository, and updating the version attribute of the backup repository with an identifier of the non-synchronizable version.12-20-2012
20100235680Microprocessor System for Controlling or Regulating at least partly Safety-Critical Processes - A microprocessor system (09-16-2010
20120331341SCALAR READXF INSTRUCTION FOR POROCESSING VECTORS - The described embodiments include a processor that handles faults. The processor first receives an input vector, a control vector, and a predicate vector, each vector comprising a plurality of elements. Then, for a first element of the input vector for which corresponding elements of the control vector and the predicate vector are active, the processor performs a scalar read operation using an address from the element of the input vector. When a fault condition is encountered while performing the read operation, the processor determines if the element is a first element where a corresponding element of the control vector is active. If so (i.e., if the element is a first element where a corresponding element of the control vector is active), the processor processes the fault. Otherwise, the processor masks the fault for the element.12-27-2012
20120331340Method and Arrangement for Fault Handling in a Distributed IT Environment - An improved method for fault handling in a distributed IT environment. The distributed IT environment executes at least one workflow application interacting with at least one application by using interface information about the at least one application. The method comprises: storing at least one fault handling description in a implementation-independent meta language associated with the at least one application; associating the interface information with the at least one fault handling description based on at least one defined fault handling policy, created based on at least one service definition; and the workflow application if a fault response from the at least one application is received: retrieving at least one associated fault handling description based on at least one fault handling policy, and interpreting and executing a particular meta language code of the at least one associated fault handling description in order to continue the defined workflow application.12-27-2012
20120331339CONTROL SYSTEM SOFTWARE EXECUTION DURING FAULT DETECTION - An example method for uninterrupted execution of control software in an aircraft control system includes creating a plurality of static data copies. A first parity bit is determined for each of the plurality of static data copies. A second parity bit is determined for a first static data copy. A parity fault is detected in the first static data copy if the first parity bit does not match the second parity bit. The system switches to read a second static data copy in response to detecting a parity fault in the first static data copy.12-27-2012
20110320868DATA STORAGE APPARATUS AND METHOD FOR WRITING DATA - According to one embodiment, a data storage apparatus includes a read module, an error detector and a controller. The read module is configured to read data from a flash memory, more precisely from a rewrite area and a write-back area, both provided in the flash memory. The error detector is configured to detect errors, if any, in the data read. The controller is configured to keep rewriting data, without correcting the errors the error detector has detected in the rewrite area of the flash memory.12-29-2011
20110320867METHOD AND APPARATUS FOR TRAINING A MEMORY SIGNAL VIA AN ERROR SIGNAL OF A MEMORY - Described herein is a method and an apparatus for training a memory signal via an error signal of a memory. The method comprises transmitting from a memory controller a command-address (C/A) signal to a memory module; determining by the memory controller an error in the memory module via an error signal from an error pin of the memory module, the error associated with the C/A signal transmitted to the memory module; and modifying by the memory controller the C/A signal in response to determining an error in the memory module, wherein the error pin is a parity error pin of the memory module, and wherein the memory module comprises a Double Data Rate 4 (DDR4) interface.12-29-2011
20110320866DYNAMIC PIPELINE CACHE ERROR CORRECTION - Dynamic pipeline cache error correction includes receiving a request to perform an operation that requires a storage cache slot, the storage cache slot residing in a cache. The dynamic pipeline cache error correction also includes accessing the storage cache slot, determining a cache hit for the storage cache slot, identifying and correcting any correctable soft errors associated with the storage cache slot. The dynamic cache error correction further includes updating the cache with results of corrected data.12-29-2011
20120102357METHOD AND APPARATUS FOR PROCESSING LOAD INSTRUCTIONS IN A MICROPROCESSOR HAVING AN ENHANCED INSTRUCTION DECODER AND AN ENHANCED LOAD STORE UNIT - A method and microprocessor are described for efficiently executing load instructions out-of-order (speculatively). The microprocessor includes an enhanced load store unit (LSU) and an enhanced instruction decoder. The enhanced LSU receives a plurality of out-of-order value addresses, and sends a resync signal to the enhanced instruction decoder when an execution error associated with a particular load instruction occurs. The enhanced instruction decoder stores a specific address associated with the particular load instruction, and increments a counter value that indicates how many times the resync signal was sent by the resync predictor. When the counter value reaches a predetermined threshold, subsequent load instructions from the specific address are executed in order (non-speculatively). When a future execution of the particular load instruction indicates that the probability of an execution error has been reduced, the counter value is decremented, facilitating newer load instructions associated with the same address to again be executed speculatively.04-26-2012
20120151259Nor Flash Memory Controller - A mobile device includes a NOR flash memory for storing settings of the mobile device, a NOR flash memory controller having a memory storing data and/or program code for controlling operations of the NOR flash memory; and a processor coupled to the memory and the NOR flash memory for executing the program code. The program code when executed by the processor causes the memory controller to sequentially write to a sequentially first block of each sector of the NOR flash memory, then write to a sequentially second block of each sector of the NOR flash memory, and when all blocks of all sectors of the NOR flash memory have been written, the memory controller erases a sequentially first sector and then writes to the sequentially first block of the sequentially first sector.06-14-2012
20120151257Hardware turnkey mobiltity - A system and method for producing a factory build of an embedded appliance is disclosed. The method comprises providing an embedded appliance having first and second digital storage locations, with the second location including a boot manager and a recovery operating system. A factory image of operational software is copied to the secondary digital storage location. The embedded appliance is configured to boot from the second digital storage location at an initial startup and load a recovery operating system to copy the factory image to the primary digital storage location to enable the embedded appliance to operate from the operational section using the operational software.06-14-2012
20110145635Failure Detection and Fencing in a Computing System - A method, computer program product, and system for detecting and fencing off a failed entity instance so that failover time in the computing system is reduced. Upon detection of a failed entity, for example a failed process, a signal handler invokes an operating system interface to fence off the failed instance from modifying its persistent state, so that the entity may be re-instantiated prior to termination of the failed instance. This approach reduces failover time and eliminates split-brain problems without compromising access to the failed instance to obtain diagnostic information, core dumps, and the like.06-16-2011
20130024726SYSTEM AND METHOD FOR REMOVABLE NETWORK ATTACHED STORAGE ENABLING SYSTEM RECOVERY FROM BACKUP - A system and method for enabling recovery from backup is disclosed. The removable system may include a processor, a memory, a network interface, a backup management module configured to backup data associated with an information handling system communicatively coupled together. The system may be further configured to boot and restore data associated with the information handling system to which the memory is locally attached. The method may include copying data from an information handling system via the network to memory. The method may further include booting and restoring copied data to the information handling system from the locally attached memory. The system and method may further include an article of manufacture including a computer-readable medium and computer-executable instructions operable to copy data, determine the identity of, boot and restore copied data to an information handling system.01-24-2013
20130024725OUT OF ORDER MILLICODE CONTROL OPERATION - Instructions within a processor are managed by receiving, at a recovery unit of the processor, an instruction that modifies a control register residing within the recovery unit. The recovery unit receives a first set of data associated with the instruction from a general register. A second set of data associated with the instruction is retrieved from the control register by the recovery unit. The recovery unit performs at least one binary logic operation on the first set of data and the second data.01-24-2013
20130173957Peripheral Component Interconnect Express Root Port Mirroring - An information handling system includes a peripheral component interconnect express root complex, a basic input output system, and a root complex mirroring block. The peripheral component interconnect express root complex includes a plurality of peripheral component interconnect express ports. The basic input output system is in communication with the peripheral component interconnect express root complex, and is configured to detect a peripheral component interconnect express adaptor configuration, and to set a peripheral component interconnect express mirroring setting based on the peripheral component interconnect express adaptor configuration. The root complex mirroring block is in communication with the basic input output system, and is configured to mirror data between a first peripheral component interconnect express adaptor and a second peripheral component interconnect express adaptor based on the peripheral component interconnect express mirroring setting.07-04-2013
20080256387AUTOMATED ERROR RECOVERY OF A LICENSED INTERNAL CODE UPDATE ON A STORAGE CONTROLLER - A system, method and article of manufacture are provided for the automatic recovery from errors encountered during an automated Licensed Internal Code (LIC) update on a storage controller. The present invention functions with a concurrent or nonconcurrent automated LIC update. The automated recovery from many error conditions is transparent to the attached host system and on-site service personnel, resulting in an improvement in the LIC update process.10-16-2008
20080250272LOGGING LAST RESOURCE SYSTEM - A logging last resource (LLR) system can provide a transaction log and transaction data to a LLR resource after a number of two-phase-commit resources have been prepared. The LLR resource manager can operate on the transaction log and transaction data in an atomic fashion so that the local commit can be done. The local commit can be done by the LLR manager in an atomic manner.10-09-2008
20080229147DATA PROTECTION SYSTEM - The present invention provides systems and methods for logically organizing data for storage and recovery on a data storage medium using a multi-level format. The present invention also provides systems and methods for protecting data stored on data storage medium so that the data may be recovered without errors.09-18-2008
20110246821RELIABILITY SCHEME USING HYBRID SSD/HDD REPLICATION WITH LOG STRUCTURED MANAGEMENT - In one embodiment, a method of storing data includes storing a first copy of data in a solid state memory and storing a second copy of the data in a hard disk drive memory substantially simultaneously with the storing the first copy. In another embodiment, a system for storing data includes a solid state memory, at least one hard disk drive memory, and a controller for controlling storage of data in the solid state memory and the hard disk drive memory. Other methods, systems, and computer program products are also described according to various embodiments.10-06-2011
20130179728REPAIR METHOD AND DEVICE FOR ABNORMAL-ERASE MEMORY BLOCK OF NON-VOLATILE FLASH MEMORY - A repair method for an abnormal-erase memory block of a non-volatile flash memory is provided. The method includes steps of: sequentially scanning bit data in a page of a block when reading data in a NAND flash; determining whether the page is an abnormal-erase page; setting logic “0” bit data in the page to logic “1” when the page is an abnormal-erase page; and re-erasing the block.07-11-2013
20120254658MICROCOMPUTER AND METHOD OF OPERATION THEREOF - Disclosed is a microcomputer such that even when a program cannot be executed in a CPU of the microcomputer due to an external noise, an unstable power-supply voltage, and other causes, and an fatal error such as runaway occurs, returning to the original state is possible within an extremely short time while preferably avoiding initialization of the entire system. During execution of normal software processing, an interrupt signal and a reset signal are output at an arbitrary time, and if it is determined that a CPU of a microcomputer gets into a runaway state, data which has been stored in a RAM as recovery information is read out, and the CPU is recovered to the state before the runaway. Because such recovery from a fatal error occurs within a short time, software which is being executed can continue its processing as if the fatal error had not occurred.10-04-2012
20080215916TEMPLATE BASED PARALLEL CHECKPOINTING IN A MASSIVELY PARALLEL COMPUTER SYSTEM - A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel variation of the rsync protocol, and network broadcast. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed to a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.09-04-2008
20130091381TERMINAL RECOVERY METHOD, TERMINAL RECOVERY SYSTEM, AND PROGRAM FOR THE SAME - The operator terminal receives input of the terminal status of the recovery target terminal 04-11-2013
20110314327DETERMINING THE CAUSE OF SERIALIZATION FAILURES - A method, computer program product, and system determining the cause of serialization failures is described. A method may comprise, if a first object that has been serialized with all references to member fields by the first object removed passes deserialization, restoring, via at least one of a client electronic device and a server computer, a first reference to a first member field by the first object. The method may further comprise serializing, via at least one of the client electronic device and the server computer, the first object with the restored first reference to the first member field. The method may also comprise, if the serialized first object with the restored first reference to the first member field fails deserialization, determining, via at least one of the client electronic device and the server computer, that the first reference to the first member field by the first object causes the failure.12-22-2011
20100281300IMAGE EXCHANGE WITHOUT FULL MICR QUALIFICATION - A system and related methods of correcting errors during check or financial document processing by a bank of first deposit or other entity receiving a paper check or financial document, or by a second bank on whose accounts the checks were written. These corrections can be performed by the computer system of the bank of first deposit, the computer system of the second bank, or both. MICR or other data may be sent in electronic format from the bank of first deposit or other entity without qualification.11-04-2010
20110214014MICROPROCESSOR AND METHOD FOR DETECTING FAULTS THEREIN - A method for detecting microprocessor hardware faults includes sending at least one input signal to a logic block within the microprocessor, collecting an output response to the input signal from the logic block, and determining whether the output response matches an expected output response of the logic block.09-01-2011
20080201608RECOVERING FROM ABNORMAL INTERRUPTION OF A PARITY UPDATE OPERATION IN A DISK ARRAY SYSTEM - Data associated with the state of a parity update operation in a disk array system such as a RAID-6 system is stored during performance of the operation so that, in the event the operation is interrupted, recovery may be initiated using the stored data. The stored data may include a state indicator that is indicative of the status of the parity update operation, and snapshot data (e.g., a delta value indicative of a difference between new and old data) captured during the parity update operation.08-21-2008
20080201607DISASTER RECOVERY IN A DATA PROCESSING SYSTEM - The present invention relates to a method of disaster recovery in data processing systems and to a recovery system. The invention allows for easy, fast and reliable recovery of a data processing system in a disaster situation. Unmodified backup data is stored to a target data processing system, the hardware of the target data processing system being different from the hardware of the source data processing system, from which the backup data originated. The stored backup data is then adapted to the hardware of the target data processing system by a remote recovery system using previously obtained reference data.08-21-2008
20080201606Recovery Routine Masking and Barriers to Support Phased Recovery Development - A method, computer program product, and data processing system for providing optional exception recovery features in operating system kernel code are disclosed. In a preferred embodiment, a segment of mainline code may designate a recovery routine for that segment by calling a kernel service provided for that purpose. The kernel service pushes the address of the designated recovery routine, context, and re-entry point information corresponding to the segment to a recovery stack. An additional “footprint” region is also allocated on the recovery stack and used to store other state information needed for recovery. A mask value or barrier count value is also stored on the recovery stack to allow recovery to be disabled for non-recoverable routines.08-21-2008
20130151893CUSTOMER PREMISES EQUIPMENT DIAGNOSTIC, RECOVERY, AND REPORTING SYSTEMS AND METHODS - Exemplary customer premises equipment (“CPE”) diagnostic, recovery, and reporting systems and methods are disclosed herein. An exemplary method includes a technical support server subsystem aggregating, over time, technical support data representing technical issues of CPE devices and operations performed to resolve the technical issues, identifying a subset of the technical support data, and providing the identified subset of the technical support data to a CPE device for local storage by the CPE device, locally stored technical support data configured to be used by the CPE device to self-recover from a future technical issue associated with the CPE device. In certain embodiments, the CPE device may be configured to function as a media server device and/or as an intermediary technical support device at a customer premises. Corresponding methods and systems are also disclosed.06-13-2013
20100299559METHOD FOR PROCESSING THE VOLUME OF INFORMATION HANDLED DURING THE DEBUGGING PHASE OF OPERATIONAL SOFTWARE ONBOARD AN AIRCRAFT AND DEVICE FOR IMPLEMENTING THE SAME - A method for processing the volume of information handled during the debugging phase of an operational software onboard an aircraft includes: dividing the execution path of the operational software into functional intervals by placing progression points at each function of the program; placing control points associated with each progression point; normal execution of the program that includes: storing the execution state of the program at the location of each progression point, wherein the storage of an execution state results in the suppression of the execution state previously stored for said progression point; upon the detection of an error, searching the progression point corresponding to a faulty function; searching for a software start execution state; regenerating the start execution state; correcting the error in the faulty function; and re-executing the program.11-25-2010
20100318845MEMORY FAILURE RECOVERY METHOD, INFORMATION PROCESSING APPARATUS, AND PROGRAM - Upon occurrence of a memory error which is difficult to correct, CPU interrupts a process under execution in response to interrupt signal output from error detection device, and transfers the control to the OS. The OS references attributes of a page stored in a page frame which has suffered the memory error. When read-only is indicated, physical memory management table is updated to set the page frame, which has suffered the error, into a disabled state. Then, page table is updated such that a virtual page stored in the page frame which has suffered the error is not assigned to any page frame, followed by resumption of the execution of the process. After execution of the process is resumed, a page fault process is invoked to store the virtual page which has encountered the memory error in another normal page frame.12-16-2010
20130159767CLIENT SELECTABLE SERVER-SIDE ERROR RESOLUTION - An illustrative embodiment of a computer-implemented process for client selectable server-side data error resolutions receives a request from a client to perform an action on a server, identifies a data error during performance of the action of the request and generates a response including an error description and a resolution subset for the identified error. The computer-implemented process further sends a response to the client, receives a selected resolution returned from the client, and responsive to a determination the selected resolution associated with the token returned executes on the server, executes the selected resolution, associated with the token returned, on the server to correct the data error.06-20-2013
20130185590Method in a Gaming Machine for Providing Data Recovery - Disclosed is a gaming machine capable of data restoration.07-18-2013
20130191685PER-RANK CHANNEL MARKING IN A MEMORY SYSTEM - Channel marking is provided in a memory system that includes a memory channel with a plurality of memory devices. The memory devices are arranged into a first group of memory devices and a second group of memory devices. The memory system is configured to perform a method that includes determining that more than a threshold number of memory devices in the first group are failing. An error correction code (ECC) is configured to compensate for errors associated with memory devices in the first group on the memory channel and to perform error correction on errors associated with memory devices in the second group on the memory channel.07-25-2013
20130191686MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed, by which restoration and backup operations are performed for the mobile terminal. The present invention includes backing up data for at least one application included in a backup target terminal and restoring the data for the at least one application in a restoration target terminal, the restoring including the performing a basic restoration operation on the data related to the at least one application, determining whether a previously provided restoration error occurs in a data restoring process for a specific application among the at least one or more applications, and performing a restoration operation corresponding to the restoration error in accordance with a result of the determining.07-25-2013
20120290877ADJUSTING A DATA STORAGE ADDRESS MAPPING IN A MAINTENANCE FREE STORAGE CONTAINER - A maintenance free storage container includes a plurality of storage servers, wherein the maintenance free storage container allows for multiple storage servers of the plurality of storage servers to be in a failure mode without replacement. The maintenance free storage container further includes a container controller operable to establish a first mapping of a plurality of virtual storage servers to at least some of the plurality of storage servers and facilitate storage of encoded data slices in the at least some of the plurality of storage servers. The container controller is further operable to when evaluation of storage server utilization information triggers an adjustment, adjust the first mapping to produce a second mapping, facilitate storage of new encoded data based on the second mapping, and facilitate modification of storage of the encoded data slices stored in accordance with the first mapping based on the data storage adjustment criteria.11-15-2012
20120290876System and Method for Delivering Content Over a Multicast Network - A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session.11-15-2012
20120290875METHODS AND STRUCTURE FOR STORING ERRORS FOR ERROR RECOVERY IN A HARDWARE CONTROLLER - Methods and structure for providing methods and structure for recovering errors in a hardware controller after an overwrite event, such as the detection of another error. In this regard, a link layer of the hardware controller is configured with a register that persistently stores errors until a processor can address them. The link layer is adapted to establish a connection between an initiator and a target and detect errors associated with the connection. As each detected error is overwritten by a subsequently detected error, the link layer register persistently stores the detected errors associated with the connection for recovery after the detected error has been overwritten in the link layer at least until the error can be handled.11-15-2012
20120030511EFFICIENT FAILURE RECOVERY IN A DISTRIBUTED DATA STORAGE SYSTEM - A method is provided for efficiently recovering information in a distributed storage system where a list of values that should be stored on a storage device is maintained. A first convergence round is scheduled to be performed on the list of values to bring each value to an At Maximum Redundancy (AMR) state. A second convergence round is scheduled to be performed on the list by selecting a wait time interval from a predefined range of wait time intervals between starts of convergence rounds.02-02-2012
20120042206SAVING OPERATIONAL STATE OF OPEN APPLICATIONS WHEN UNEXPECTED SHUTDOWN EVENTS OCCUR - A method, system, and computer program product for saving the state of at least one open application on a data processing system when an event forces open applications to close. The method preferably includes a step of monitoring data processing system activities to detect an event indicative of a forthcoming system shutdown action, the system shutdown action including a command which forces closing of running applications. Responsive to detecting the event, execution of said shutdown action is suspended and the state of the at least one open application is recorded. An indication that a state of the at least one running application has been recorded for reuse is stored and, following the recording and storing steps, execution of said shutdown action is restored.02-16-2012
20120066546SYSTEM RECOVERY METHOD AND COMPUTING APPARATUS HAVING SYSTEM RECOVERY FUNCTION - A system recovery method and a computing apparatus having a system recovery function. The computing apparatus includes a first memory unit to store a general operating system (OS) in a system partition where a primary anti-virus program operates, and to store a recovery OS in a recovery partition where a secondary anti-virus program operates; a second memory unit to store firmware determining a booting partition of the computing apparatus; and a processor to control execution of the firmware to, when the system partition is infected by a virus and thus the computing apparatus does not boot to the general OS, boot the computing apparatus to the recovery OS, and to control recovery of the system partition.03-15-2012
20120096310REDUNDANCY LOGIC - A network system provides network device having a secondary memory that mirrors the content of a primary memory maintaining data structure parameters entries. The integrity of each data structure parameter entry is tested as the entry is output from the primary memory, such as by using a parity test. If an error is detected in the entry, a corresponding entry from the second memory structure is select for use instead of the entry from the primary memory. The corresponding entries in each memory are then flushed, updated, synchronized, or overwritten from the each memory and processing continues using the new entries or other entries from the primary memory. In the rare instance that corresponding entries from both memories exhibit an error, then an error notification is issued.04-19-2012
20130212431METHOD AND SYSTEM FOR PROVIDING A SMART MEMORY ARCHITECTURE - A smart memory system preferably includes a memory including one or more memory chips, and a processor including one or more memory processor chips. The processor may include a common address/data/control memory bus that is configured to provide an asynchronous handshaking interface between the memory array and the memory processor. The processor can offload error data from the memory chip for analysis, and can store poor retention bit address information for memory refreshing in a non-volatile error retention memory. Program logic can also be included for memory address re-configuration. Power management logic can also be included, which may have a process-voltage-temperature compensation voltage generator for providing stable and constant read currents. An asynchronous handshaking interface is provided between the memory array and the memory processor. Write error tagging and write verification circuits can also be included.08-15-2013

Patent applications in class State recovery (i.e., process or data file)

Patent applications in all subclasses State recovery (i.e., process or data file)