-
公开(公告)号:US20240236179A1
公开(公告)日:2024-07-11
申请号:US18403626
申请日:2024-01-03
Applicant: Amazon Technologies, Inc.
Inventor: Eric Jason Brandwine , Kevin Christopher Miller , Andrew J. Doane
IPC: H04L67/1029 , G06F9/455 , G06F11/14 , G06F11/20 , H04L61/2503 , H04L61/5007 , H04L67/1097 , H04L101/668
CPC classification number: H04L67/1029 , G06F9/45533 , G06F9/45558 , G06F11/1484 , G06F11/2007 , H04L61/2503 , H04L61/5007 , H04L67/1097 , G06F2009/45562 , G06F11/2038 , G06F11/2048 , G06F11/2097 , G06F2201/85 , H04L2101/668
Abstract: Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.
-
公开(公告)号:US11927631B2
公开(公告)日:2024-03-12
申请号:US17777561
申请日:2020-05-06
Applicant: MORNINGCORE TECHNOLOGY CO., CHINA
Inventor: Shanzhi Chen , Guobin Su , Yun Yang
IPC: G01R31/3183 , G01R31/3167 , G01R31/317 , G01R31/3181 , G01R31/319 , G06F11/20 , G06F11/263 , G11C29/10 , H04B17/29 , H04L1/24
CPC classification number: G01R31/31835 , G01R31/3167 , G01R31/31703 , G01R31/31813 , G01R31/3183 , G01R31/318385 , G01R31/31908 , G06F11/2038 , G06F11/263 , G11C29/10 , H04B17/29 , H04L1/24 , H04L1/242 , H04L1/244
Abstract: Provided test method and apparatus of communication chip, device and medium. The test method of communication chip includes receiving end test method and transmitting end test method. The receiving end test method of the communication chip includes: an idle time slot of the receiving end of the communication chip is detected in a running process of the communication chip; a test vector is generated, and a standard result corresponding to the test vector is generated; a data frame containing the test vector is constructed, and the data frame is sent to the receiving end of the communication chip in the idle time slot to enable the receiving end of the communication chip to process the data frame; and a chip processing result uploaded by the receiving end of the communication chip is received, and the standard result is compared with the chip processing result.
-
公开(公告)号:US11892922B2
公开(公告)日:2024-02-06
申请号:US17789780
申请日:2020-12-30
Inventor: Zhixin Zhang , Jun Li , Zhixiao Li
CPC classification number: G06F11/2038 , G06F11/2025
Abstract: The present disclosure provides a state management method, a method for switching between a master application server and a backup application server, and an electronic device. In present disclosure, the management server updates the recorded backup application server state in time by querying for the connection state of the hot-backup connection between the master application server and the backup application server, and when the master application server is in failure, instead of immediately controlling the master application server and the backup application server to perform switching between the master and backup application servers, the management server controls the master application server and the backup application server to perform master-backup switching between the application servers according to the recorded backup application server state.
-
公开(公告)号:US20230315593A1
公开(公告)日:2023-10-05
申请号:US18331019
申请日:2023-06-07
Applicant: VMware, Inc.
Inventor: Keerthi Kumar , Halesh Sadashiv , Sairam Veeraswamy , Rajesh Venkatasubramanian , Kiran Dikshit , Kiran Tati
IPC: G06F11/20 , G06F15/173
CPC classification number: G06F11/2046 , G06F11/2094 , G06F15/17331 , G06F11/2023 , G06F11/2038 , G06F2201/85
Abstract: Techniques for implementing RDMA-based recovery of dirty data in remote memory are provided. In one set of embodiments, upon occurrence of a failure at a first (i.e., source) host system, a second (i.e., failover) host system can allocate a new memory region corresponding to a memory region of the source host system and retrieve a baseline copy of the memory region from a storage backend shared by the source and failover host systems. The failover host system can further populate the new memory region with the baseline copy and retrieve one or more dirty page lists for the memory region from the source host system via RDMA, where the one or more dirty page lists identify memory pages in the memory region that include data updates not present in the baseline copy. For each memory page identified in the one or more dirty page lists, the failover host system can then copy the content of that memory page from the memory region of the source host system to the new memory region via RDMA.
-
公开(公告)号:US11720456B2
公开(公告)日:2023-08-08
申请号:US17524199
申请日:2021-11-11
Applicant: Microsoft Technology Licensing, LLC
Inventor: Viktoriya Taranov , Daniel Blood , Alexander Hopmann , Sid R. Shah , Tarkan Sevilmis , Nikita Voronkov , Ramanathan Somasundaram , Artsiom Kokhan , Bhavesh Doshi
CPC classification number: G06F11/2038 , G06F11/2028 , G06F11/2097 , G06F11/1658 , G06F11/2046 , G06F11/2074
Abstract: A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.
-
公开(公告)号:US20230231872A1
公开(公告)日:2023-07-20
申请号:US18147478
申请日:2022-12-28
Applicant: Cyemptive Technologies, Inc.
Inventor: Stewart P. MacLeod , Robert Pike
CPC classification number: H04L63/145 , G06F11/2038 , G06F21/554 , G06F21/566 , H04L63/0236 , H04L63/1416
Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
-
公开(公告)号:US20230208909A1
公开(公告)日:2023-06-29
申请号:US18171260
申请日:2023-02-17
Applicant: Amazon Technologies, Inc.
Inventor: Eric Jason Brandwine , Kevin Christopher Miller , Andrew J. Doane
IPC: H04L67/1029 , G06F9/455 , G06F11/14 , H04L61/5007 , G06F11/20 , H04L61/2503 , H04L67/1097
CPC classification number: H04L67/1029 , G06F9/45558 , G06F11/1484 , H04L61/5007 , G06F11/2007 , G06F9/45533 , H04L61/2503 , H04L67/1097 , G06F2009/45562 , G06F11/2038 , G06F11/2097 , G06F11/2048 , H04L2101/668
Abstract: Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.
-
公开(公告)号:US20190095290A1
公开(公告)日:2019-03-28
申请号:US16185573
申请日:2018-11-09
Applicant: International Business Machines Corporation
Inventor: Jason K. Resch , Wesley Leggette
CPC classification number: G06F11/1464 , G06F3/0617 , G06F3/0619 , G06F3/0635 , G06F3/065 , G06F3/067 , G06F11/0709 , G06F11/0751 , G06F11/1076 , G06F11/2038 , G06F11/2048 , G06F11/2094 , G06F16/172 , G06F16/9535 , G06F2201/80 , G06F2211/1028 , H04L63/10 , H04L67/1097
Abstract: A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method continues with the processing module sending a DSN memory access request to the one of the plurality of DS processing modules. The method continues with the processing module selecting another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication. The method continues with the processing module sending the DSN memory access request to the another one of the plurality of DS processing modules.
-
公开(公告)号:US20190012238A1
公开(公告)日:2019-01-10
申请号:US15645540
申请日:2017-07-10
Applicant: International Business Machines Corporation
Inventor: Henry E. Butterworth , Yi Zhi Gao , Long Wen Lan
IPC: G06F11/14
CPC classification number: G06F11/1464 , G06F11/1451 , G06F11/1662 , G06F11/2025 , G06F11/2038 , G06F11/2048 , G06F11/2094 , G06F11/2097 , G06F16/128 , G06F2201/805 , G06F2201/82 , G06F2201/84
Abstract: Systems, computer program products, and methods that can integrate resources at a disaster recovery site are provided. One method includes generating, on a primary site, a set of storage snapshots based on combining another set of storage snapshots and incremental changes to mirrored data on a backup site in which the storage snapshots include a second snapshot format utilized on the backup site. The method further includes converting the set of storage snapshots from the second snapshot format to a first snapshot format utilized on the primary site to generate a yet another set of storage snapshots and converting, on the backup site, a set of storage snapshots including the incremental changes and the second snapshot format to the first snapshot format to generate still another set of eighth storage snapshots. The storage snapshots on both sites represent the same data in the same snapshot format without bulk data transfer.
-
公开(公告)号:US10061744B2
公开(公告)日:2018-08-28
申请号:US14858353
申请日:2015-09-18
Applicant: International Business Machines Corporation
Inventor: Mohammad Banikazemi , John Alan Bivens , Michael R. Hines
IPC: G06F11/00 , G06F15/173 , G06F11/16 , G06F11/20 , G06F11/14
CPC classification number: G06F15/17331 , G06F11/1407 , G06F11/1469 , G06F11/1484 , G06F11/1658 , G06F11/203 , G06F11/2038 , G06F11/2048 , G06F11/2097 , G06F2201/815 , G06F2201/84
Abstract: A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems.
-
-
-
-
-
-
-
-
-