Memory device and control method for memory device

    公开(公告)号:US11983068B1

    公开(公告)日:2024-05-14

    申请号:US18185855

    申请日:2023-03-17

    Inventor: Po-Yuan Tang

    CPC classification number: G06F11/1068 G06F2201/82

    Abstract: A memory device and a control method for the memory device are provided. When it is determined that a bit read from a memory cell in a memory cell array is an erroneous bit, the memory device triggers a second reading cycle. During the second reading cycle, if the bit read from the same memory cell is still an erroneous bit, the memory cell is deemed to be a real defective memory cell. At this time, a repairing memory cell is selected from a repairing memory cell array to replace the real defective memory cell. The selected repairing memory cell and the real defective memory cell are coupled to the same word line.

    Restoration of a computing session
    13.
    发明授权

    公开(公告)号:US11921592B2

    公开(公告)日:2024-03-05

    申请号:US16947131

    申请日:2020-07-20

    Applicant: Google LLC

    Abstract: According to an aspect, a method of restoring a computing session includes receiving, over a network, session data from a server computer, where the session data includes information about at least one session item that is active during a computing session of a first computing device. The at least one session item includes at least one of a web application or a native application. The method includes restoring the at least one session item of the computing session on a second computing device based on the session data, where the at least one session item is arranged on a user interface of the second computing device according to a display arrangement that corresponds to a display arrangement of the at least one session item on a user interface of the first computing device.

    Enabling data integrity checking and faster application recovery in synchronous replicated datasets

    公开(公告)号:US11829607B2

    公开(公告)日:2023-11-28

    申请号:US17548990

    申请日:2021-12-13

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.

    FAST AND ACCURATE ANOMALY DETECTION EXPLANATIONS WITH FORWARD-BACKWARD FEATURE IMPORTANCE

    公开(公告)号:US20230376366A1

    公开(公告)日:2023-11-23

    申请号:US17992743

    申请日:2022-11-22

    CPC classification number: G06F11/006 G06N20/00 G06F2201/82

    Abstract: The present invention relates to machine learning (ML) explainability (MLX). Herein are local explanation techniques for black box ML models based on coalitions of features in a dataset. In an embodiment, a computer receives a request to generate a local explanation of which coalitions of features caused an anomaly detector to detect an anomaly. During unsupervised generation of a new coalition, a first feature is randomly selected from features in a dataset. Which additional features in the dataset can join the coalition, because they have mutual information with the first feature that exceeds a threshold, is detected. For each feature that is not in the coalition, values of the feature are permuted in imperfect copies of original tuples in the dataset. An average anomaly score of the imperfect copies is measured. Based on the average anomaly score of the imperfect copies, a local explanation is generated that references (e.g. defines) the coalition.

    Failover Methods and System in a Networked Storage Environment

    公开(公告)号:US20230325289A1

    公开(公告)日:2023-10-12

    申请号:US18208478

    申请日:2023-06-12

    Applicant: NETAPP, INC.

    Abstract: Failover methods and systems for a storage environment are provided. During a takeover operation to take over storage of a first storage system node by a second storage system node, the second storage system node copies information from a first storage location to a second storage location. The first storage location points to an active file system of the first storage system node, and the second storage location is assigned to the second storage system node for the takeover operation. The second storage system node quarantines storage space likely to be used by the first storage system node for a write operation, while the second storage system node attempts to take over the storage of the first storage system node. The second storage system node utilizes information stored at the second storage location during the takeover operation to give back control of the storage to the first storage system node.

    Data recovery bypassing protocol for cloud network storage system

    公开(公告)号:US11782778B2

    公开(公告)日:2023-10-10

    申请号:US17387986

    申请日:2021-07-28

    Inventor: Peng Xu

    Abstract: Methods and systems implement a data recovery bypassing protocol, by which a storage node of a cloud network may return a replica of lost data being recovered to timely service a read operation call from a computing node of the cloud network, without waiting for completion of a first, a second, and a third recovery function. Storage devices implement asynchronous event reporting (“AER”) protocol between a storage engine and storage devices of the storage node. Within a storage device, an AER generation protocol enables a storage controller and a flash memory cell array of the storage device to intercommunicate, and enables the storage controller to generate AER messages. By bypassing secondary recovery, the computing node may successfully read lost data from many or all storage nodes of the cloud network, thus completing read operation calls without suffering milliseconds in performance loss and blocking, averting observable degradation of QoS of the overall computing system.

Patent Agency Ranking