scispace - formally typeset
Search or ask a question

Showing papers on "Data Corruption published in 2006"


Patent
27 Jun 2006
TL;DR: In this article, the authors describe a unique way for multiple processes to operate in parallel using (e.g., reading, modifying, and writing to) the same shared data without causing corruption to the shared data.
Abstract: The present disclosure describes a unique way for each of multiple processes to operate in parallel using (e.g., reading, modifying, and writing to) the same shared data without causing corruption to the shared data. For example, each of multiple processes utilizes current and past data values associated with a global counter or clock for purposes of determining whether any shared variables used to produce a respective transaction outcome were modified (by another process) when executing a respective transaction. If a respective process detects that shared data used by respective process was modified during a transaction, the process can abort and retry the transaction rather than cause data corruption by storing locally maintained results associated with the transaction to a globally shared data space.

220 citations


Patent
31 Oct 2006
TL;DR: In this paper, the authors present a fault-tolerant, redundancy-based data storage system that relies on disk-controller-implemented error detection and error correction, at the disk-block level, and RAID-controller implemented data-redundancy methods, at both the disk and disk-stripe level.
Abstract: Various embodiments of the present invention provide fault-tolerant, redundancy-based data-storage systems that rely on disk-controller-implemented error detection and error correction, at the disk-block level, and RAID-controller-implemented data-redundancy methods, at the disk and disk-stripe level, in order to provide comprehensive, efficient, and system-wide error detection and error correction. Embodiments of the present invention use disk-level and stripe-level data redundancy to provide error detection and error correction for stored data objects, obviating the need for certain costly, intermediate levels of error detection and error correction commonly employed in currently available fault-tolerant, redundancy-based data-storage systems.

115 citations


Patent
Alexander Paley1
11 May 2006
TL;DR: In this paper, a method of managing page-based data storage media such as flash media, a system that uses the method, and a computer-readable storage medium bearing code for implementing the method are presented.
Abstract: A method of managing page-based data storage media such as flash media, a system that uses the method, and a computer-readable storage medium bearing code for implementing the method. For each page, a corresponding risk zone, of other pages whose data are put at risk of corruption if writing to the page is interrupted, is identified. When a page is selected for writing new data, the written pages in its risk zone are copied to a log. As necessary, corrupt data are replaced with corresponding data from the log.

57 citations


Proceedings ArticleDOI
09 Jul 2006
TL;DR: An information-theoretic model and theoretical framework is provided, and how recent breakthroughs such as the development of Raptor codes may play a part in future practical systems are discussed.
Abstract: Replication and error-correction are standard mechanisms to cope with data corruption. We consider how these two approaches can be combined for preservation of digital data. We provide an information-theoretic model and theoretical framework, and discuss how recent breakthroughs such as the development of Raptor codes may play a part in future practical systems.

20 citations


Patent
30 Nov 2006
TL;DR: In this article, the authors present a system for managing adjacent track interference in a hard drive, where the interference potential is ascertained in at least one track, and data corruption is averted via scrubbing data in the track with ascertained interference potential.
Abstract: Systems and methods for managing adjacent track interference in a hard drive. Adjacent track interference potential is ascertained in at least one track, and data corruption is averted via scrubbing data in at least one track with ascertained adjacent track interference potential.

13 citations


Patent
19 Jan 2006
TL;DR: In this article, a method for handling a fault in a storage system comprises maintaining data in a mass storage subsystem and providing access to the data on behalf of a client, and determining a severity of the fault, and selecting a course of action in response to the fault.
Abstract: A method for handling a fault in a storage system comprises maintaining data in a mass storage subsystem and providing access to the data on behalf of a client. The method further comprises detecting a fault in a volume of data stored in the mass storage subsystem, determining a severity of the fault, and selecting a course of action in response to the fault, based on the severity of the fault.

13 citations


Patent
20 Oct 2006
TL;DR: In this article, the authors identify valid data frames and corrupted data frames by measuring a data corruption level for each transmitted data frame, comparing the measured data corruption levels for each corrupted data frame to a data corrupted threshold, and reconstructing the corrupted data blocks having a corrupted level below the data corruption threshold.
Abstract: Methods for detecting and correcting data errors in an RF data link include identifying valid data frames and corrupted data frames by measuring a data corruption level for each transmitted data frame, comparing the measured data corruption level for each corrupted data frame to a data corruption threshold, reconstructing the corrupted data frames having a data corruption level below the data corruption threshold, reconstructing the data block using data from valid and reconstructed data frames, and/or verifying the data in the reconstructed data block.

11 citations


Patent
Oleg Kiselev1, Ronald S. Karr1
31 Oct 2006
TL;DR: In this article, a first read request is received from a computer system, and a copy of the requested data is returned from an alternate mirror of the data volume, rather than returning the same corrupted data stored in the one mirror.
Abstract: A first read request is received from a computer system. Data from one mirror of a data volume is returned to the computer system in response to receiving the first read request. The computer system may check the returned data to determine whether it is corrupted. If corrupted, the computer system sends a second read request for the same data. Rather than returning the same corrupted data stored in the one mirror, a copy of the requested data is returned from an alternate mirror of the data volume.

11 citations


Journal ArticleDOI
TL;DR: A specialized model checker was used to discover concurrency errors in a large preexisting code base that revealed race conditions that lead to data corruption errors whose detection would have been prohibitively expensive with conventional testing and QA methods.

6 citations


Patent
03 Feb 2006
TL;DR: In this paper, an apparatus, a computer device, a system, computer readable media and a method for using graphics processing unit (GPU)generated data to characterize the ability of a cable to reliably carry digitized video, among other things.
Abstract: Disclosed are an apparatus, a computer device, a system, computer readable media and a method for using graphics processing unit (“GPU”)-generated data to characterize, in-situ, the ability of a cable to reliably carry digitized video, among other things. In one embodiment, a computing device includes a processor coupled via a system bus to a graphics engine and a video cable-testing apparatus. This apparatus has an input port configured to couple to the digitized video cable to receive pixel data generated by the graphics engine. It also has a signal integrity evaluator (“SIE”) configured to identify the digitized video cable as the source an amount of data corruption, the amount of data corruption being a function of the pixel data. The signal integrity evaluator includes a classifier to classify the amount of data corruption into classes that each represents various degrees of degradation of the computer-generated video images.

5 citations


Patent
13 Feb 2006
TL;DR: A data storage system using flash storage maintains a status indicator corresponding to data written into the flash storage as mentioned in this paper, which indicates whether a disruption such as a power disruption or a device disconnection occurred when the data was being written into flash storage.
Abstract: A data storage system using flash storage maintains a status indicator corresponding to data written into the flash storage. The status indictor of the data indicates whether a disruption, such as a power disruption or a device disconnection, occurred when the data was being written into the flash storage. The data storage system determines whether the data may be corrupted based on one or more of the status indictors. The data storage system may make this determination at a selected time or after a power-up of the data storage system. If the data is determined to possibly be corrupted, the data storage system may optionally discard the corrupted data from the flash storage or flag the corrupted data for future removal.

01 Jan 2006
TL;DR: The findings confirm anecdotal evidence about data corruption in general practice systems and mandate 'fail safe' strategies in software and user-interface design.
Abstract: Background: Clinical information systems require good quality data if the potential for electronic decision support and population health research and development are to be realised. We examined the quality of data as part of the implementation of an academic community of practice. Objectives: To investigate the quality of data held within a common Australian desktop clinical system with a focus on issues related to data corruption. Methods: A case study design and participatory research approach. Database tables, data elements, linkages and the actual data were examined in a comprehensive approach to assess the integrity of the database architecture and the data. The conceptual framework to examine the quality and errors was based on error sources (input, system, output) and error types. Results: Data corruption was found in the file system. User input errors were most easily identified e.g. developing different but more clinically intuitive processes for patient identification instead of the software systems UR numbers. The errors were most common among 'complex' patients with many disease labels and medications. This, along with the difficulty in explaining some of the errors, suggests that there are elements of system errors at play. Discussion and conclusions: Our findings confirm anecdotal evidence about data corruption in general practice systems. Whilst a certain percentage may acceptable for population health information management, data corruption errors (or similar) are not acceptable for electronic decision support or linkage into wider health networks. For an average practice population of 4,500 patients, an error rate as low as 1% still indicates that up to 45 patients may be at risk. We must aim for 'zero error tolerance'. However, in the meantime, we need to do at least two things: (1) have a ready assessment of the extent of data corruption in existing systems and (2) mandate 'fail safe' strategies in software and user-interface design. Some of the building blocks that need to be in place are a common conceptual framework for errors, using incidence and severity of effect as basic starting points. A systematic approach to the examination and management of data quality in clinical systems through national quality assurance programmes would be beneficial.

Patent
11 May 2006
TL;DR: A method of managing page-based data storage media such as flash media, a system that uses the method, and a computer-readable storage medium bearing code for implementing the method.
Abstract: A method of managing page-based data storage media such as flash media, a system that uses the method, and a computer-readable storage medium bearing code for implementing the method. For each page, a corresponding risk zone, of other pages whose data are put at risk of corruption if writing to the page is interrupted, is identified. When a page is selected for writing new data, the written pages in its risk zone are copied to a log. As necessary, corrupt data are replaced with corresponding data from the log.

Patent
16 Apr 2006
TL;DR: In this paper, the authors present a method and system for checking the corruption of BIOS ROM data, which includes following mode: driving mode provide a access BIOS ROM's interface for the system; reading BIOSROM's data mode is used for reading data from the BIOS ROM; checking mode was used for comparing the checking data and the standard data and judging whether they are equal to determining the checking result.
Abstract: The present invention provides a method and system for checking the corruption of BIOS ROM data. By adding every bit data together could get a checking data, comparing the checking data with the standard data. Judging whether the bios data corruption or not from the comparing result. The invention includes following mode: driving mode provide a access BIOS ROM's interface for the system; reading BIOS ROM's data mode is used for reading data from the BIOS ROM; checking mode is used for comparing the checking data and the standard data and judging whether they are equal to determining the checking result; the checking result outputting mode is used to display the checking result.

Patent
11 May 2006
TL;DR: It’s time to dust off the china spoons and start using them again.
Abstract: 一种管理基于页的数据存储介质比如闪存介质的方法,使用该方法的系统以及承载着实施该方法的代码的计算机可读存储介质。 对于每页,如果向该页的写入被中断将使其它页数据面临被损坏风险,都识别出其他页的对应风险区。 选择了某页用于写入新数据时,其风险区中的已写入页将被复制到日志。 需要时以所述日志的对应数据替换被损坏的数据。