摘要:
A system for remediating a recovery process such as a migration of data includes an event database, a monitoring component, programmed to: monitor a source device to detect an initiation of a recovery process, wherein the recovery process is migration of application data from the source device to a target device, an analysis component programmed to: monitor the event database to detect a new event entry, wherein the event entry is associated with the recovery process of the source device, make a determination that the new event entry is associated with a failure event, based on the determination, provide the new event entry to a remediating component, programmed to obtain a recommendation for remediation based on the failure event and initiate the remediation based on the recommendation for remediation.
摘要:
Systems and methods herein save one or more parameters related to NVMe® data in one or more memory mapped files or in shared memory region(s). When a storage target experiences an interrupt event (e.g., loss of connectivity, system crash, application crash, etc.), the storage target may be restarted (e.g., a new instance formed in the case of a software-defined storage target) that uses the stored parameter data to recreate the controller context (e.g., NVMe® controller and TCP (transmission control protocol) connection), and the storage target may resend the last TCP acknowledgement, thereby causing the host to send or resend any NVMe/TCP data that follows the last successfully received NVMe/TCP data—thus, any data that the host sent during the storage target down time, which may have been lost, is re-sent. Embodiments keep a host unaware of a storage target interrupt and remove the need for TCP reestablishment.
摘要:
Systems and methods for reducing problems and disadvantages associated with traditional approaches to providing accessibility and redundancy for access controller storage media are provided. A method for providing accessibility for storage media of an access controller in an information handling system may include: (i) emulating the storage media such that the storage media appears to an operating system executing on the information handling system as storage media locally attached to the information handling system; (ii) mounting the storage media such that data may be communicated between the storage media and a processor integral to the access controller; (iii) mounting a portion of a network-attached storage remote to the information handling system such that data may be communicated between the portion of the network-attached storage and the processor; and (iv) maintaining redundancy between the storage media and the portion of network-attached storage in accordance with a redundancy policy.
摘要:
A method for managing a data center includes: intercepting a data transfer request; making a determination that the request is valid; initiating, based on the determination, a data transfer operation by sending a notification to a client; analyzing a data package to infer components of the package, in which the package comprises data chunks and client-based hash values (CBHVs) associated with the data chunks; generating, based on the analysis, data center-based hash values (DCHVs) corresponding to the data chunks; populating a hash mapping lookup table to store the CBHVs and DCHVs; obtaining storage location information of the data chunks from storage; updating, based on the information, a storage location map; and initiating notification of a user of the client about completion of the operation.
摘要:
Currently, there is no scalable methodologies defined to locate a namespace on an NVMe-oF fabric. Therefore, it is necessary to configure a host with the NVMe™ Qualified Name (NQN) and transport information of the storage subsystem where the boot namespace is located or discover and enumerate all namespaces available to the host on an NVMe-oF fabric. With the current protocols, a host may need to perform many operations to locate the proper namespace and boot from the NVMe-oF fabric, making booting in a SAN environment an extremely slow operation and computationally expensive process. Embodiments herein support discovery, via a discovery controller, to provide a namespace resolution service able to facilitate a host to efficiently resolve a given namespace identifier to the corresponding subsystem port(s) through which that namespace is accessible.
摘要:
Embodiments of the present disclosure relate to a task processing method, a task processing device, and a computer program product. The method includes: receiving a task to be processed by a first neural network at a first computing node; determining that the first neural network failed to process the task; and sending the task to a second computing node for processing by a second neural network at the second computing node, wherein compared with the first neural network, the second neural network has at least one of the following: higher processing consumption and higher processing performance. With the technical solution of the present disclosure, a task can be processed quickly and accurately using a neural network with low processing consumption.
摘要:
A receipt printer which includes a light source providing a beam, a light source movement mechanism which moves the beam between a first position and a second position, a laser mechanism which receives the beam when the beam is in the first position and uses the beam to print onto plain paper, and a thermal mechanism that receives the beam when the beam is in the second position and uses the beam to print onto thermal paper is disclosed.
摘要:
Embodiments presented herein solve issues related to non-volatile memory express (NVMe®) protocol differences from other protocols, such as Fibre Channel Common Transport, which is the protocol used for Zoning management in Fibre Channel. Fibre Channel Common Transport supports bidirectional transfers of data. However, NVMe® commands support transfer of data either with the command (e.g., host-to-controller data transfer (e.g., a “write” operation)) or with the response (e.g., controller-to-host data transfer (e.g., a “read” operation)), but not both creates a problem related to zoning in NVMe® networks. Furthermore, data size limits for submission queue entries and completion queue entries for NVMe® commands add other obstacles. Embodiments herein address these limitations.
摘要:
Techniques described herein relate to a method for performing pre-backup tasks. The method includes obtaining, by a proxy host, a snapshot request associated with an incremental backup of a file system stored in a network attached storage (NAS) from a backup manager; in response to obtaining the snapshot request: instantiating a NAS container to obtain a snapshot of the file system; providing the snapshot to the NAS container; after providing the snapshot to the NAS container: retrieving a previously generated slice list associated with the file system; identifying, using the slice list, changed data include in the file system; generating change rates associated with each slice; grouping the slices based on the change rates and group criteria to generate slice groups; generating an updated slice list specifying the slices and the slice groups; and providing the updated slice list to the backup manager.
摘要:
A method for provisioning a boot image includes receiving authentication information from an information handling system (IHS) over a network. The authentication information is associated with a user. The authentication information is sent to network services. Boot image information is received from the network services. The boot image information is associated with a boot image. The boot image is provisioned to the IHS over the network.