Abstract:
A testing methodology for very large scale integrated circuits, for example, microprocessors having several million transistors. Initially a set of pseudorandom test patterns is selected (12). During the design of the integrated circuit it is partitioned into functional units (10) and each unit is designed to be verified (14) and tested by the test patterns (13). During a test mode all of the units of the integrated circuit receives the test patterns in parallel (16). The output from each unit is coupled to a signature register. The contents of the signature registers are examined following application of the test pattern. This testing methodology lends itselt to the simultaneous testing of many integrated circuits.
Abstract:
This invention relates to a method and apparatus for robust delay fault testing of integrated circuits (IC) (22) with built-in self-testing. Hazardous nodes (28) of the IC (22) are determined. The topology of the IC (22) can be modified to include cut-point (23) at the hazardous nodes (28) of the circuit (22). Input (24) to the cut-point (23) is diverted to an observation point (30). A first output MISR (25) provides a signature for the outputs (27) of the IC (22). A cut-point multi-input signature register (MISR) (30) at the observation point generates a first signature. During testing a hazard-free input pattern is applied to the IC (22) and the generated first and second signatures are compared to known correct signatures.
Abstract:
A method for byzantine fault tolerant data replication with a plurality of 2f+1 data servers and one or more clients includes storing data in at least f+1 different data servers out of the 2f+1 data servers, and storing metadata of the stored data under a metadata-identifier in a metadata-service (MDS). The stored metadata includes a unique identifier of the stored data, a fingerprint of the stored data, and a list of the at least f+1 different data servers which have stored the data.
Abstract:
Systems, methods, and computer-readable storage media for inter-node data replication while reducing network traffic for remote backup. A system receives a command to duplicate a dataset, located on a source network node, to a remote network node, accesses, on the source network node, signatures of a previous snapshot of the dataset and signatures of a current snapshot of the dataset, performs, at the source network node, a local signature comparison between the previous snapshot and the current snapshot to identify one or more signatures that do not match, sends the signatures that do not match to the remote network node, searches, on the remote network node, for the signatures that do not match, and sends data associated with the signatures that do not match to the remote network node for incorporation within a current remote snapshot if they do not exist on a current remote network node.
Abstract:
An embodiment of the invention provides an apparatus and method for classifying a workload of a computing entity. In an embodiment, the computing entity samples a plurality of values for a plurality of parameters of the workload. Based on the plurality of values of each parameter, the computing entity determines a parameter from the plurality of parameters that the computing entity's response time is dependent on. Here, the computing entity's response time is indicative of a time required by the computing entity to respond to a service request from the workload. Further, based on the identified significant parameter, the computing entity classifies the workload of the computing entity by selecting a workload classification from a plurality of predefined workload classifications.
Abstract:
Embodiments are directed to locating and restoring backed up items using a custom schema and to efficiently transferring recovery data. In an embodiment, a computer system defines a schema that provides data search and retrieval among backup data sets. The schema stores searchable attributes for each database item and leverages a file system to store file system metadata for the data items of the backup sets. The computer system receives a request to find data items among the backup data sets and accesses the schema to determine, from the stored searchable attributes, which recovery points among the backup data sets include the requested data items. The computer system also restores the requested data items from the determined recovery point within the backup data sets.