Data modification

ABSTRACT

Methods and systems associated with data modification are described. Examples can include receiving, at a controller of a device, data associated with a read or write command transmitted to a memory resource and modifying the data using logic before transmitting the data to a host or image sensor or before writing the data to the memory resource. The modification can include removing one or more bits from the data, reordering one or more bits of the data, changing a format of the data, or any combination thereof. The modified data can be transmitted to the host or image sensor or written to the memory resource. In some examples, a plurality of memory devices can combine modified data for transmitting to a host.

TECHNICAL FIELD

The present disclosure relates generally to systems and methodsassociated with data modification.

BACKGROUND

Memory devices are typically provided as internal, semiconductor,integrated circuits in computers or other electronic systems. There aremany different types of memory including volatile and non-volatilememory. Volatile memory can require power to maintain its data (e.g.,host data, error data, etc.) and includes random-access memory (RAM),dynamic random-access memory (DRAM), static random-access memory (SRAM),synchronous dynamic random-access memory (SDRAM), and thyristor randomaccess memory (TRAM), among others. Non-volatile memory can providepersistent data by retaining stored data when not powered and caninclude NAND flash memory, NOR flash memory, and resistance variablememory such as phase change random access memory (PCRAM), resistiverandom-access memory (RRAM), and magnetoresistive random access memory(MRAM), such as spin torque transfer random access memory (STT RAM),among others.

Memory devices can be coupled to a host (e.g., a host computing device)to store data, commands, and/or instructions for use by the host whilethe computer or electronic system is operating. For example, data,commands, and/or instructions can be transferred between the host andthe memory device(s) during operation of a computing or other electronicsystem.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an example system including a memory resource, acontroller, and a device for modifying data in accordance with a numberof embodiments of the present disclosure.

FIG. 2 is a diagram of an example system including memory resources,controllers, and devices for modifying data in accordance with a numberof embodiments of the present disclosure.

FIG. 3 is a flow diagram representing an example method associated witha device in accordance with a number of embodiments of the presentdisclosure.

FIG. 4 is a diagram of an example system including a server and sensorshaving devices and controllers in accordance with a number ofembodiments of the present disclosure.

FIG. 5 is a diagram of an example system including an artificialintelligence (AI) model and data storage devices having devices andcontrollers in accordance with a number of embodiments of the presentdisclosure.

DETAILED DESCRIPTION

Systems and methods related to data modification are described. Examplescan include a device such as a data preparation slice (DPS). As usedherein, “data preparation slice”, or “DPS”, refers to a hardwareaccelerator, hardware intelligent chip, logic, software, or other devicethat is communicatively coupled to a controller and performs datamodification (e.g., data preparation). In some examples, the DPS islocated on a memory resource or is located on-disk. “Communicativelycoupled,” as used herein, can include coupled via various wired and/orwireless connections between devices such that data can be transferredin various directions between the devices. The coupling may not be adirect connection, and in some examples can be an indirect connection.

Data modification can include manipulating (e.g., cleaning andtransforming) raw data prior to processing and analysis. Datamodification can include reformatting data, making corrections to data,and combining data sets to put the data in a desired form (e.g., forefficient and accurate processing and analysis). In some examples, datamodification can include standardizing data formats, sequencing data,enriching source data, removing outliers, loading data, data ingestion,data fusion, data cleaning, data augmentation, ordering data,summarizing/compressing data (e.g., mean, median, max, min, etc.),generating synthetic data, and data delivery, among others.

Examples of the present disclosure may allow for data modification at adevice such as a DPS located on a memory resource or on-disk, allowingfor modification co-located with data storage. This can reduce access tothe data (raw and modified), which can increase security. Dataprocessing efficiency can increase, in some examples, as the speed withwhich the raw data can be retrieved from storage and modified can beincreased. This can also increase security, as data that travels anincreased distance for an increased time may be more susceptible to lossor corruption. Examples of the present disclosure can reduce adependency on a data modification service separate from a data storagelocation. Some examples of the present disclosure can allow formodification of data upon receipt from a host, for example, such thatthe data can be stored as modified data (e.g., versus raw data). Thiscan reduce an amount of data being sent through an interface, which canreduce costs, reduce bandwidth requirements, and increase security.

Examples of the present disclosure can include receiving, at acontroller of a device, data associated with a read command or writecommand transmitted to a memory resource and modifying the data usinglogic communicatively coupled to the controller before transmitting thedata to a host or image sensor or before writing the data to the memoryresource. The modification can include removing one or more bits fromthe data, reordering one or more bits of the data, changing a format ofthe data, or any combination thereof. Such examples can includetransmitting the modified data to the host or image sensor or writingthe data to the memory resource based at least in part on the readcommand or the write command.

Other examples of the present disclosure can include a system includinga memory resource. The memory resource can include a controllerconfigured to manage data associated with the memory resource and adevice such as a DPS communicatively coupled to the controller andconfigured to modify the data before transmitting the data to a host orimage sensor or before writing the data to the memory resource, whereinthe modification comprises removing one or more bits from the data,reordering one or more bits of the data, changing a format of the data,or any combination thereof.

Yet other examples of the present disclosure can include a systemincluding a storage device communicatively coupled to a host and acombined device such as a combined DPS. The storage device can include afirst memory resource including a first controller configured to managedata associated with the first memory resource and a first devicecommunicatively coupled to the first controller and configured to modifythe data associated with the first memory resource. The storage devicecan also include a second memory resource including a second controllerconfigured to manage data associated with the second memory resource anda second device communicatively coupled to the second controller andconfigured to modify the data associated with the second memoryresource. The modification in the first and the second device caninclude removing one or more bits from the data, reordering one or morebits of the data, changing a format of the data, or any combinationthereof. The combined device can be configured to collect and combinethe data modified by the first device and the data modified by thesecond device and transmit (e.g., communicate) the combined modifieddata to the host.

In the following detailed description of the present disclosure,reference is made to the accompanying drawings that form a part hereof,and in which is shown by way of illustration how one or more embodimentsof the disclosure can be practiced. These embodiments are described insufficient detail to enable those of ordinary skill in the art topractice the embodiments of this disclosure, and it is to be understoodthat other embodiments can be utilized and that process, electrical, andstructural changes can be made without departing from the scope of thepresent disclosure.

As used herein, designators such as “M”, “N”, “P”, etc., particularlywith respect to reference numerals in the drawings, indicate that anumber of the particular feature so designation can be included. It isalso to be understood that the terminology used herein is for thepurpose of describing particular embodiments only and is not intended tobe limiting. As used herein, the singular forms “a,” “an,” and “the” caninclude both singular and plural referents, unless the context clearlydictates otherwise. In addition, “a number of,” “at least one,” and “oneor more” (e.g., a number of memory devices) can refer to one or morememory devices, whereas a “plurality of” is intended to refer to morethan one of such things. Furthermore, the words “can” and “may” are usedthroughout this application in a permissive sense (i.e., having thepotential to, being able to), not in a mandatory sense (i.e., must). Theterm “include,” and derivations thereof, means “including, but notlimited to.” The terms “coupled,” and “coupling” mean to be directly orindirectly connected physically or for access to and movement(transmission) of commands and/or data, as appropriate to the context.The terms “data” and “data values” are used interchangeably herein andcan have the same meaning, as appropriate to the context.

The figures herein follow a numbering convention in which the firstdigit or digits correspond to the figure number and the remaining digitsidentify an element or component in the figure. Similar elements orcomponents between different figures can be identified by the use ofsimilar digits. For example, 102 can reference element “02” in FIG. 1,and a similar element can be referenced as 202 in FIG. 2. As will beappreciated, elements shown in the various embodiments herein can beadded, exchanged, and/or eliminated so as to provide a number ofadditional embodiments of the present disclosure. In addition, theproportion and/or the relative scale of the elements provided in thefigures are intended to illustrate certain embodiments of the presentdisclosure and should not be taken in a limiting sense.

Multiple analogous elements within one figure may be referenced with areference numeral followed by a hyphen and another numeral or a letter.For example, 442-1 may reference element 42-1 in FIG. 4 and 442-P mayreference element 42-P, which can be analogous to element 42-1. Suchanalogous elements may be generally referenced without the hyphen andextra numeral or letter. For example, elements 442-1 and 442-P may begenerally referenced as 442.

FIG. 1 is a diagram of an example system 100 including a memory resource102, a controller 104, and a device (illustrated in FIG. 1 as a DPS 106)for modifying data in accordance with a number of embodiments of thepresent disclosure. In some examples, the controller 104 can include aprocessor, control circuitry, hardware, firmware, and/or software, amongothers. The memory resource 102 can include control circuitry in someexamples and can be communicatively coupled to an interface 108 (e.g., ahost interface) within the system 100, and the interface 108 can becommunicatively coupled to a host 110. In some examples, the memoryresource 102 includes a memory array.

The memory resource 102 can be coupled to the interface 108 (e.g., viathe controller 104) via one or more channels and can be used to transferdata between the memory resource 102 and the host 110, which may have ahost controller. The interface 108 can be in the form of a standardizedinterface (e.g., a storage interface). For example, when the memoryresource 102 is used for data storage in the system 100 (e.g., acomputing system), the interface 108 can be a serial advanced technologyattachment (SATA), peripheral component interconnect express (PCIe), anon-volatile memory host controller interface, a universal serial bus(USB), or a double data rate (DDR) interface, among other connectors andinterfaces. In general, however, interface 108 can provide an interfacefor passing control, address, data, and other signals between the memoryresource 102 and the host 110 having compatible receptors for theinterface 108.

The memory resource 102 can include non-volatile or volatile memory.Non-volatile memory types can include NAND flash memory, NOR flashmemory, read only memory (ROM), Electrically Erasable Programmable ROM(EEPROM), Erasable Programmable ROM (EPROM), and Storage Class Memory(SCM) that can include resistance variable memory, such as phase changerandom access memory (PCRAM), three-dimensional cross-point memory,resistive random-access memory (RRAM), ferroelectric random accessmemory (FeRAM), magnetoresistive random-access memory (MRAM), andprogrammable conductive memory, among other types of memory. Volatilememory can include random-access memory (RAM), dynamic random-accessmemory (DRAM), and static random-access memory (SRAM), among others.

The host 102 can be a host system such as a personal laptop computer, ahead-mounted display, a vehicle, a desktop computer, a digital camera, amobile telephone, an internet-of-things (IoT) enabled device, or amemory card reader, graphics processing unit (e.g., a video card), or acloud service, among various other types of hosts. The host 110 caninclude a system motherboard and/or backplane and can include a numberof memory access devices, (e.g., a number of processing resources (e.g.,one or more processors, microprocessors, or some other type ofcontrolling circuitry)). One of ordinary skill in the art willappreciate that “a processor” can intend one or more processors, such asa parallel processing system, a number of coprocessors, etc. The host110 can be coupled to the interface 108 by a communication channel, insome examples.

As used herein an “IoT enabled device” can refer to devices embeddedwith electronics, software, sensors, actuators, and/or networkconnectivity which enable such devices to connect to a network and/orexchange data. Examples of IoT enabled devices include mobile phones,smart phones, tablets, phablets, computing devices, implantable devices,vehicles, home appliances, sensors, smart home devices, monitoringdevices, wearable devices, devices enabling intelligent shoppingsystems, among other cyber-physical systems.

In some examples, the host 110 can be responsible for executing anoperating system for the system 100 that includes the memory resource102. Accordingly, in some embodiments, the host 110 can be responsiblefor controlling operation of the memory resource 102. For example, thehost 110 can execute instructions (e.g., in the form of an operatingsystem) that manage the hardware of the system 100 such as schedulingtasks, executing applications, controlling peripherals, etc.

The computing system 100 can include separate integrated circuits or thehost 110, the memory resource 102, the interface 108, and/or thecontroller 104, can be on the same integrated circuit. The system 100can be, for instance, a server system and/or a high-performancecomputing (HPC) system and/or a portion thereof Although the exampleshown in FIG. 1 illustrates a system having a Von Neumann architecture,embodiments of the present disclosure can be implemented in non-VonNeumann architectures, which may not include one or more components(e.g., CPU, ALU, etc.) often associated with a Von Neumann architecture.

In some examples, the memory resource 102 can store data for the host110. The host 110 may request the data, and the data can be provided tothe host 110 as encrypted data. For instance, the DPS 106 can modifydata stored as raw data at memory resource 102 or can modify datareceived from the host 110 and subsequently store the modified data atmemory resource 102. Modification, in some examples, can be performedbefore transmitting the data to the host 110 or an image sensor orbefore writing the data to the memory resource 102, and the modificationcan include removing one or more bits from the data, reordering one ormore bits of the data, changing a format of the data, or any combinationthereof. Modification of the raw data by the DPS 106 (e.g., using logic)can include, for instance, sequencing the data, standardizing dataformats, enriching source data, removing outliers, loading data, dataingestion, data fusion, data cleaning, data augmentation, and datadelivery, among other data modification processes.

The controller 104 can manage the modified data by encrypting andencoding the data. For example, before sending the modified data to thehost 110 via the interface 108, the controller 104 can encrypt andencode (e.g., error correct) the data for security. The controller 104can receive the modified data from the DPS and transmit it to the host110, for example. In some instances, managing the data can include thecontroller 104 receiving the data from the host 110 and communicatingthe data to the DPS for modification.

In a non-limiting example, the host 110 may be a cloud service. The host110 provides raw data to the memory resource 102 (e.g., via thecontroller 104) for storage. When the host 110 requests the data fromthe controller 104 (e.g., via the interface 108), the DPS modifies theraw data, the controller encrypts and encodes the modified data (e.g.,if requested by the host 110), and transmits the modified data to thehost 110 (108) for processing and/or analysis. For instance, the rawdata may include errors, outliers, extraneous data, missing values,private or sensitive data entries, non-conforming data, or a combinationthereof that the DPS may remove, correct, standardize, or mask duringmodification. The host 110 can use the modify data as desired; forinstance, a cloud service may run a particular algorithm on the modifieddata than may not be run on raw data.

In another non-limiting example, the host 110 provides raw data to thecontroller 104 via the interface 108 for eventual storage at memoryresource 102. The controller 104 transmits the raw data to the DPS 106for data modification and subsequently encrypts, encodes, and transmitsthe modified data to the memory resource 102 for storage as modifieddata. Whether the data is stored at the memory resource 102 as raw ormodified data may depend on the host's 110 desire to reduce time storingthe data (e.g., store raw data) with the knowledge that it may take timeto modify the data at the DPS 106 before reading back the data versusthe host's 110 desire to reduce time reading back the data (e.g., storemodified data) with the knowledge that it may take time to modify thedata at the DPS 106 before storing the data.

Although not illustrated in FIG. 1 as to not obscure the examples of thedisclosure, the memory resource 102 can be communicatively coupled toimage sensors which can be communicatively coupled to the host 110. Asused herein, the term “image sensor” refers to a device that cangenerate and send image data and/or image receive data. Some examples ofimage sensors can include camera devices, video devices, among others.The image sensors may transmit data for storage in the memory resource102. For example, the controller 104 can receive data from the pluralityof image sensors.

In some examples, the DPS 106 can modify the received raw image data,which may be referred to as image data augmentation. For instance,modifying raw image data can include finding similar images within theraw image data, compiling images, synthesizing images, performingstatistical data modification on the raw image data, etc.

FIG. 2 is a diagram of an example system 200 including memory resources202-1, 202-N, controllers 204-1, 204-N, and devices (illustrated in FIG.2 as DPSes 206-1, 206-N) for modifying data in accordance with a numberof embodiments of the present disclosure. For instance, the system 200may be a storage device such as an SSD communicatively coupled to thehost 210 and can include a first memory resource 202-1 and a secondmemory resource 202-N. While two memory resources 202 are illustrated inFIG. 2, more or fewer memory resources may be present in system 200. Thememory resources 202 can be a same type or a different type of memoryresource. For example, the memory resource 202-1 may be configured tostore a first data type while the memory resource 202-N may beconfigured to store a second data type. In a non-limiting example, thememory resource 202-1 is a volatile memory device and the memoryresource 202-N is a non-volatile memory device. In some examples, thememory resources 202 are memory arrays.

The memory resources 202 may be a combination of electronic, magnetic,optical, or other physical storage device that stores executableinstructions. Thus, the memory resources 202 may be, for example,non-volatile memory, volatile memory, or a combination thereof In someexamples, the memory resources 202 are non-transitory machine-readablemedia comprising RAM, an EEPROM, a storage drive, an optical disc, andthe like.

The memory resource 202-1 can include a controller 204-1 configured tomanage data associated with the memory resource 202-1 and a DPS 206-1communicatively coupled to the controller 204-1 and configured to modifythe data associated with the memory resource 202-1. The memory resource202-N can include a controller 204-N configured to manage dataassociated with the memory resource 202-N and a DPS 206-Ncommunicatively coupled to the controller 204-N and configured to modifythe data associated with the memory resource 202-N. In some examples,the DPS 206-1 can include a processing resource and logic to modify thedata associated with the memory resource 202-1, and the DPS 206-N caninclude a processing resource and logic to modify the data associatedwith the memory resource 202-N.

A combined device (illustrated here as DPS 212) can be in communicationwith the memory resources 202 and their respective controllers 204 tocollect and combine the data modified by the DPSes 206 and transmit thecombined modified data to the host 210 via the interface 208. Forinstance, the modified data can be transmitted to the combined DPS 221via channels such as buses. Put another way, the system 200 can have anarchitecture such that memory resources 202 can be working at the sametime (e.g., to store different data types), but together the memoryresources 202 utilize one interface 208. For instance, if the memoryresource 202-1 is a DRAM device, and the memory resource 202-N is a NANDdevice, data stored at the memory resource 202-1 and modified at the DPS206-1 can be transmitted to the combined DPS 212 where it is combinedwith data stored at the memory resource 202-N and modified at the DPS206-N, thereby combining data from different memory resource-types inthe system 200 at combined DPS 212.

In some examples, the combined modified data can be transmitted to thehost 210 at particular time intervals. For instance, in a non-limitingexample, the modified data from the DPSes 206-1 and 206-N may includeonly relevant data determined during data modification. As such, blocksof data may not be sent continuously, but rather in particular timeintervals such that blocks of relevant data are sent, reducing bandwidthrequirements of continuous communication. Accordingly, modified data inthe combined DPS 212 may be sent at particular time intervals as it isreceived or at other predetermined time intervals. In some instances,modified data from the DPSes 206 and/or the combined DPS 212 may betransmitted near-continuously. As used herein, “near-continuously”includes transmitting (e.g., sending, receiving, etc.) withoutmeaningful breaks.

FIG. 3 is a flow diagram representing an example method 320 associatedwith data modification in accordance with a number of embodiments of thepresent disclosure. The method 320 can be performed by a system orcontroller, such as the systems and/or controllers described withrespect to FIGS. 1 and 2.

At 322, the method 320 can include receiving data at a controller (e.g.,a storage controller) of a device, data associated with a read commandor write command transmitted to a memory array. The device, forinstance, can include a memory resource such as a volatile ornon-volatile memory device or a computing device (e.g., providingon-disk storage). The data can be received at the controller from thedevice itself or from an outside device. For instance, the data may bereceived from a host, such as a cloud service, or can be received fromthe memory resource itself, for instance in response to datamodification at a different device such as a DPS.

For example, the method 320, at 324, can include modifying the datausing logic communicatively coupled to the controller beforetransmitting the data to a host or image sensor or before writing thedata to the memory resource, wherein the modification comprises removingone or more bits from the data, reordering one or more bits of the data,changing a format of the data, or any combination thereof. For instance,the data can be modified at a DPS. The data can be modified at the DPSsubsequent to being stored at the device or can be modified prior tobeing stored at the device. For instance, a host sending the data forstorage and modification may indicate whether it is preferred to taketime to modify the data before storage or take time to modify the databefore reading it back to the host.

In some examples, modifying the data can include modifying image data.For instance, the data received at the controller, or a portion of thedata, can be image data. For instance, raw image data may be synthesizedas part of data modification at the DPS.

At 326, the method 320 can include transmitting the modified data to thehost or image sensor or writing the data to the memory resource based atleast in part on the read command or the write command. For instance, ifthe data is received from a host at the controller of a memory resource,the modified data can be written to the to the memory resource. In someinstances, the modified data (and/or modified image data) can beencrypted, encoded, and written to the memory resource for storage. Inan example when the data is received from a memory resource, themodified data can be transmitted to a host via an interface.

In some instances, the data can be received at a controller of a sensorof an edge device and the modified data can be transmitted to a servercommunicatively coupled to the sensor. For instance, as will bediscussed further herein with respect to FIG. 4, data modification canoccur at a DPS of an edge device (e.g., IoT enabled devices, sensors,etc.) and can be transmitted to or from an associated server via thecontroller.

The data, in some examples, can be received at a controller of a datanode associated with an AI host and the modified data can be transmittedto the AI host communicatively coupled to the data node. For instance,as will be discussed further herein with respect to FIG. 5, datamodification can occur at a DPS of the data node (e.g., a company'sstorage node) and can be transmitted to or from an associated AI hostvia the controller. An AI model (e.g., machine learning model), forinstance, can be performed on the modified data.

FIG. 4 is a diagram of an example system including a server 440 andsensors 442-1, 442-2, 442-P having devices (illustrated in FIG. 4 asDPSes 404-1, 404-2, . . . , 404-P) and controllers 406-1, 406-2, . . . ,406-P in accordance with a number of embodiments of the presentdisclosure. In the example illustrated in FIG. 4, the sensors 442 can beedge devices such that the sensors are deployed in large numbers tocollect data and report the data back to the server 440. Each sensor 442can include a controller 404 communicatively coupled to a DPS 406.Subsequent to a sensor 442 collecting raw data (e.g., temperature,humidity, etc.) at the controller 406, the raw data can be transmittedfrom the controller 404 to the DPS 406 and modified at the DPS 406. Forinstance, the raw data may be converted from an analog format to adigital format.

Modifying the data at the DPSes 406 prior to transmitting the data tothe server 440 can increase security and reduce cost by avoiding sendingthe raw data to a third-party data modification service. For instance,by reducing the time and distance traveled by the data (raw or modified)lost and/or corrupt data can be reduced. In some examples, bandwidth usecan be reduced, as relevant data is transmitted to the server 400; forinstance, irrelevant data may be filtered out during data modificationat the DPSes 406. In some examples, data transmitted to/from the server400 may be transmitted at particular time intervals. For instance,multiple blocks of data modified at one or more of the DPSes 406 may becompressed into a single block of data before being transmitted to theserver 440 via a controller 404 at the particular time interval.

In a non-limiting example, the sensors 442 may collect machinetemperature data every second at the controllers 404, but onlyparticular data associated with the temperature data may be relevant fora machine health monitor (e.g., maximum temperature, minimumtemperature, median temperature, etc.). In such an example, the DPSes406 can modify the data such that only data deemed relevant istransmitted to the server 440 for further computing, and the data may besent at intervals greater than the one second interval at which data isreceived at the controllers 404. While sensors 442 are illustrated inFIG. 4, other edge devices and/or applications may be used.

FIG. 5 is a diagram of an example system including an AI model 550 anddata storage devices 554-1, 554-2, . . . , 554-M having devices(illustrated in FIG. 5 as DPSes 506-1, 506-2, . . . , 506-P) andcontrollers 504-1, 504-2, . . . , 504-P in accordance with a number ofembodiments of the present disclosure. The AI model 550, can beassociated with an AI host 552 such as a cloud service (e.g., a cloudcomputing provider).

In the example illustrated in FIG. 5, the data storage devices 554(e.g., data nodes) can be data storage devices of a user (e.g., company,individual, etc.) associated with an AI host 552. For example, an onlinestreaming service may have a data storage device associated with a cloudservice with which data is transmitted. Data storage devices 554 canstore data from different companies, corporations, government entities,individuals, etc. or may store data from a same user.

Each data storage device 554 can include a controller 504communicatively coupled to a DPS 506. Subsequent to a data storagedevice 554 receiving raw data at the controller 504, the raw data can betransmitted from the controller 504 to the DPS 506 and modified at theDPS 506. For instance, the raw data may be sequenced, outlier data orother irrelevant data may be removed, or the raw data may be modifiedfor use in the AI model 550.

Modifying the data at the DPSes 506 prior to running the data throughthe AI model 550 (e.g., on or off the data storage devices 554) ortransmitting the data to AI host 552 for application of the AI model550, can increase security and reduce cost by avoiding sending the rawdata to a third-party data modification service. For instance, byreducing the time and distance traveled by the data (raw or modified)lost and/or corrupt data can be reduced. In some examples, bandwidth usecan be reduced, as applicable data is run through the AI model 550,transmitted to the AI host 552, or a combination thereof. In someexamples, data transmitted to/from the AI host 552 may be transmitted atparticular time intervals. For instance, multiple blocks of datamodified at one or more of the DPSes 506 may be compressed into a singleblock of data before being transmitted to the AI host 552 via acontroller 504 at the particular time interval.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art will appreciate that anarrangement calculated to achieve the same results can be substitutedfor the specific embodiments shown. This disclosure is intended to coveradaptations or variations of one or more embodiments of the presentdisclosure. It is to be understood that the above description has beenmade in an illustrative fashion, and not a restrictive one. Combinationof the above embodiments, and other embodiments not specificallydescribed herein will be apparent to those of skill in the art uponreviewing the above description. The scope of the one or moreembodiments of the present disclosure includes other applications inwhich the above structures and processes are used. Therefore, the scopeof one or more embodiments of the present disclosure should bedetermined with reference to the appended claims, along with the fullrange of equivalents to which such claims are entitled.

In the foregoing Detailed Description, some features are groupedtogether in a single embodiment for the purpose of streamlining thedisclosure. This method of disclosure is not to be interpreted asreflecting an intention that the disclosed embodiments of the presentdisclosure have to use more features than are expressly recited in eachclaim. Rather, as the following claims reflect, inventive subject matterlies in less than all features of a single disclosed embodiment. Thus,the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment.

What is claimed is:
 1. A method, comprising: receiving, at a controllerof a device, data associated with a read command or write commandtransmitted to a memory resource; modifying the data using logiccommunicatively coupled to the controller before transmitting the datato a host or image sensor or before writing the data to the memoryresource, wherein the modification comprises removing one or more bitsfrom the data, reordering one or more bits of the data, changing aformat of the data, or any combination thereof; and transmitting themodified data to the host or image sensor or writing the data to thememory resource based at least in part on the read command or the writecommand.
 2. The method of claim 1, further comprising: receiving thedata at the controller from a cloud service; and further modifying thedata by removing a portion of the data, correcting the data,standardizing the data, masking the data, or a combination thereof. 3.The method of claim 1, further comprising: receiving the data at thecontroller from the host; further modifying the data by removing aportion of the data, correcting the data, standardizing the data,masking the data, or a combination thereof; and encrypting, encoding,and writing the modified data to the memory resource for storage.
 4. Themethod of claim 1, further comprising: receiving the data as image dataat the controller from the image sensor; modifying the image data byremoving one or more bits from the image data, reordering one or morebits of the image data, changing a format of the image data, or anycombination thereof; and encrypting, encoding, and writing the modifiedimage data to the memory resource for storage.
 5. The method of claim 1,wherein: receiving the data at the controller of the device comprisesreceiving data at the controller of a sensor of an edge device; andtransmitting the modified data to a server communicatively coupled tothe sensor.
 6. The method of claim 1, wherein: receiving the data at thecontroller of the device comprises receiving data at the controller of adata node associated with an artificial intelligence (AI) host; andtransmitting the modified data to the AI host communicatively coupled tothe data node.
 7. The method of claim 1, wherein performing the actioncomprises: combining the modified data with different data modifiedusing different logic of a different device; and transmitting thecombined modified data to a host communicatively coupled to the deviceand the different device.
 8. A system, comprising: a memory resource,comprising: a controller configured to manage data associated with thememory resource; and a device communicatively coupled to the controllerand configured to modify the data before transmitting the data to a hostor image sensor or before writing the data to the memory resource,wherein the modification comprises removing one or more bits from thedata, reordering one or more bits of the data, changing a format of thedata, or any combination thereof.
 9. The system of claim 8, wherein thedevice configured to modify the data comprises the device configured tosequence the data.
 10. The system of claim 8, wherein the memoryresource is communicatively coupled to the host via a storage interface.11. The system of claim 8, wherein the controller configured to managethe data comprises the controller configured to encode and encrypt themodified data.
 12. The system of claim 8, wherein the controllerconfigured to manage the data comprises the controller configured toreceive the data from a host communicatively coupled to the memoryresource and transmit it to the device for modification.
 13. The systemof claim 8, wherein the controller configured to manage the datacomprises the controller configured to receive the modified data fromthe device and transmit it to a host communicatively coupled to thememory resource.
 14. The system of claim 8, wherein the device is ahardware intelligent chip.
 15. The system of claim 8, wherein the deviceis a hardware accelerator.
 16. A system, comprising: a storage devicecommunicatively coupled to a host and comprising: a first memoryresource, comprising: a first controller configured to manage dataassociated with the first memory resource; and a first devicecommunicatively coupled to the first controller and configured to modifythe data associated with the first memory resource, wherein themodification comprises removing one or more bits from the data,reordering one or more bits of the data, changing a format of the data,or any combination thereof; a second memory resource, comprising: asecond controller configured to manage data associated with the secondmemory resource; and a second device communicatively coupled to thesecond controller and configured to modify the data associated with thesecond memory resource, wherein the modification comprises removing oneor more bits from the data, reordering one or more bits of the data,changing a format of the data, or any combination thereof; and acombined device configured to collect and combine the data modified bythe first device and the data modified by the second device and transmitthe combined modified data to the host.
 17. The system of claim 16,further comprising: the first memory resource configured to store afirst data type; and the second memory resource configured to store asecond data type.
 18. The system of claim 16, wherein the storage deviceis a solid-state drive (SSD), the first memory resource is a volatilememory device, and the second memory resource is a non-volatile memorydevice.
 19. The system of claim 16, wherein the combined modified datais transmitted to the host at particular time intervals.
 20. The systemof claim 16, wherein: the first device comprises a first processingresource and logic to modify the data associated with the first memoryresource; and the second device comprises a second processing resourceand logic to modify the data associated with the second memory resource.