-
公开(公告)号:US11983068B1
公开(公告)日:2024-05-14
申请号:US18185855
申请日:2023-03-17
Inventor: Po-Yuan Tang
CPC classification number: G06F11/1068 , G06F2201/82
Abstract: A memory device and a control method for the memory device are provided. When it is determined that a bit read from a memory cell in a memory cell array is an erroneous bit, the memory device triggers a second reading cycle. During the second reading cycle, if the bit read from the same memory cell is still an erroneous bit, the memory cell is deemed to be a real defective memory cell. At this time, a repairing memory cell is selected from a repairing memory cell array to replace the real defective memory cell. The selected repairing memory cell and the real defective memory cell are coupled to the same word line.
-
公开(公告)号:US20240134753A1
公开(公告)日:2024-04-25
申请号:US18538108
申请日:2023-12-13
Applicant: Commvault Systems, Inc.
Inventor: Girish RAMOHALLI GOPALA RAO , Sunil Babu TELAGAMSETTI , Brahmaiah VALLABHANENI , David Alan OSHINSKY
CPC classification number: G06F11/1464 , G06F9/45558 , G06F11/1446 , G06F11/1451 , G06F16/214 , G06F16/285 , H04L67/10 , H04L67/30 , G06F2009/45562 , G06F2201/80 , G06F2201/82
Abstract: A streamlined approach enables customers to retain management control over their data in a database-as-a-service (“DBaaS”) setting, by providing managed backup copies outside cloud service providers' sphere of control. An illustrative data storage management system provides control over performing backup operations to generate managed backup copies, storing managed backup copies, recovering managed backup copies in whole or in part, migrating managed backup copies, and migrating DBaaS instances. Management control also extends to choices of where to store the managed backup copies, whether on the same cloud computing platform as the source DBaaS, on a different cloud computing platform, and/or in a non-cloud data center.
-
公开(公告)号:US11921592B2
公开(公告)日:2024-03-05
申请号:US16947131
申请日:2020-07-20
Applicant: Google LLC
Inventor: Xin Wang , Shihui Song , Aga Wronska
CPC classification number: G06F11/1469 , G06F8/61 , G06F9/452 , G06F11/1451 , G09G5/14 , H04L67/306 , G06F2201/82
Abstract: According to an aspect, a method of restoring a computing session includes receiving, over a network, session data from a server computer, where the session data includes information about at least one session item that is active during a computing session of a first computing device. The at least one session item includes at least one of a web application or a native application. The method includes restoring the at least one session item of the computing session on a second computing device based on the session data, where the at least one session item is arranged on a user interface of the second computing device according to a display arrangement that corresponds to a display arrangement of the at least one session item on a user interface of the first computing device.
-
公开(公告)号:US11909392B2
公开(公告)日:2024-02-20
申请号:US17296909
申请日:2019-11-27
Applicant: Google LLC
Inventor: Craig Gidney , Austin Greig Fowler
IPC: H03K19/003 , G06N10/00 , G06F8/20 , H03M13/00 , H03M13/29 , G06F11/00 , H03M13/03 , G06F111/10
CPC classification number: H03K19/003 , G06F8/20 , G06F11/004 , G06N10/00 , H03M13/033 , H03M13/2909 , H03M13/611 , G06F2111/10 , G06F2201/82
Abstract: Methods, systems, and apparatus for producing CCZ states and T states. In one aspect, a method for distilling a CCZ state includes preparing multiple target qubits, ancilla qubits and stabilizer qubits in a zero state, performing an X gate for each stabilizer qubit on multiple ancilla qubits or multiple ancilla qubits and one of the target qubits using the stabilizer qubit as a control, measuring the stabilizer qubits, performing, on each of the ancilla qubits, a Z1/4 gate and a Hadamard gate, measuring each of the ancilla qubits, performing, conditioned on each measured ancilla qubit state, a NOT operation on a selected stabilizer qubit, or a NOT operation on the selected stabilizer qubit and a Z gate on one or more respective target qubits, performing, on each target qubit and conditioned on a measured state of a respective stabilizer qubit, a Z gate on the target qubit, and performing an X gate on each of the target qubits.
-
公开(公告)号:US20240045777A1
公开(公告)日:2024-02-08
申请号:US18487569
申请日:2023-10-16
Applicant: Pure Storage, Inc.
Inventor: Jason K. Resch , Wesley B. Leggette , Ravi V. Khadiwala , Bruno H. Cabral
IPC: G06F11/20 , G06F3/06 , G06F11/10 , G06F9/50 , H04L67/1097
CPC classification number: G06F11/2094 , G06F3/0689 , G06F3/0619 , G06F3/065 , G06F3/067 , G06F3/064 , G06F11/1076 , G06F3/0653 , G06F3/0665 , G06F9/5016 , H04L67/1097 , G06F3/0631 , G06F3/0604 , G06F2201/82 , G06F2201/805
Abstract: A method for processing data access requests in a storage network. The method includes receiving, by one or more processing modules, a data access request for a data object. A plurality of encoded data slices corresponding to the data object are stored in a distributed manner among a plurality of storage units associated with a plurality of storage sites of the storage network. The method continues with the one or more processing modules selecting respective numbers of storage units at each of the plurality of storage sites to support the data access request. A first computing device that is associated with a first storage site of the plurality of storage sites is also selected to further process the data access request. The method continues with the one or more processing modules transmitting the data access request to the first computing device to be further processed.
-
16.
公开(公告)号:US11868641B2
公开(公告)日:2024-01-09
申请号:US18068926
申请日:2022-12-20
Applicant: EMC IP Holding Company LLC
Inventor: Itay Azaria , Kfir Wolfson , Jehuda Shemer , Saar Cohen
CPC classification number: G06F3/065 , G06F3/0611 , G06F3/0619 , G06F3/0679 , G06F11/1471 , G06F2201/82
Abstract: One example method includes intercepting an IO issued by an application, writing the IO and IO metadata to a splitter journal in NVM, forwarding the IO to storage, and asynchronous with operations occurring along an IO path between the application and storage, evacuating the splitter journal by sending the IO and IO metadata from the splitter journal to a replication site. In this example, sending the IO and IO metadata from the journal to the replication site does not increase a latency associated with the operations on the IO path.
-
17.
公开(公告)号:US11829607B2
公开(公告)日:2023-11-28
申请号:US17548990
申请日:2021-12-13
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/067 , G06F11/1662 , G06F11/2076 , G06F11/2082 , G06F2201/82 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
18.
公开(公告)号:US20230376366A1
公开(公告)日:2023-11-23
申请号:US17992743
申请日:2022-11-22
Applicant: Oracle International Corporation
Inventor: Ali Seyfi , Yasha Pushak , Sungpack Hong , Hesam Fathi Moghadam , Hassan Chafi
CPC classification number: G06F11/006 , G06N20/00 , G06F2201/82
Abstract: The present invention relates to machine learning (ML) explainability (MLX). Herein are local explanation techniques for black box ML models based on coalitions of features in a dataset. In an embodiment, a computer receives a request to generate a local explanation of which coalitions of features caused an anomaly detector to detect an anomaly. During unsupervised generation of a new coalition, a first feature is randomly selected from features in a dataset. Which additional features in the dataset can join the coalition, because they have mutual information with the first feature that exceeds a threshold, is detected. For each feature that is not in the coalition, values of the feature are permuted in imperfect copies of original tuples in the dataset. An average anomaly score of the imperfect copies is measured. Based on the average anomaly score of the imperfect copies, a local explanation is generated that references (e.g. defines) the coalition.
-
公开(公告)号:US20230325289A1
公开(公告)日:2023-10-12
申请号:US18208478
申请日:2023-06-12
Applicant: NETAPP, INC.
Inventor: Ratnesh Gupta , Kalaivani Arumugham , Ram Kesavan , Ravikanth Dronamraju
CPC classification number: G06F11/2069 , G06F11/2064 , G06F11/1662 , G06F2201/82 , G06F11/2058 , G06F11/2071 , G06F11/2082
Abstract: Failover methods and systems for a storage environment are provided. During a takeover operation to take over storage of a first storage system node by a second storage system node, the second storage system node copies information from a first storage location to a second storage location. The first storage location points to an active file system of the first storage system node, and the second storage location is assigned to the second storage system node for the takeover operation. The second storage system node quarantines storage space likely to be used by the first storage system node for a write operation, while the second storage system node attempts to take over the storage of the first storage system node. The second storage system node utilizes information stored at the second storage location during the takeover operation to give back control of the storage to the first storage system node.
-
公开(公告)号:US11782778B2
公开(公告)日:2023-10-10
申请号:US17387986
申请日:2021-07-28
Applicant: Alibaba Singapore Holding Private Limited
Inventor: Peng Xu
CPC classification number: G06F11/0727 , G06F11/0772 , G06F11/0793 , G06F11/2094 , G06F2201/82 , G11C16/26
Abstract: Methods and systems implement a data recovery bypassing protocol, by which a storage node of a cloud network may return a replica of lost data being recovered to timely service a read operation call from a computing node of the cloud network, without waiting for completion of a first, a second, and a third recovery function. Storage devices implement asynchronous event reporting (“AER”) protocol between a storage engine and storage devices of the storage node. Within a storage device, an AER generation protocol enables a storage controller and a flash memory cell array of the storage device to intercommunicate, and enables the storage controller to generate AER messages. By bypassing secondary recovery, the computing node may successfully read lost data from many or all storage nodes of the cloud network, thus completing read operation calls without suffering milliseconds in performance loss and blocking, averting observable degradation of QoS of the overall computing system.
-
-
-
-
-
-
-
-
-