Patents by Inventor Michael J. Koester
Michael J. Koester has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11860947Abstract: Provided are a computer program product, system, and method for deleted data restoration in accordance with one embodiment of the present description, in which in response to a search request having specified search parameters, data of a deleted data unit is located as a function of specified search parameters. In addition, metadata erased as a result of the deletion operation, is restored as a function of the located data. Accordingly, the previously deleted data unit is undeleted and access to the previously deleted data unit is restored via the restored metadata. Other aspects of deleted data restoration in accordance with the present description are described.Type: GrantFiled: January 31, 2019Date of Patent: January 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Koester, Kevin L Miner, Raymond E. Garcia, Richard A. Schaeffer
-
Patent number: 10936194Abstract: In one aspect of storage device status management in accordance with the present description, a host can determine not only whether a particular volume maintained by a storage unit controlled by a storage controller is on-line with respect to another host, but also whether that volume is actually in use by another host. Accordingly, should one host determine that a volume is in use by another host, the one host can defer its use of the volume until the volume is no longer in use by another host. In this manner, conflicts which may lead to loss of data integrity may be reduced or eliminated, providing a significant improvement in computer technology. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: October 16, 2018Date of Patent: March 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Koester, Kevin L. Miner, Thao Bui, Richard A. Schaeffer
-
Patent number: 10782893Abstract: A computer-implemented method according to one embodiment includes receiving a first command to inhibit one or more tracks within a volume of a storage system, in response to the first command, identifying the one or more tracks within the volume of the storage system, utilizing the first command or a previous command, and inhibiting the one or more tracks within the volume of the storage system, receiving a second command to copy data to the one or more tracks within the volume of the storage system, identifying the one or more tracks within the volume of the storage system as inhibited, and rejecting the second command, in response to the identifying.Type: GrantFiled: February 22, 2017Date of Patent: September 22, 2020Assignee: International Business Machines CorporationInventors: Lisa J. Gundy, Michael J. Koester, Kevin L. Miner
-
Publication number: 20200250050Abstract: Provided are a computer program product, system, and method for deleted data restoration in accordance with one embodiment of the present description, in which in response to a search request having specified search parameters, data of a deleted data unit is located as a function of specified search parameters. In addition, metadata erased as a result of the deletion operation, is restored as a function of the located data. Accordingly, the previously deleted data unit is undeleted and access to the previously deleted data unit is restored via the restored metadata. Other aspects of deleted data restoration in accordance with the present description are described.Type: ApplicationFiled: January 31, 2019Publication date: August 6, 2020Inventors: Michael J. Koester, Kevin L. Miner, Raymond E. Garcia, Richard A. Schaeffer
-
Patent number: 10691549Abstract: A storage controller receives a command to delete a dataset stored in a first set of storage volumes controlled by the storage controller. In response to receiving the command, a determination is made as to whether an indicator has been enabled to protect the dataset against an accidental deletion. In response to determining that the indicator has been enabled, the dataset is copied from the first set of storage volumes to a second set of storage volumes controlled by the storage controller. In response to completion of the copying of the dataset from the first set of storage volumes to the second set of storage volumes, the command to delete the dataset stored in the first set of storage volumes is executed.Type: GrantFiled: February 8, 2018Date of Patent: June 23, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Koester, Kevin L. Miner, Trinh Nguyen, Steven Huntington
-
Publication number: 20200117366Abstract: In one aspect of storage device status management in accordance with the present description, a host can determine not only whether a particular volume maintained by a storage unit controlled by a storage controller is on-line with respect to another host, but also whether that volume is actually in use by another host. Accordingly, should one host determine that a volume is in use by another host, the one host can defer its use of the volume until the volume is no longer in use by another host. In this manner, conflicts which may lead to loss of data integrity may be reduced or eliminated, providing a significant improvement in computer technology. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: October 16, 2018Publication date: April 16, 2020Inventors: Michael J. Koester, Kevin L. Miner, Thao Bui, Richard A. Schaeffer
-
Patent number: 10564874Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, the request including a volume serial number associated with the storage device, identifying a size of the storage device, where the size is indicated within the request, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device, selecting a type of the table of contents from a plurality of different types, based on the identified size of the storage device, and automatically initializing the storage device, including creating the table of contents, reserving a physical area of the storage device for the table of contents using a physical extent, and inserting the table of contents into the storage device, where the table of contents has the determined size of the table of contents, the determined location for the table of contents, and the selected type of the table of contents.Type: GrantFiled: April 10, 2018Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
-
Publication number: 20190243716Abstract: A storage controller receives a command to delete a dataset stored in a first set of storage volumes controlled by the storage controller. In response to receiving the command, a determination is made as to whether an indicator has been enabled to protect the dataset against an accidental deletion. In response to determining that the indicator has been enabled, the dataset is copied from the first set of storage volumes to a second set of storage volumes controlled by the storage controller. In response to completion of the copying of the dataset from the first set of storage volumes to the second set of storage volumes, the command to delete the dataset stored in the first set of storage volumes is executed.Type: ApplicationFiled: February 8, 2018Publication date: August 8, 2019Inventors: Michael J. KOESTER, Kevin L. MINER, Trinh NGUYEN, Steven HUNTINGTON
-
Patent number: 10303380Abstract: In one embodiment, a computer program product for managing a reserve command includes a computer readable storage medium having program code embodied therewith, the program code readable and/or executable by a processor to receive, by the processor, a request to access a data set on one or more volumes of at least one direct access storage device (DASD), the request including a reserve command, and each of the one or more volumes including a consecutive set of one or more tracks of the at least one DASD, and reserve one or more extents of the at least one DASD while reserving less than a volume of the at least one DASD and not allowing any other entity than an entity which requested the reserve to access the one or more extents of the at least one DASD that have been reserved.Type: GrantFiled: June 10, 2014Date of Patent: May 28, 2019Assignee: International Business Machines CorporationInventors: Susan K. Candelaria, Clint A. Hardy, Gavin S. Johnson, Matthew J. Kalos, Michael J. Koester, John R. Paveza, Carrie J. Van Noorden
-
Patent number: 10216439Abstract: In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the storage volume, sending a bit map to a hardware portion of the storage volume, in response to receiving the request, identifying unallocated data within the hardware portion of the storage volume utilizing the bit map, and marking the unallocated data as read inhibited within the hardware portion of the storage volume.Type: GrantFiled: February 2, 2016Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Stephen M. Branch, Harold S. Huber, Michael J. Koester, Kevin L. Miner
-
Publication number: 20180239544Abstract: A computer-implemented method according to one embodiment includes receiving a first command to inhibit one or more tracks within a volume of a storage system, in response to the first command, identifying the one or more tracks within the volume of the storage system, utilizing the first command or a previous command, and inhibiting the one or more tracks within the volume of the storage system, receiving a second command to copy data to the one or more tracks within the volume of the storage system, identifying the one or more tracks within the volume of the storage system as inhibited, and rejecting the second command, in response to the identifying.Type: ApplicationFiled: February 22, 2017Publication date: August 23, 2018Inventors: Lisa J. Gundy, Michael J. Koester, Kevin L. Miner
-
Publication number: 20180232170Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, the request including a volume serial number associated with the storage device, identifying a size of the storage device, where the size is indicated within the request, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device, selecting a type of the table of contents from a plurality of different types, based on the identified size of the storage device, and automatically initializing the storage device, including creating the table of contents, reserving a physical area of the storage device for the table of contents using a physical extent, and inserting the table of contents into the storage device, where the table of contents has the determined size of the table of contents, the determined location for the table of contents, and the selected type of the table of contents.Type: ApplicationFiled: April 10, 2018Publication date: August 16, 2018Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
-
Patent number: 10021148Abstract: In one embodiment, a computer-implemented method includes: receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary storage system and a secondary storage system; and copying one or more data tracks of a primary storage device in the primary storage system to the secondary storage system without copying at least one other data track of the primary storage device to the secondary storage system. The one or more data tracks of the primary storage device comprise one or more data tracks of a first characteristic. Other portions of the primary storage device comprise one or more other data tracks of a second characteristic. Tracks of the first characteristic may include valid data records, while tracks of the second characteristic may include invalid data records and/or empty tracks. Corresponding systems and computer program products are also disclosed.Type: GrantFiled: May 18, 2016Date of Patent: July 10, 2018Assignee: International Business Machines CorporationInventors: Gavin S. Johnson, Michael J. Koester, Kevin L. Miner
-
Patent number: 9996294Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, identifying a size of the storage device to be initialized, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device to be initialized, determining a type of the table of contents; and initializing the storage device, utilizing the determined size of the table of contents, the determined location for the table of contents, and the determined type of the table of contents.Type: GrantFiled: February 2, 2016Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
-
Publication number: 20170220288Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, identifying a size of the storage device to be initialized, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device to be initialized, determining a type of the table of contents; and initializing the storage device, utilizing the determined size of the table of contents, the determined location for the table of contents, and the determined type of the table of contents.Type: ApplicationFiled: February 2, 2016Publication date: August 3, 2017Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
-
Publication number: 20170220272Abstract: In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the storage volume, sending a bit map to a hardware portion of the storage volume, in response to receiving the request, identifying unallocated data within the hardware portion of the storage volume utilizing the bit map, and marking the unallocated data as read inhibited within the hardware portion of the storage volumeType: ApplicationFiled: February 2, 2016Publication date: August 3, 2017Inventors: Stephen M. Branch, Harold S. Huber, Michael J. Koester, Kevin L. Miner
-
Publication number: 20160261650Abstract: In one embodiment, a computer-implemented method includes: receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary storage system and a secondary storage system; and copying one or more data tracks of a primary storage device in the primary storage system to the secondary storage system without copying at least one other data track of the primary storage device to the secondary storage system. The one or more data tracks of the primary storage device comprise one or more data tracks of a first characteristic. Other portions of the primary storage device comprise one or more other data tracks of a second characteristic. Tracks of the first characteristic may include valid data records, while tracks of the second characteristic may include invalid data records and/or empty tracks. Corresponding systems and computer program products are also disclosed.Type: ApplicationFiled: May 18, 2016Publication date: September 8, 2016Inventors: Gavin S. Johnson, Michael J. Koester, Kevin L. Miner
-
Patent number: 9361026Abstract: In one embodiment, a method includes receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary storage system and a secondary storage system, and copying one or more data tracks of a primary storage device in the primary storage system to the secondary storage system without copying at least one other data track of the primary storage device to the secondary storage system. The one or more data tracks of the primary storage device comprise one or more data tracks of a first characteristic. Other portions of the primary storage device comprise one or more other data tracks of a second characteristic.Type: GrantFiled: April 30, 2015Date of Patent: June 7, 2016Assignee: International Business Machines CorporationInventors: Gavin S. Johnson, Michael J. Koester, Kevin L. Miner
-
Publication number: 20150355860Abstract: In one embodiment, a computer program product for managing a reserve command includes a computer readable storage medium having program code embodied therewith, the program code readable and/or executable by a processor to receive, by the processor, a request to access a data set on one or more volumes of at least one direct access storage device (DASD), the request including a reserve command, and each of the one or more volumes including a consecutive set of one or more tracks of the at least one DASD, and reserve one or more extents of the at least one DASD while reserving less than a volume of the at least one DASD and not allowing any other entity than an entity which requested the reserve to access the one or more extents of the at least one DASD that have been reserved.Type: ApplicationFiled: June 10, 2014Publication date: December 10, 2015Inventors: Susan K. Candelaria, Clint A. Hardy, Gavin S. Johnson, Matthew J. Kalos, Michael J. Koester, John R. Paveza, Carrie J. Van Noorden
-
Patent number: 9201809Abstract: Various embodiments of accidental shared volume erasure prevention include systems, methods, and/or computer program products for receiving a request to access a volume from a requesting system, determining whether the volume is associated with any system other than the requesting system, and preventing accidental erasure of the volume based on the determination.Type: GrantFiled: May 14, 2013Date of Patent: December 1, 2015Inventors: Gavin S. Johnson, Michael J. Koester, John R. Paveza