Electronic system with data refresh mechanism and method of operation thereof

Information

  • Patent Grant
  • 9269393
  • Patent Number
    9,269,393
  • Date Filed
    Monday, December 8, 2014
    9 years ago
  • Date Issued
    Tuesday, February 23, 2016
    8 years ago
Abstract
An apparatus includes: a media; a head configured to write data on the media; a read channel, coupled to the head, configured to detect servo data from the media; and control circuitry, coupled to the read channel, configured to: generate a position error signal (PES), associated with a write operation of an aggressor track, from the servo data, compare a first threshold to the PES for detecting a write unsafe condition, compare a second threshold, within the first threshold, to the PES for detecting a write squeeze condition, and control a refresh operation of a victim track based on at least one of the comparisons.
Description
TECHNICAL FIELD

An embodiment relates generally to an electronic system, and more particularly to a system for data refresh in data storage systems.


BACKGROUND

Modern consumer and industrial electronic devices require storage of information, such as digital photographs, electronic mail, calendar, or contacts. These devices can be electronic systems, such as notebook computers, desktop computers, servers, televisions, and projectors, and are providing increasing levels of functionality to support modern life. Preserving the user data stored in the storage devices is of the utmost importance.


Different approaches have been used to monitor the general condition of the stored data. With increasing areal density trade-offs are increasingly difficult and challenging to make. The primary purpose, of course, is to maintain high level of signal to noise ratio (SNR) for a given design with ever shrinking track pitch and the ability to stay on-track without increasing servo wedge overhead. In principle, the higher the track per inch (TPI) density, the harder it is to stay on-track without increasing the number of servo wedges, which increases the incidence of servo positional error signal (PES) related write aborts and potential adjacent track writes/corruptions.


A conventional defense to combat this type of data loss is to make the write unsafe (WUS) limit, which is used to abort a write, as small as possible without severely degrading write performance. With ever increasing TPI this capability can only shrink. Furthermore, similar condition can be created even without write abort. As long as there are small off-track writes (still within WUS limit), the adjacent track will likely be compromised.





BRIEF DESCRIPTION OF THE DRAWINGS


FIGS. 1A, 1B, and 1C show an operational diagram of an electronic system with data refresh according to one of the embodiments.



FIG. 2 provides an exemplary layout of a track group mechanism in an embodiment.



FIG. 3 is an exemplary layout of adjacent data tracks in an embodiment.



FIG. 4 provides an exemplary graphical representation of repositioning of the head on the data track in an embodiment of the electronic system of FIG. 1A.



FIG. 5 provides an exemplary graphical representation of repositioning of the head on the data track in an embodiment of the electronic system of FIG. 1A.





DETAILED DESCRIPTION

Storage systems can include storage devices, such as hard disk drives (HDD), solid state drives (SSD), hybrid drives, and optical storage devices. In order to maintain data integrity many of the storage devices perform off-line or background data verification and maintenance processes. These processes are typically interleaved with interface operations in order to minimize the latency seen by the storage system host.


While the background data verification and maintenance activity (collectively, “background scan activity”) is extremely beneficial, it nevertheless contributes to head wear and increased power consumption. Contemporary HDDs have shown over 60% of failed drives are due to head wear, as a result of excessive usage. As a result, a trade-off can be made in order to strike a balance between maintaining data integrity and over usage.


Some embodiments solve at least this problem by using the actual user reads in place of the background scan, thereby minimizing the needs to actually doing background scan. This mechanism can reduce the need to excessively scan the disk while in idle, thus extending the longevity of the data storage device by minimizing head wear/damage caused by the background scan. Further embodiments can also utilize media area reserved for system access, such as reserved space or boot sectors, without the need for background scan in the system spaces.


A need still remains for an electronic system as various embodiments with data management mechanisms for providing reliable data storage while not prematurely wearing out the head. In view of the ever-increasing commercial competitive pressures, along with growing consumer expectations and the diminishing opportunities for meaningful product differentiation in the marketplace, it is increasingly critical that answers be found to these problems. Additionally, the need to reduce costs, improve efficiencies and performance, and meet competitive pressures adds an even greater urgency to the critical necessity for finding answers to these problems.


Solutions to these problems have been long sought but prior developments have not taught or suggested any solutions and, thus, solutions to these problems have long eluded those skilled in the art.


Certain embodiments have other steps or elements in addition to or in place of those mentioned above. The steps or elements will become apparent to those skilled in the art from a reading of the following detailed description when taken with reference to the accompanying drawings.


The following embodiments are described in sufficient detail to enable those skilled in the art to make and use the various embodiments. It is to be understood that other embodiments would be evident based on the present disclosure, and that system, process, or mechanical changes can be made without departing from the scope of an embodiment.


In the following description, numerous specific details are given to provide a thorough understanding of the various embodiments. However, it will be apparent that the various embodiments can be practiced without these specific details. In order to avoid obscuring an embodiment, some well-known circuits, system configurations, and process steps are not disclosed in detail.


The drawings showing embodiments of the system are semi-diagrammatic, and not to scale and, particularly, some of the dimensions are for the clarity of presentation and are shown exaggerated in the drawing figures. Similarly, although the views in the drawings for ease of description generally show similar orientations, this depiction in the figures is arbitrary for the most part. Generally, the various embodiments can be operated in any orientation.


Referring now to FIGS. 1A, 1B, and 1C, therein are shown an operational diagram of an electronic system 100 according to an embodiment. The electronic system 100 can represent an apparatus for one various embodiments. An embodiment depicted in FIGS. 1A, 1B, and 1C is shown as a hard disk drive, as an example, although it is understood that the electronic system 100 as the embodiment can be a tape drive, a solid-state hybrid disk drive, or other magnetic media-based storage device. Further for example, the electronic system 100 can represent a desktop computer, a notebook computer, a server, a tablet, a television, a household appliance, or other electronic systems utilizing magnetic media-based storage.


In an embodiment the electronic system 100 includes a head 102 flying over a media 104. The head 102 can be mounted to a flex arm 118 attached to an actuator arm 122. The head 102 (FIG. 1B) can optionally include a laser 106 for heating the media 104 during part of a write process (e.g., the head is part of an Energy-Assisted Magnetic Recording (EAMR) drive). The flying height 108 can be adjusted (e.g., by use of a heater element in the head not shown in FIG. 1B) while writing data to the media 104 or as an error recovery process during reading from the media 104. Also in an embodiment of FIG. 1B, the head 102 comprises a write element 110 (e.g., an inductive coil) and a read element 112 (e.g., a magnetoresistive read element).


The media 104 is a structure for storing information. For example, the media 104 can be made of an aluminum alloy, ceramic/glass, or a similar non-magnetic material. The top and bottom surfaces of the media 104 can be covered with magnetic material deposited on one or both sides of the media 104 to form a coating layer capable of magnetization. As an example, the media 104 can be a disk platter for one embodiment of the electronic system 100 as a rotating storage system, such as a hard disk drive (HDD). As a further example, the media 104 can be a linear magnetic strip for one embodiment of the electronic system 100 as a linear storage system, such as a tape drive.


The laser 106, as an example, can be a laser diode or other solid-state based lasers. In addition, embodiments can employ any suitable techniques for focusing the laser 106 on the media 104, such as a suitable waveguide, magnifying lens, or other suitable optics. The laser 106 is increased to a write power in order to heat the disk, thereby decreasing the coercivity of the media 104 so that the data is written more reliably.


The spindle motor 114 can rotate the media 104, about a center of the media 104, at constant or varying speed 107. For illustrative purposes, the spindle motor 114 is described as a motor for a rotation, although it is understood that the spindle motor 114 can be other actuating motors for a tape drive, as an example.


As examples, a head actuation motor 130 can be a voice coil motor assembly, a stepper motor assembly, or a combination thereof. The head actuation motor 130 can generate a torque or force for positioning the head 102.


A tapered end of the flex arm 118 can include the head 102. The flex arm 118 can be mounted to the actuator arm 122, which is pivoted around a bearing assembly 126 by the torque generated by the head actuation motor 130. The head 102 can include a single instance of the write element 110 and a single instance of the read element 112 that is narrower than the write element 110. The head 102 can fly over the media 104 at a dynamically adjustable span of the flying height 108, which represents a vertical displacement between the head 102 and the media 104. The head 102 can be positioned by the flex arm 118 and the actuator arm 122 and can have the flying height 108 adjusted by control circuitry 138.


The head 102 can be positioned over the media 104 along an arc shaped path between an inner diameter of the media 104 and outer diameter of the media 104. For illustrative purposes, the actuator arm 122 and the head actuation motor 130 are configured for rotary movement of the head 102. The actuator arm 122 and the head actuation motor 130 can be configured to have a different movement. For example, the actuator arm 122 and the head actuation motor 130 could be configured to have a linear movement resulting in the head 102 traveling along a radius of the media 104.


The head 102 can be positioned over the media 104 to create magnetic transitions or detect magnetic transitions from the coating layer that can be used to representing written data or read data, respectively. The position of the head 102 and the speed 107 of the media 104 can be controlled by the control circuitry 138. Examples of the control circuitry 138 can include a processor, an application specific integrated circuit (ASIC) an embedded processor, a microprocessor, a hardware control logic, a hardware finite state machine (FSM), a digital signal processor (DSP), digital circuitry, analog circuitry, optical circuitry, or a combination thereof. The control circuitry 138 can also include memory devices, such as a volatile memory, a nonvolatile memory, or a combination thereof. For example, the nonvolatile storage can be non-volatile random access memory (NVRAM) or Flash memory and a volatile storage can be static random access memory (SRAM) or dynamic random access memory (DRAM).


A system interface 140 can couple the control circuitry 138 to a host electronics (not shown). The system interface 140 can transfer user data 142 between the host electronics and the control circuitry 138. The user data 142 can be encoded or decoded by the control circuitry 138 in preparation for transfer to or from the media 104.


The control circuitry 138 can be configured to control the spindle motor 114 for adjusting the speed 107 of the media 104. The control circuitry 138 can be configured to cause the head 102 to move relative to the media 104, or vice versa. The media 104 can include a plurality of servo wedges 113 that allow the control circuitry 138 to position the head 102 relative to data tracks 116. The control circuitry 138 can also be configured to control the flow of information to the head 102 for writing to the data tracks 116 of the media 104. The information sent to the head 102 can include the preconditioning pattern, direct current erase signals, user data, or a combination thereof.


In one embodiment, the electronic system 100 further comprises control circuitry 138 configured to execute the flow diagrams of FIG. 1C. As an example, blocks 144 to 150 can represent the flow diagram where an embodiment is employing a data management mechanism for maintaining data integrity.


Block 144 shows generating a position error signal (PES), associated with a write operation of an aggressor track, from the servo data. It is understood that the servo data is located in the servo wedges 113 and identifies the intended location of the data tracks 116. For the purpose of this disclosure, an aggressor track is a data track being written to in a write operation, during which encroachment to one or more tracks adjacent to the aggressor tracks may result. Those track(s) encroached upon are termed victim track(s).


Block 146 shows comparing a first threshold to the PES for detecting a write unsafe condition. In one embodiment, the detection of a write unsafe condition means that the data being written on a selected track has encroached on the track boundary and could be writing on an adjacent track by mistake.


Block 148 shows comparing a second threshold, within the first threshold, to the PES for detecting a write squeeze condition. The detection of a write squeeze condition means the writing of the selected track has approached the track boundary and the adjacent track might be impacted or corrupted. In one embodiment, the first threshold is greater in magnitude than the second threshold and thus the second threshold is said to be within a range of value covered by the first threshold, hence “within” the first threshold. In other embodiments, the relationship of the thresholds may be different (e.g., reversed), based on design and how PES is measured.


Block 150 shows controlling a refresh operation, of a victim track, based on at least one of the comparisons. A refresh operation of a victim track may require retrieving or reconstructing the data that was corrupted by the detection of the write squeeze or the write unsafe. The refresh of the data can allow the victim track to be rewritten in its original location, or moved to a different storage location.


It has been discovered that an embodiment of the electronic system 100 can provide a data refresh process in order to maintain the robustness of the data written to the data tracks 116 of the media 104. In one embodiment, any data that shows data errors or requires bit corrections can be isolated as a victim of adjacent track writes. The management of the refresh process for data that has been impacted by the adjacent track writes can be selectively triggered by the use of one or more PES thresholds by the control circuitry 138.


Referring now to FIG. 2, therein is shown an exemplary layout of a track group mechanism 201 in an embodiment. The exemplary layout of the track group mechanism 201 depicts the media 104 having a plurality of data tracks 116 partitioned adjacent to each other across the surface of the media 104. The data tracks 116 can be within a zone or a specific region of the data tracks 116 addressed by write operations.


In one embodiment, the media 104 can be partitioned into a plurality of groups 201, each one of the plurality of groups 201 can include the data tracks 116 or portions of the data tracks 116, which can also be referred to as wedges, sectors, zones, zip codes, data pages, super blocks, or bulk pages. By way of an example, five of the data tracks 116 are shown although it is understood that the entire capacity of the media 104 can be divided into the data tracks 116.


In an example embodiment, five of the data tracks 116 can be shown to demonstrate the type of adjacent track write errors that are possible within the electronic system 100 of FIG. 1A. It is understood that the data track 116 can also include a number of the servo wedges 113 of FIG. 1A that are not shown.


An example of an adjacent track write error 202A can be caused by lack of control of the head actuation motor 130, which can be due to residual inertia from a reposition of the head 102 of FIG. 1A, debris blocking the movement of the head 102, an environmental shock or vibration, or a combination thereof. The adjacent track write error 202A can be initiated on a first data track 204 positioned toward the outer diameter of the media 104. The adjacent track write error 202A can wander into a second data track 206 positioned adjacent to the first data track 204. The data that was previously written in the second data track 206 can be corrupted by the adjacent track write error 202A. The control circuitry 138 of FIG. 1A can detect the movement of the head 102 into the second data track 206 in order to abort the write operation by activating a write unsafe error.


In another example of the adjacent track write error 202B, a write operation to the second data track 206 can encroach a third data track 208. In the write operation of the second data track 206, a minor mis-position of the head 102 can go undetected by the control circuitry 138 but can alter the previously written data on the third data track 208 positioned adjacent to the second data track 206. With a minor encroachment of the previously written data of the third data track 208, caused by the write of the second data track 206, a data error might not be detected and the third data track 208 can be read normally. In a subsequent write operation of a fourth data track 210, a second minor encroachment 202C of the previously written data of the third data track 208 can create a write squeeze condition 212. The write squeeze condition 212 can sufficiently corrupt the previously written data of the third data track 208 to make it unreadable. In both instances the control circuitry 138 must provide a method to refresh the data that was corrupted by the encroachments. The write squeeze 212 can be difficult to detect because a position error signal (PES) in each encroachment 202B and 202C might be minor enough as to not activate a write unsafe condition. However, the combined effect may cause loss of data in the write squeeze condition 212 on the third data track 208.


In recovering from the write squeeze condition 212, the control circuitry 138 can perform a background task for refreshing the previously written data of the victim track, such as the third data track 208. The background task can reread the data at the site of the write squeeze condition 212 in order to correct the data, or the control circuitry can obtain the data already resident in a cache memory. The corrected data can be written in the original track location in the victim track or it can be relocated to a reserved space data track 214.


The reserved space data track 214 can be a fifth data track for moving any of the data that can be corrupted by any of the adjacent track write error 202. The reserved space data track 214 can be excess space beyond the user identified capacity of the media 104. It is understood that the positions of the data tracks 116 is an example only and any of the data tracks 116 in the media can be subject to the adjacent track write error 202. The position of the reserved space data track 214 is an example only and can be positioned anywhere in the media 104.


It is understood that the control circuitry 138 can establish a threshold for the PES that can detect the adjacent track write error 202 when the head 102 crosses into an adjacent or victim track. The detection of the write squeeze condition 212 can be more difficult to detect because it requires the recognition of multiple minor encroachments at the same radial position of the media. It is understood that, in one embodiment, each of the adjacent data tracks 116 can have an initial sector that is a linear offset from the last sector of the adjacent data track 116. The linear offset can allow a single track seek and settle prior to reaching the initial sector in order to optimize sequential write performance.


Referring now to FIG. 3, therein is shown an exemplary layout of adjacent data tracks 301 in an embodiment. The exemplary layout of the adjacent data tracks 301 can be substantially the same as one of the data tracks 116 of FIG. 1A.


In an embodiment, an aggressor track 302 can be the target of a sector write 304. A track encroachment 306 can be caused by debris on the media 104, residual inertia from a seek operation, an environmental shock or vibration. The track encroachment 306 can be of sufficient magnitude to corrupt the previously written data on a victim track 308. By way of an example, most instances of the track encroachment 306 can exist without alerting the control circuitry 138 or impacting the previously written data of the victim track 308. In some instances of the track encroachment 306, the control circuitry 138 can detect a write unsafe condition that indicates the head 102 has crossed into the victim track 308 and possibly corrupted the previously written data in the area of the track encroachment 306.


It is understood that the aggressor track 302 and the victim track 308 can have any adjacent orientation. The track encroachment 306 must occur during a write operation and can occur in any portion of the data track 116. It is further understood that the track encroachment 306 can be detected as a write unsafe condition or a write squeeze condition when the head 102 enters into the space of the victim track 308.


Referring now to FIG. 4, therein is shown an exemplary graphical representation 401 of repositioning of the head 102 of FIG. 1A on the data track 116 in an embodiment of the electronic system 100 of FIG. 1A. The exemplary repositioning of the head 102 on the data track 116 depicts a position error signal (PES) 402 for a seek and settle on the data track 116 in an embodiment of the electronic system 100. In one embodiment, the control circuitry 138 of FIG. 1A can perform a seek operation to one of the data tracks 116. Upon arriving at the data track 116, the PES 402 can be damped, such as having reduced amplitude from the center of the data track 116 as the head 102 moves in a first direction 404.


A track center 406 can be the region in which the position of the head 102, as indicated by the PES 402, can remain within the bounds of the data track 116. A first threshold 408 can be compared to the absolute value of the PES 402 for detecting a write unsafe condition during the write operation. In a mathematical sense, it is understood that the absolute value of the PES 402 during a pre-write settle 410 can have any value without setting an error condition. A write start 412 can mark the assertion of write gate to the head 102 by the control circuitry 138 and the monitoring of the location of the head 102 within the data track 116.


A write operation 414 can represent the critical time that the head 102 is actively altering the data on the media 104 of FIG. 1A. A second threshold 416, within the first threshold 408, can provide an early warning that the head 102 can be entering the space of a victim track (such as in the encroachment scenario of the victim track 308 of FIG. 3). An outer diameter drift (ODD) 418 can be detected when the value of the PES 402 is positive and exceeds the absolute value of the second threshold 416 during the write operation 414. The control circuitry 138 can record the location and direction of the victim track 308 during the ODD 418 for a background data refresh operation.


An inner diameter drift (IDD) 420 can be detected when the value of the PES 402 is negative and exceeds the absolute value of the second threshold 416 during the write operation 414. The control circuitry 138 can record the location and direction of the victim track 308 during the IDD 420 for future check conditions. In one embodiment, a write squeeze condition is detected when the control circuitry 138 detects the ODD 418 and the IDD 420 at a similar location of the victim track 308. This is similar to the previously described scenario in track 208 of FIG. 2. The write squeeze condition 212 of FIG. 2 is detected when a single victim track 208 is encroached by the aggressor tracks 206 and 210 of FIG. 2 from both sides of the victim track 208. The recording of locations and directions associated with the IDD and ODD events can enable tracking of write squeeze conditions and triggering of corrective actions.


It is understood that the control circuitry 138 can detect a direction of the victim track 308 based on the sign of the PES 402 when the first threshold 408 or the second threshold 416 is exceeded. The control circuitry 138 can maintain a count of the ODD 418 and the IDD 420 that occur on the victim track 308 and the data refresh operation can be prioritized based on the count. Depending on the threshold used to detect IDD or ODD (or any encroachment action in general), a different weight may be assigned to the count to influence the timing at which a corrective action is triggered. For example, a write with PES within the second threshold 416 may receive a count of N, while a write with PES exceeding the second threshold 416 but less than the first threshold 408 may receive a count of W1*N, where W1 is a weight multiplier, and a write with PES exceeding the first threshold 408 may receive a count of W2*N, where W2 is a weight multiplier greater than W1.


In one embodiment, a pre-defined aggregate threshold based on the weights and/or counts that are tracked over a period of time can be used to trigger the corrective action(s). The aggregate threshold may be set, for instance, to trigger corrective action(s) when a tracked (weighted) count exceeds the aggregate threshold for a track, or for a group of tracks. In one embodiment, corrective actions may be triggered based more generally on tracked events such as the first/second PES thresholds being exceeded, apart from the example weighted count schemes described above.


Corrective actions may take many forms. For example, the control circuitry 138 can monitor the occurrence of the ODD 418 and the IDD 420 in order to adjust the pre-write settle 410. By increasing the pre-write settle 410, a reduced number of the ODD 418 and the IDD 420 can be achieved. In another example, the control circuitry 138 can perform a data refresh operation in order to verify, restore, or relocate the data on the victim track 308. If the data from the victim track 308 must be relocated, it can be written on the same data track 116 or it can be moved to the reserved space data track 214 of FIG. 2. In yet another example, additional writes to a track or group of tracks where the pre-defined aggregate threshold has been exceeded may be deferred until a corrective data refresh operation has been performed. Also, a combination of these corrective actions may be performed in some embodiments. Also, depending on the embodiments, the corrective actions may take place as background tasks or be performed substantially immediately.


It is understood that the position of the first threshold 408 and the second threshold 416 within the data track 116 is an example only. It is also understood that additional thresholds can be implemented as the width of the data track 116 continues to shrink and the position of the head 102 becomes increasingly critical.


Referring now to FIG. 5, therein is shown an exemplary graphical representation 501 of repositioning of the head 102 of FIG. 1A on the data track 116 in an embodiment of the electronic system 100 of FIG. 1A. The exemplary graphical representation 501 depicts the detection of a write unsafe condition 502.


The exemplary repositioning of the head 102 on the data track 116 depicts the PES 402 for a seek and settle on the data track 116 in an embodiment of the electronic system 100. In one embodiment, the control circuitry 138 of FIG. 1A can perform a seek operation to one of the data tracks 116. Upon arriving at the data track 116, the PES 402 can be damped, such as having reduced amplitude from the center of the data track 116 as the head 102 moves in the first direction 404.


The track center 406 can be the region in which the position of the head 102, as indicated by the PES 402, can remain within the bounds of the data track 116. The first threshold 408 can be compared to the absolute value of the PES 402 for detecting the write unsafe condition 502 during the write operation 414. It is understood that the absolute value of the PES 402 during the pre-write settle 410 can have any value without setting an error condition. By extending the duration for pre-write settle 410, the head 102 can be less susceptible to exceeding the second threshold 416 and the first threshold 408. The write start 412 can mark the assertion of write gate to the head 102 by the control circuitry 138 and the monitoring of the location of the head 102 within the data track 116.


The write operation 414 can represent the head 102 actively altering the data on the media 104 of FIG. 1A. The second threshold 416, within the first threshold 408, can provide an early warning that the head 102 can be entering the space of the victim track 308 of FIG. 3. The outer diameter drift (ODD) 418 can be detected when the value of the PES 402 is positive and exceeds the second threshold 416 during the write operation 414. The control circuitry 138 can record the location and direction of the victim track 308 during the ODD 418 for future check conditions. When the PES 402 exceeds the second threshold 416 and continues to exceed the first threshold 408, the write unsafe condition 502 is detected. The assertion of the write unsafe condition 502 can cause a write terminate 504 to be initiated. The write terminate 504 can negate the write gate to the head 102 in order to stop any further damage to the victim track 308 and pause the write operation 414. The write terminate 504 can initiate an immediate refresh operation of the data on the victim track 308 prior to completing the paused write operation 414.


The inner diameter drift (IDD) 420 can be detected when the value of the PES 402 is negative and its absolute value exceeds the second threshold 416 during the write operation 414. The control circuitry 138 can record the location and direction of the victim track 308 during the IDD 420 for future processing.


It is understood that the control circuitry 138 can detect a direction of the victim track 308, relative to the aggressor track, based on the sign of the PES 402 when the first threshold 408 or the second threshold 416 is exceeded. It is understood that the position of the first threshold 408 and the second threshold 416 within the data track 116 is an example only. It is also understood that additional thresholds can be implemented as the width of the data track 116 continues to shrink and the position of the head 102 becomes increasingly critical.


For example, a third threshold 506 can be positioned between the first threshold 408 and the second threshold 416. The third threshold 506 can indicate the position of the head 102 as it starts an off-track write 508. The position of the third threshold 506 can be dependent on the physical dimensions of the head 102 and the data track 116. The control circuitry 138 can add the location detected as the off-track write 508 to a track count for the background data refresh operation. The off-track write 508 is considered more damaging that the ODD 418 or the IDD 420 because the head 102 is known to have altered the data on the victim track 308. The off-track write 508 is less damaging than the write unsafe condition 502 because the head 102 does not travel as far into the victim track 308 on the off-track write 508.


The control circuitry 138 can assign different weights to each of the conditions. The control circuitry 138 can perform a background data refresh operation in order to verify, restore, or relocate the data on the victim track 308 as a result of the off-track write, the ODD 418, and the IDD 420. The off-track write 508 can be assigned a greater weight to the ODD 418 or the IDD 420, because there is a higher probability of data corruption on the victim track 308. If the data from the victim track 308 must be refreshed, it can be written on the same data track 116 or it can be moved to the reserved space data track 214 of FIG. 2. Any occurrence of the write unsafe condition 502 requires an immediate data refresh operation to recover the data on the victim track 308.


The electronic system 100 has been described with module functions or order as an example. The electronic system 100 can partition the modules differently or order the modules differently. For example, the sequence of actions shown in FIG. 1C may be different in some embodiments, with some actions omitted and/or combined. As another example, the LBA number could be derived from the servo wedges 113 information read from the data track 116 on the media 104 and passed through the read channel 134 of FIG. 1A. As yet another example, while the description of various embodiments uses the examples of the data tracks 116 from a magnetic rotating media, some embodiments are applicable to data stored on any media, including blocks/pages of data stored in solid-state memory.


The modules described in this application can be implemented as instructions stored on a non-transitory computer readable medium to be executed by the control circuitry 138 in the electronic system 100. The non-transitory computer medium can include the memory of the integrated circuit in the electronic system 100. The non-transitory computer readable medium can include non-volatile memory, such as a hard disk drive, non-volatile random access memory (NVRAM), solid-state storage device (SSD), compact disk (CD), digital video disk (DVD), or universal serial bus (USB) flash memory devices. The non-transitory computer readable medium can be integrated as a part of the electronic system 100 or installed as a removable portion of the electronic system 100.


Any suitable control circuitry may be employed to implement the flow diagrams in the above embodiments, such as any suitable integrated circuit or circuits. For example, the control circuitry may be implemented within a read channel integrated circuit, or in a component separate from the read channel, such as a disk controller, or certain operations described above may be performed by a read channel and others by a disk controller. In one embodiment, the read channel and disk controller are implemented as separate integrated circuits, and in an alternative embodiment they are fabricated into a single integrated circuit or system on a chip (SOC). In addition, the control circuitry may include a suitable preamp circuit implemented as a separate integrated circuit, integrated into the read channel or disk controller circuit, or integrated into a SOC. In addition, any of the above described modules and components may be implemented in firmware, software, hardware, or any combination thereof.


In one embodiment, the control circuitry comprises a microprocessor executing instructions, the instructions being operable to cause the microprocessor to perform the flow diagrams described herein. The instructions may be stored in any computer-readable medium. In one embodiment, they may be stored on a non-volatile semiconductor memory external to the microprocessor, or integrated with the microprocessor in a SOC. In another embodiment, the instructions are stored on the disk and read into a volatile semiconductor memory when the disk drive is powered on. In yet another embodiment, the control circuitry comprises suitable logic circuitry, such as state machine circuitry.


The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method, event or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate. For example, described tasks or events may be performed in an order other than that specifically disclosed, or multiple may be combined in a single block or state. The example tasks or events may be performed in serial, in parallel, or in some other manner. Tasks or events may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.


While certain example embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions disclosed herein. Thus, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module, or block is necessary or indispensable. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the embodiments disclosed herein.


The resulting method, process, apparatus, device, product, and/or system is straightforward, cost-effective, uncomplicated, highly versatile, accurate, sensitive, and effective, and can be implemented by adapting known components for ready, efficient, and economical manufacturing, application, and utilization. Another important aspect of various embodiments is that they valuably supports and services the historical trend of reducing costs, simplifying systems, and increasing performance.


These and other valuable aspects of the various embodiments consequently further the state of the technology to at least the next level.


While the various embodiments have been described in conjunction with a specific best mode, it is to be understood that many alternatives, modifications, and variations will be apparent to those skilled in the art in light of the aforegoing description. Accordingly, the embodiments are intended to embrace all such alternatives, modifications, and variations that fall within the scope of the included claims. All matters set forth herein or shown in the accompanying drawings are to be interpreted in an illustrative and non-limiting sense.

Claims
  • 1. An apparatus comprising: a media;a head configured to write data on the media;a read channel, coupled to the head, configured to detect servo data from the media; andcontrol circuitry, coupled to the read channel, configured to: generate a position error signal (PES), associated with a write operation of an aggressor track, from the servo data,compare a first threshold to the PES for detecting a write unsafe condition,compare a second threshold, within the first threshold, to the PES for detecting a write squeeze condition, andcontrol a refresh operation of a victim track based on at least one of the comparisons.
  • 2. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to refresh sectors of data of the victim track when the PES exceeds the first threshold.
  • 3. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to refresh data of the victim track, before completing any other write command, when the PES exceeds the first threshold.
  • 4. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to: identify the victim track when the PES exceeds the first threshold; andrefresh data of the victim track in a background task.
  • 5. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to: identify the victim track when the PES exceeds the second threshold; andrefresh data of the victim track in a background task.
  • 6. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to detect an inner diameter drift (IDD), an outer diameter drift (ODD), or a combination thereof from the PES.
  • 7. The apparatus as claimed in claim 1 wherein the control circuitry is further configured to track a count based at least in part on one or more of: a detected write unsafe condition; anda detected write squeeze condition.
  • 8. The apparatus as claimed in claim 7 wherein the control circuitry is further configured to compare a third threshold, within the first threshold, to the PES for detecting an off-track write condition, and the count is additionally based on the detected off-track write condition.
  • 9. The apparatus as claimed in claim 7 wherein the control circuitry is further configured to assign different weights to the detected write unsafe condition and write squeeze condition.
  • 10. The apparatus as claimed in claim 7 wherein the control circuitry is further configured to control refresh of sectors of data in the victim track based at least in part on the count.
  • 11. The apparatus as claimed in claim 7 wherein the control circuitry is further configured to calibrate a seek-settle time based at least in part on the count.
  • 12. The apparatus as claimed in claim 7 wherein the control circuitry is further configured to extend a seek-settle time when executing a background task based at least in part on the count.
  • 13. A method of operating an apparatus, the method comprising: generating a position error signal (PES), associated with a write operation of an aggressor track, from servo data;comparing a first threshold to the PES for detecting a write unsafe condition;comparing a second threshold, within the first threshold, to the PES for detecting a write squeeze condition; andcontrolling a refresh operation, of a victim track, based on at least one of the comparisons.
  • 14. The method as claimed in claim 13 further comprising refreshing sectors of data of the victim track when the PES exceeds the first threshold.
  • 15. The method as claimed in claim 13 further comprising refreshing data of the victim track, before completing any other write command, when the PES exceeds the first threshold.
  • 16. The method as claimed in claim 13 further comprising: identifying the victim track when the PES exceeds the first threshold; andrefreshing data of the victim track in a background task.
  • 17. The method as claimed in claim 13 further comprising: identifying the victim track when the PES exceeds the second threshold; andrefreshing data of the victim track in a background task.
  • 18. The method as claimed in claim 13 further comprising detecting an inner diameter drift (IDD), an outer diameter drift (ODD), or a combination thereof from the PES.
  • 19. The method as claimed in claim 13 further comprising tracking a count based at least in part on one or more of: detecting a write unsafe condition; anddetecting a write squeeze condition.
  • 20. The method as claimed in claim 19 further comprising comparing a third threshold, within the first threshold, to the PES for detecting an off-track write condition, and the count is additionally based on detecting the off-track write condition.
  • 21. The method as claimed in claim 19 further comprising assigning different weights to detecting the write unsafe condition and the write squeeze condition.
  • 22. The method as claimed in claim 19 further comprising controlling refresh of data in the victim track based at least in part on the count.
  • 23. The method as claimed in claim 19 further comprising calibrating a seek-settle time based at least in part on the count.
  • 24. The method as claimed in claim 19 further comprising extending a seek-settle time when executing a background task based at least in part on the count.
US Referenced Citations (445)
Number Name Date Kind
6018789 Sokolov et al. Jan 2000 A
6065095 Sokolov et al. May 2000 A
6078452 Kittilson et al. Jun 2000 A
6081447 Lofgren et al. Jun 2000 A
6092149 Hicken et al. Jul 2000 A
6092150 Sokolov et al. Jul 2000 A
6094707 Sokolov et al. Jul 2000 A
6105104 Guttmann et al. Aug 2000 A
6111717 Cloke et al. Aug 2000 A
6145052 Howe et al. Nov 2000 A
6175893 D'Souza et al. Jan 2001 B1
6178056 Cloke et al. Jan 2001 B1
6191909 Cloke et al. Feb 2001 B1
6195218 Guttmann et al. Feb 2001 B1
6205494 Williams Mar 2001 B1
6208477 Cloke et al. Mar 2001 B1
6223303 Billings et al. Apr 2001 B1
6230233 Lofgren et al. May 2001 B1
6246346 Cloke et al. Jun 2001 B1
6249393 Billings et al. Jun 2001 B1
6256695 Williams Jul 2001 B1
6262857 Hull et al. Jul 2001 B1
6263459 Schibilla Jul 2001 B1
6272694 Weaver et al. Aug 2001 B1
6278568 Cloke et al. Aug 2001 B1
6279089 Schibilla et al. Aug 2001 B1
6289484 Rothberg et al. Sep 2001 B1
6292912 Cloke et al. Sep 2001 B1
6310740 Dunbar et al. Oct 2001 B1
6317850 Rothberg Nov 2001 B1
6327106 Rothberg Dec 2001 B1
6337778 Gagne Jan 2002 B1
6369969 Christiansen et al. Apr 2002 B1
6384999 Schibilla May 2002 B1
6388833 Golowka et al. May 2002 B1
6405342 Lee Jun 2002 B1
6408357 Hanmann et al. Jun 2002 B1
6408406 Parris Jun 2002 B1
6411452 Cloke Jun 2002 B1
6411458 Billings et al. Jun 2002 B1
6412083 Rothberg et al. Jun 2002 B1
6415349 Hull et al. Jul 2002 B1
6425128 Krapf et al. Jul 2002 B1
6429984 Alex Aug 2002 B1
6441981 Cloke et al. Aug 2002 B1
6442328 Elliott et al. Aug 2002 B1
6445524 Nazarian et al. Sep 2002 B1
6449767 Krapf et al. Sep 2002 B1
6453115 Boyle Sep 2002 B1
6470420 Hospodor Oct 2002 B1
6480020 Jung et al. Nov 2002 B1
6480349 Kim et al. Nov 2002 B1
6480932 Vallis et al. Nov 2002 B1
6483986 Krapf Nov 2002 B1
6487032 Cloke et al. Nov 2002 B1
6490635 Holmes Dec 2002 B1
6493173 Kim et al. Dec 2002 B1
6499083 Hamlin Dec 2002 B1
6519104 Cloke et al. Feb 2003 B1
6525892 Dunbar et al. Feb 2003 B1
6545830 Briggs et al. Apr 2003 B1
6546489 Frank, Jr. et al. Apr 2003 B1
6550021 Dalphy et al. Apr 2003 B1
6552880 Dunbar et al. Apr 2003 B1
6553457 Wilkins et al. Apr 2003 B1
6578106 Price Jun 2003 B1
6580573 Hull et al. Jun 2003 B1
6594183 Lofgren et al. Jul 2003 B1
6600620 Krounbi et al. Jul 2003 B1
6601137 Castro et al. Jul 2003 B1
6603622 Christiansen et al. Aug 2003 B1
6603625 Hospodor et al. Aug 2003 B1
6604220 Lee Aug 2003 B1
6606682 Dang et al. Aug 2003 B1
6606714 Thelin Aug 2003 B1
6606717 Yu et al. Aug 2003 B1
6611393 Nguyen et al. Aug 2003 B1
6615312 Hamlin et al. Sep 2003 B1
6628466 Alex Sep 2003 B2
6639748 Christiansen et al. Oct 2003 B1
6647481 Luu et al. Nov 2003 B1
6654193 Thelin Nov 2003 B1
6657810 Kupferman Dec 2003 B1
6661591 Rothberg Dec 2003 B1
6665772 Hamlin Dec 2003 B1
6687073 Kupferman Feb 2004 B1
6687078 Kim Feb 2004 B1
6687850 Rothberg Feb 2004 B1
6690523 Nguyen et al. Feb 2004 B1
6690882 Hanmann et al. Feb 2004 B1
6691198 Hamlin Feb 2004 B1
6691213 Luu et al. Feb 2004 B1
6691255 Rothberg et al. Feb 2004 B1
6693760 Krounbi et al. Feb 2004 B1
6694477 Lee Feb 2004 B1
6697914 Hospodor et al. Feb 2004 B1
6704153 Rothberg et al. Mar 2004 B1
6708251 Boyle et al. Mar 2004 B1
6710951 Cloke Mar 2004 B1
6711628 Thelin Mar 2004 B1
6711635 Wang Mar 2004 B1
6711660 Milne et al. Mar 2004 B1
6715044 Lofgren et al. Mar 2004 B2
6724982 Hamlin Apr 2004 B1
6725329 Ng et al. Apr 2004 B1
6735650 Rothberg May 2004 B1
6735693 Hamlin May 2004 B1
6744772 Eneboe et al. Jun 2004 B1
6745283 Dang Jun 2004 B1
6751402 Elliott et al. Jun 2004 B1
6757481 Nazarian et al. Jun 2004 B1
6772281 Hamlin Aug 2004 B2
6781826 Goldstone et al. Aug 2004 B1
6782449 Codilian et al. Aug 2004 B1
6791779 Singh et al. Sep 2004 B1
6792486 Hanan et al. Sep 2004 B1
6799274 Hamlin Sep 2004 B1
6811427 Garrett et al. Nov 2004 B2
6826003 Subrahmanyam Nov 2004 B1
6826614 Hanmann et al. Nov 2004 B1
6832041 Boyle Dec 2004 B1
6832929 Garrett et al. Dec 2004 B2
6845405 Thelin Jan 2005 B1
6845427 Atai-Azimi Jan 2005 B1
6850443 Lofgren et al. Feb 2005 B2
6851055 Boyle et al. Feb 2005 B1
6851063 Boyle et al. Feb 2005 B1
6853731 Boyle et al. Feb 2005 B1
6854022 Thelin Feb 2005 B1
6862660 Wilkins et al. Mar 2005 B1
6880043 Castro et al. Apr 2005 B1
6882486 Kupferman Apr 2005 B1
6884085 Goldstone Apr 2005 B1
6888831 Hospodor et al. May 2005 B1
6892217 Hanmann et al. May 2005 B1
6892249 Codilian et al. May 2005 B1
6892313 Codilian et al. May 2005 B1
6895455 Rothberg May 2005 B1
6895500 Rothberg May 2005 B1
6898730 Hanan May 2005 B1
6910099 Wang et al. Jun 2005 B1
6928470 Hamlin Aug 2005 B1
6931439 Hanmann et al. Aug 2005 B1
6934104 Kupferman Aug 2005 B1
6934713 Schwartz et al. Aug 2005 B2
6940873 Boyle et al. Sep 2005 B2
6943978 Lee Sep 2005 B1
6948165 Luu et al. Sep 2005 B1
6950267 Liu et al. Sep 2005 B1
6954733 Ellis et al. Oct 2005 B1
6961814 Thelin et al. Nov 2005 B1
6965489 Lee et al. Nov 2005 B1
6965563 Hospodor et al. Nov 2005 B1
6965966 Rothberg et al. Nov 2005 B1
6967799 Lee Nov 2005 B1
6968422 Codilian et al. Nov 2005 B1
6968450 Rothberg et al. Nov 2005 B1
6973495 Milne et al. Dec 2005 B1
6973570 Hamlin Dec 2005 B1
6976190 Goldstone Dec 2005 B1
6983316 Milne et al. Jan 2006 B1
6986007 Procyk et al. Jan 2006 B1
6986154 Price et al. Jan 2006 B1
6995933 Codilian et al. Feb 2006 B1
6996501 Rothberg Feb 2006 B1
6996669 Dang et al. Feb 2006 B1
7002926 Eneboe et al. Feb 2006 B1
7003674 Hamlin Feb 2006 B1
7006316 Sargenti, Jr. et al. Feb 2006 B1
7009820 Hogg Mar 2006 B1
7023639 Kupferman Apr 2006 B1
7024491 Hanmann et al. Apr 2006 B1
7024549 Luu et al. Apr 2006 B1
7024614 Thelin et al. Apr 2006 B1
7027716 Boyle et al. Apr 2006 B1
7028174 Atai-Azimi et al. Apr 2006 B1
7031902 Catiller Apr 2006 B1
7046465 Kupferman May 2006 B1
7046488 Hogg May 2006 B1
7050252 Vallis May 2006 B1
7054937 Milne et al. May 2006 B1
7055000 Severtson May 2006 B1
7055167 Masters May 2006 B1
7057836 Kupferman Jun 2006 B1
7062398 Rothberg Jun 2006 B1
7075746 Kupferman Jul 2006 B1
7076604 Thelin Jul 2006 B1
7082494 Thelin et al. Jul 2006 B1
7088538 Codilian et al. Aug 2006 B1
7088545 Singh et al. Aug 2006 B1
7092186 Hogg Aug 2006 B1
7095577 Codilian et al. Aug 2006 B1
7099095 Subrahmanyam et al. Aug 2006 B1
7106537 Bennett Sep 2006 B1
7106947 Boyle et al. Sep 2006 B2
7110202 Vasquez Sep 2006 B1
7111116 Boyle et al. Sep 2006 B1
7114029 Thelin Sep 2006 B1
7120737 Thelin Oct 2006 B1
7120806 Codilian et al. Oct 2006 B1
7126776 Warren, Jr. et al. Oct 2006 B1
7129763 Bennett et al. Oct 2006 B1
7133600 Boyle Nov 2006 B1
7136244 Rothberg Nov 2006 B1
7146094 Boyle Dec 2006 B1
7149046 Coker et al. Dec 2006 B1
7150036 Milne et al. Dec 2006 B1
7155616 Hamlin Dec 2006 B1
7171108 Masters et al. Jan 2007 B1
7171110 Wilshire Jan 2007 B1
7194576 Boyle Mar 2007 B1
7196860 Alex Mar 2007 B2
7200698 Rothberg Apr 2007 B1
7205805 Bennett Apr 2007 B1
7206497 Boyle et al. Apr 2007 B1
7215496 Kupferman et al. May 2007 B1
7215771 Hamlin May 2007 B1
7237054 Cain et al. Jun 2007 B1
7240161 Boyle Jul 2007 B1
7249365 Price et al. Jul 2007 B1
7263709 Krapf Aug 2007 B1
7274639 Codilian et al. Sep 2007 B1
7274659 Hospodor Sep 2007 B2
7275116 Hanmann et al. Sep 2007 B1
7280302 Masiewicz Oct 2007 B1
7292774 Masters et al. Nov 2007 B1
7292775 Boyle et al. Nov 2007 B1
7296284 Price et al. Nov 2007 B1
7302501 Cain et al. Nov 2007 B1
7302579 Cain et al. Nov 2007 B1
7318088 Mann Jan 2008 B1
7319806 Willner et al. Jan 2008 B1
7325244 Boyle et al. Jan 2008 B2
7330323 Singh et al. Feb 2008 B1
7346790 Klein Mar 2008 B1
7366641 Masiewicz et al. Apr 2008 B1
7369340 Dang et al. May 2008 B1
7369343 Yeo et al. May 2008 B1
7372650 Kupferman May 2008 B1
7380147 Sun May 2008 B1
7392340 Dang et al. Jun 2008 B1
7404013 Masiewicz Jul 2008 B1
7406545 Rothberg et al. Jul 2008 B1
7415571 Hanan Aug 2008 B1
7436610 Thelin Oct 2008 B1
7437502 Coker Oct 2008 B1
7440214 Ell et al. Oct 2008 B1
7451344 Rothberg Nov 2008 B1
7471483 Ferris et al. Dec 2008 B1
7471486 Coker et al. Dec 2008 B1
7477465 Yu Jan 2009 B2
7486060 Bennett Feb 2009 B1
7496493 Stevens Feb 2009 B1
7518819 Yu et al. Apr 2009 B1
7526184 Parkinen et al. Apr 2009 B1
7539924 Vasquez et al. May 2009 B1
7543117 Hanan Jun 2009 B1
7551383 Kupferman Jun 2009 B1
7562282 Rothberg Jul 2009 B1
7577973 Kapner, III et al. Aug 2009 B1
7596797 Kapner, III et al. Sep 2009 B1
7599139 Bombet et al. Oct 2009 B1
7619841 Kupferman Nov 2009 B1
7647544 Masiewicz Jan 2010 B1
7649704 Bombet et al. Jan 2010 B1
7653927 Kapner, III et al. Jan 2010 B1
7656603 Xing Feb 2010 B1
7656763 Jin et al. Feb 2010 B1
7657149 Boyle Feb 2010 B2
7672072 Boyle et al. Mar 2010 B1
7673075 Masiewicz Mar 2010 B1
7688540 Mei et al. Mar 2010 B1
7724461 McFadyen et al. May 2010 B1
7725584 Hanmann et al. May 2010 B1
7730295 Lee Jun 2010 B1
7760458 Trinh Jul 2010 B1
7768776 Szeremeta et al. Aug 2010 B1
7804657 Hogg et al. Sep 2010 B1
7813954 Price et al. Oct 2010 B1
7827320 Stevens Nov 2010 B1
7839588 Dang et al. Nov 2010 B1
7843660 Yeo Nov 2010 B1
7852596 Boyle et al. Dec 2010 B2
7859782 Lee Dec 2010 B1
7872822 Rothberg Jan 2011 B1
7898756 Wang Mar 2011 B1
7898762 Guo et al. Mar 2011 B1
7900037 Fallone et al. Mar 2011 B1
7907364 Boyle et al. Mar 2011 B2
7929234 Boyle et al. Apr 2011 B1
7933087 Tsai et al. Apr 2011 B1
7933090 Jung et al. Apr 2011 B1
7934030 Sargenti, Jr. et al. Apr 2011 B1
7940491 Szeremeta et al. May 2011 B2
7944639 Wang May 2011 B1
7945727 Rothberg et al. May 2011 B2
7949564 Hughes et al. May 2011 B1
7974029 Tsai et al. Jul 2011 B2
7974039 Xu et al. Jul 2011 B1
7982993 Tsai et al. Jul 2011 B1
7984200 Bombet et al. Jul 2011 B1
7990648 Wang Aug 2011 B1
7992179 Kapner, III et al. Aug 2011 B1
8004785 Tsai et al. Aug 2011 B1
8006027 Stevens et al. Aug 2011 B1
8014094 Jin Sep 2011 B1
8014977 Masiewicz et al. Sep 2011 B1
8019914 Vasquez et al. Sep 2011 B1
8040625 Boyle et al. Oct 2011 B1
8078943 Lee Dec 2011 B1
8079045 Krapf et al. Dec 2011 B2
8082433 Fallone et al. Dec 2011 B1
8085487 Jung et al. Dec 2011 B1
8089719 Dakroub Jan 2012 B1
8090902 Bennett et al. Jan 2012 B1
8090906 Blaha et al. Jan 2012 B1
8091112 Elliott et al. Jan 2012 B1
8094396 Zhang et al. Jan 2012 B1
8094401 Peng et al. Jan 2012 B1
8116020 Lee Feb 2012 B1
8116025 Chan et al. Feb 2012 B1
8134793 Vasquez et al. Mar 2012 B1
8134798 Thelin et al. Mar 2012 B1
8139301 Li et al. Mar 2012 B1
8139310 Hogg Mar 2012 B1
8144419 Liu Mar 2012 B1
8145452 Masiewicz et al. Mar 2012 B1
8149528 Suratman et al. Apr 2012 B1
8154812 Boyle et al. Apr 2012 B1
8159768 Miyamura Apr 2012 B1
8161328 Wilshire Apr 2012 B1
8164849 Szeremeta et al. Apr 2012 B1
8174780 Tsai et al. May 2012 B1
8190575 Ong et al. May 2012 B1
8194338 Zhang Jun 2012 B1
8194340 Boyle et al. Jun 2012 B1
8194341 Boyle Jun 2012 B1
8201066 Wang Jun 2012 B1
8271692 Dinh et al. Sep 2012 B1
8279550 Hogg Oct 2012 B1
8281218 Ybarra et al. Oct 2012 B1
8285923 Stevens Oct 2012 B2
8289656 Huber Oct 2012 B1
8305705 Roohr Nov 2012 B1
8307156 Codilian et al. Nov 2012 B1
8310775 Boguslawski et al. Nov 2012 B1
8315006 Chahwan et al. Nov 2012 B1
8316263 Gough et al. Nov 2012 B1
8320067 Tsai et al. Nov 2012 B1
8324974 Bennett Dec 2012 B1
8332695 Dalphy et al. Dec 2012 B2
8341337 Ong et al. Dec 2012 B1
8350628 Bennett Jan 2013 B1
8356184 Meyer et al. Jan 2013 B1
8370683 Ryan et al. Feb 2013 B1
8375225 Ybarra Feb 2013 B1
8375274 Bonke Feb 2013 B1
8380922 DeForest et al. Feb 2013 B1
8390948 Hogg Mar 2013 B2
8390952 Szeremeta Mar 2013 B1
8392689 Lott Mar 2013 B1
8407393 Yolar et al. Mar 2013 B1
8413010 Vasquez et al. Apr 2013 B1
8417566 Price et al. Apr 2013 B2
8421663 Bennett Apr 2013 B1
8422172 Dakroub et al. Apr 2013 B1
8427771 Tsai Apr 2013 B1
8429343 Tsai Apr 2013 B1
8433937 Wheelock et al. Apr 2013 B1
8433977 Vasquez et al. Apr 2013 B1
8458526 Dalphy et al. Jun 2013 B2
8462466 Huber Jun 2013 B2
8467151 Huber Jun 2013 B1
8489841 Strecke et al. Jul 2013 B1
8493679 Boguslawski et al. Jul 2013 B1
8498074 Mobley et al. Jul 2013 B1
8499198 Messenger et al. Jul 2013 B1
8512049 Huber et al. Aug 2013 B1
8514506 Li et al. Aug 2013 B1
8531791 Reid et al. Sep 2013 B1
8554741 Malina Oct 2013 B1
8560759 Boyle et al. Oct 2013 B1
8565053 Chung Oct 2013 B1
8576511 Coker et al. Nov 2013 B1
8578100 Huynh et al. Nov 2013 B1
8578242 Burton et al. Nov 2013 B1
8589773 Wang et al. Nov 2013 B1
8593753 Anderson Nov 2013 B1
8595432 Vinson et al. Nov 2013 B1
8599510 Fallone Dec 2013 B1
8601248 Thorsted Dec 2013 B2
8611032 Champion et al. Dec 2013 B2
8612650 Carrie et al. Dec 2013 B1
8612706 Madril et al. Dec 2013 B1
8612798 Tsai Dec 2013 B1
8619383 Jung et al. Dec 2013 B1
8621115 Bombet et al. Dec 2013 B1
8621133 Boyle Dec 2013 B1
8626463 Stevens et al. Jan 2014 B2
8630052 Jung et al. Jan 2014 B1
8630056 Ong Jan 2014 B1
8631188 Heath et al. Jan 2014 B1
8634158 Chahwan et al. Jan 2014 B1
8635412 Wilshire Jan 2014 B1
8640007 Schulze Jan 2014 B1
8654619 Cheng Feb 2014 B1
8661193 Cobos et al. Feb 2014 B1
8667248 Neppalli Mar 2014 B1
8670205 Malina et al. Mar 2014 B1
8683295 Syu et al. Mar 2014 B1
8683457 Hughes et al. Mar 2014 B1
8687306 Coker et al. Apr 2014 B1
8693133 Lee et al. Apr 2014 B1
8694841 Chung et al. Apr 2014 B1
8699159 Malina Apr 2014 B1
8699171 Boyle Apr 2014 B1
8699172 Gunderson et al. Apr 2014 B1
8699175 Olds et al. Apr 2014 B1
8699185 Teh et al. Apr 2014 B1
8700850 Lalouette Apr 2014 B1
8743502 Bonke et al. Jun 2014 B1
8749910 Dang et al. Jun 2014 B1
8751699 Tsai et al. Jun 2014 B1
8755141 Dang Jun 2014 B1
8755143 Wilson et al. Jun 2014 B2
8756361 Carlson et al. Jun 2014 B1
8756382 Carlson et al. Jun 2014 B1
8769593 Schwartz et al. Jul 2014 B1
8773802 Anderson et al. Jul 2014 B1
8780478 Huynh et al. Jul 2014 B1
8782334 Boyle et al. Jul 2014 B1
8793532 Tsai et al. Jul 2014 B1
8797669 Burton Aug 2014 B1
8799977 Kapner, III et al. Aug 2014 B1
8819375 Pruett et al. Aug 2014 B1
8825976 Jones Sep 2014 B1
8825977 Syu et al. Sep 2014 B1
20090113702 Hogg May 2009 A1
20100306551 Meyer et al. Dec 2010 A1
20110226729 Hogg Sep 2011 A1
20120159042 Lott et al. Jun 2012 A1
20120275050 Wilson et al. Nov 2012 A1
20120281963 Krapf et al. Nov 2012 A1
20120324980 Nguyen et al. Dec 2012 A1
20140201424 Chen et al. Jul 2014 A1