Abstract:
Detection section (110) detects a touch on information processing apparatus (100). Control section (120) performs control based on the touch detected by detection section (110) and ignores the result detected by detection section (110) according to a period of time during which the touch position detected by detection section (110) has not moved.
Abstract:
A method of data progression in a data storage system having at least two tiers of storage space. A first tier may include storage space in a SLC SSD and a second tier may include storage space in a MLC SSD. The method may include setting a predetermined free space threshold for the first tier of storage space, monitoring free space in the first tier of storage space, and when the amount of available free space in the first tier of storage space decreases to the predetermined free space threshold, generating an on-demand snapshot of at least a portion of the data of the first tier of storage space by designating that data as read-only. The on-demand snapshot may then be transferred to the second tier of storage space, thereby freeing the corresponding portion of data of the first tier of storage space for new writes.
Abstract:
A method includes sending a set of destructive modification requests to a set of storage units regarding a set of encoded data slices. The method further includes determining, by each storage unit of a decode threshold number of storage units of the set of storage units, whether to preserve a respective corresponding one of the decode threshold number of encoded data slices prior to executing a corresponding one of the set of destructive modification requests. When determined to preserve the respective corresponding one of the decode threshold number of encoded data slices, determining, by a first storage unit of the decode threshold number of storage units, to flag a first encoded data slice of the decode threshold number of encoded data slices or temporarily store a copy of the first encoded data slice. When determined to flag the first encoded data slice, flagging the first encoded data slice as preserved.
Abstract:
A method begins by a processing module of a dispersed storage network (DSN) ascertaining a decode threshold value for dispersed storage error encoding data for storage in storage units of the DSN. The method continues with the processing module determining a total width value for the dispersed storage error encoding based on the decode threshold value, a number of selected sites within the DSN, and a number of selected storage units of the selected sites. The method continues with the processing module determining logical storage slots within the selected storage units based on the total width value, the number of selected, and the number of selected storage units. The method continues with the processing module writing a set of encoded data slices to a total width value of the logical storage slots within at least some of the selected storage units of the selected sites based on a slice-to-slot mapping.
Abstract:
An information handling system includes a method for detecting a predictive failure indication for a predictive failure indicated physical disk of a disk group, determining an amount of used storage capacity of a lowest capacity physical disk of the disk group, and comparing a replacement storage capacity of a replacement physical disk to the used storage capacity. When the replacement storage capacity is greater than or equal to the used storage capacity even if the replacement storage capacity is less than a lowest storage capacity of the lowest capacity physical disk of the disk group, replacing the predictive failure indicated physical disk with the replacement physical disk.
Abstract:
A method utilizes information provided by performance monitoring hardware to dynamically adjust the number of levels of speculative branch predictions allowed (typically 3 or 4 per thread) for a processor core. The information includes cycles-per-instruction (CPI) for the processor core and number of memory accesses per unit time. If the CPI is below a CPI threshold; and the number of memory accesses (NMA) per unit time is above a prescribed threshold, the number of levels of speculative branch predictions is reduced per thread for the processor core. Likewise, the number of levels of speculative branch predictions could be increased, from a low level to maximum allowed, if the CPI threshold is exceeded or the number of memory accesses per unit time is below the prescribed threshold.
Abstract:
Systems, methods and/or devices are used to reduce declared capacity of non-volatile memory of a storage device in a storage system. In one aspect, the method includes, detecting an amelioration trigger for reducing declared capacity of non-volatile memory of a storage device of the storage system, and in accordance with the detected amelioration trigger, performing an amelioration process to reduce declared capacity of the non-volatile memory of the storage device, the performing including reducing a range of logical addresses of a logical address space available to a host. In some embodiments, the storage device includes one or more flash memory devices. In some embodiments, the detecting, the performing, or both are performed by the storage device, or by one or more subsystems of the storage system distinct from the storage device, or by the host.
Abstract:
A mechanism of monitoring activity on a computer which may be applied to measuring the performance of the computer. The computer is configured to track a first set of information relating to at least a first occurrence of at least one scenario on the computer. At least some of the first set of information is evaluated to make a determination about the first occurrence of the scenario. Based on that determination, the computer may be configured to track a second set of information relating to at least a second occurrence of the scenario on the computer, in which the second set of information includes at least some types of information not tracked in the first set of information. The second set of information can then be evaluated.
Abstract:
Profile data collected through sampling is transformed and visually and interactively manipulated and displayed. In one scenario, the profile data is collected through statistical profiling of a program for a video game. The game program profile data is visually and interactively manipulated and displayed to visually present a dynamic behavior of the video game that shows correlation of impacts that the functions of the program have on the video game's performance. This allows the developer to identify inefficient sections of the program for optimization.
Abstract:
In a method for processing work items that have not been completed by a first escalation, a computer determines that the first escalation failed to complete execution, processed fewer work items than the first escalation is configured to process, or completed execution beyond an allotted processing time. The computer duplicates the first escalation to form a second escalation. In addition, the computer configures the second escalation to process the work items that have not been completed by the first escalation. Furthermore, the computer disables the first escalation and activates the second escalation to process the work items that have not been completed by the first escalation.