Patent application number | Description | Published |
20130231755 | SENSOR FUSION ALGORITHM - Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device. | 09-05-2013 |
20130232280 | Sensor Fusion Algorithm - Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device. | 09-05-2013 |
20140012401 | Sensor Fusion Algorithm - Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device. | 01-09-2014 |
20140379942 | Computing Device and an Apparatus Having Sensors Configured for Measuring Spatial Information Indicative of a Position of the Computing Devices - Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device. | 12-25-2014 |
Patent application number | Description | Published |
20140372549 | LOAD BALANCING INPUT/OUTPUT OPERATIONS BETWEEN TWO COMPUTERS - Methods, apparatus and computer program products implement embodiments of the present invention that include identifying, by a first computer, multiple network paths to a second computer, and splitting an input/output (I/O) request for a logical volume stored on the second computer into sub-requests. A probe request defining an association between the I/O request and the sub-requests is conveyed to the second computer, and each of the sub-requests is assigned to a respective one of the multiple network paths. Each of the sub-requests are conveyed to the second computer via the assigned respective one of the multiple network paths, and the sub-requests are received by the second computer via the multiple network paths. The second computer performs the sub-requests in response to the association, and a result of each of the sub-requests is conveyed to the first computer via the assigned respective one of the multiple network paths. | 12-18-2014 |
20140372632 | IMPERSONATING SCSI PORTS THROUGH AN INTERMEDIATE PROXY - Methods, apparatus and computer program products implement embodiments of the present invention that include ascertaining, by a first storage system, a respective port identifier for each of one or more host ports defined to the first storage system for a logical volume stored on a second storage system. Examples of the port identifiers include WWPN and iSCSI iQN identifiers. A respective unique identifier is assigned to each of the ascertained one or more host ports, and for each of the one or more host ports, the respective port identifier and the assigned respective unique identifier are conveyed to the second storage system. Upon receiving, from one of the one or more host ports, an input/output (I/O) request for the logical volume, I/O request with the respective unique identifier of the one of the one or more host ports is conveyed to the second storage system. | 12-18-2014 |
20140372635 | UNIT ATTENTION PROCESSING IN PROXY AND OWNER STORAGE SYSTEMS - Methods, apparatus and computer program products implement embodiments of the present invention that include a storage device configured to store a logical volume mapped between a host computer and a computer having multiple initiator ports, and a processor configured to detect a unit attention condition for the logical volume. Examples of unit attention conditions for the logical volume include management operations on the logical volume and host requests for the logical volume. Upon detecting a unit attention condition, the processor can to generate a unit attention code and a respective unique serial number in response to detecting the unit attention condition, and upon receiving an input/output (I/O) request for the logical volume from a given initiator port, the processor can convey, to the given initiator port, the unit attention code and the respective unique serial number in response to the I/O request. | 12-18-2014 |
20140372636 | SAFELY MAPPING AND UNMAPPING HOST SCSI VOLUMES - Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a storage system, a change in a mapping of a logical volume to one or more host ports of a host computer communicating with the storage system via a storage area network (SAN). Subsequent to detecting the change, first and second input/output (I/O) requests for the logical volume are received from a given host port, and a first unit attention message is conveyed to the given host port in response to the first I/O request. A second unit attention message is conveyed to the given host port upon determining that the storage system received the second I/O request within a specific time period commencing upon receiving the first I/O request. However, the second I/O request can be performed if the storage system received the second I/O request subsequent to the specific time period. | 12-18-2014 |
20140372639 | ONLINE MIGRATION OF A LOGICAL VOLUME BETWEEN STORAGE SYSTEMS - Methods, apparatus and computer program products implement embodiments of the present invention that include configuring, by a source storage system, a logical volume to comprise source regions of the source storage system that have a mapping between a host computer and the source storage system, the source regions storing source data. The source data is copied from the source regions to target data in target regions of a target storage system, the target regions being in a one-to-one correspondence with the source regions, and the volume is reconfigured so that the target regions have the mapping between the host computer and the source storage system. In some embodiments, the mapping between the host computer and the source storage system comprises a first mapping, and upon reconfiguring the volume, a second mapping can be added between the host computer and the target storage system, and the first mapping can be deleted. | 12-18-2014 |
20140372640 | PROCESSING INPUT/OUTPUT REQUESTS USING PROXY AND OWNER STORAGE SYSTEMS - A first storage system is configured as a proxy for a logical volume stored on a second storage system. The first computer system receives an I/O request from a host computer for the logical volume, the host computer, and identifies a port on the second storage system for the I/O request. In some embodiments, the second storage system has multiple SCSI ports, and the identified port comprises a least busy SCSI port. A probe request verifying availability of the logical volume is conveyed to the identified port, and upon receiving a response from the second storage system verifying the availability of the logical volume for the I/O request, the I/O request is conveyed to the identified port, a result of the I/O request is received from the identified port, the result is conveyed to the host computer. | 12-18-2014 |
20150134615 | COPYING VOLUMES BETWEEN STORAGE POOLS - Methods, apparatus and computer program products implement embodiments of the present invention that include defining a source data volume including a first multiple of source snapshots, and storing the first multiple of the source snapshots in a first storage pool including a second multiple of storage regions having respective identifiers. Upon receiving a request to copy the source data volume to a target data volume in a second storage pool, a first given source snapshot including a first set of the storage regions is accessed, and a second given source snapshot preceding the first given source snapshot is identified, the second given source snapshot including a second set of the storage regions. A set difference of the second and the first sets of the storage regions is identified, respective identifiers of the set difference are stored to the target volume, and a target snapshot is created for the target volume. | 05-14-2015 |
20150154128 | PROCESSING INPUT/OUTPUT REQUESTS USING PROXY AND OWNER STORAGE SYSTEMS - A first storage system is configured as a proxy for a logical volume stored on a second storage system. A probe request verifying availability of the logical volume is conveyed to an identified port, and upon receiving a response from a second storage system verifying the availability of the logical volume for an I/O request, the I/O request is conveyed to the identified port, a result of the I/O request is received from the identified port, the result is conveyed to the host computer. | 06-04-2015 |
20150268868 | PROCESSING INPUT/OUTPUT REQUESTS USING PROXY AND OWNER STORAGE SYSTEMS - A first storage system is configured as a proxy for a logical volume stored on a second storage system in a distributed computing environment. A probe request verifying availability of the logical volume is conveyed to an identified port, and upon receiving a response from a second storage system verifying the availability of the logical volume for an I/O request, the I/O request is conveyed to the identified port, a result of the I/O request is received from the identified port, the result is conveyed to the host computer. | 09-24-2015 |