Patents by Inventor Theresa Mary Brown
Theresa Mary Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947808Abstract: A computer-implemented method according to one aspect includes monitoring a current usage of a backup storage space for a storage volume; comparing the current usage to a capacity threshold; and conditionally increasing a size of the backup storage space, based on the comparing and a predetermined size limitation.Type: GrantFiled: February 10, 2022Date of Patent: April 2, 2024Assignee: International Business Machines CorporationInventors: Nedlaya Yazzie Francisco, Theresa Mary Brown, Nicolas Marc Clayton, David Fei, Terry O'Connor
-
Publication number: 20230418960Abstract: Ensuring that enterprise data that has potentially become corrupted is recoverable and usable by creating safeguarded copy volumes of the enterprise data. One important aspect of any corruption detection scheme is to determine when the data has become corrupted and locate the last known uncorrupted copy of the data as quickly as possible. Once this set of data is identified, the restoration process can begin with that data, and subsequent logged transactions can be reapplied if possible, which brings the data to the most recent and uncorrupted version.Type: ApplicationFiled: June 28, 2022Publication date: December 28, 2023Inventors: Theresa Mary Brown, Dale F Riedy, William J. Rooney, Scott B. Compton, Gregory Edward McBride, John R. Paveza
-
Publication number: 20230418961Abstract: Providing fine granularity read access to generational copies of safeguarded copy data. In some instances, a fine granularity read access to generational copies of safeguarded copy data includes the ability to use a generation ID to determine the exact generation copy that contains relevant enterprise related data that must be recovered and/or utilized. Additionally, the fine granularity read access is done in a manner that does not require a restore of the relevant enterprise related data to a recovery volume and that does not compromise other generation copies.Type: ApplicationFiled: June 28, 2022Publication date: December 28, 2023Inventors: William J. Rooney, Gregory Edward McBride, Dale F Riedy, Scott B. Compton, Theresa Mary Brown
-
Patent number: 11853585Abstract: A computer-implemented method according to one embodiment includes identifying data to be transferred as part of a point-in-time snapshot copy operation; setting a data consistency application in an idle state; marking the data while the data consistency application is in the idle state; restarting the data consistency application; identifying, by the data consistency application, the marked data; creating, by the data consistency application, a consistency group including the marked data; and performing replication of the consistency group.Type: GrantFiled: January 27, 2020Date of Patent: December 26, 2023Assignee: International Business Machines CorporationInventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Patent number: 11775395Abstract: A computer-implemented method according to one embodiment includes receiving a request to withdraw a point-in-time snapshot copy operation being implemented by a data consistency application; in response to determining that the data consistency application is creating a current consistency group, maintaining the withdrawal request while allowing the creation of the current consistency group by the data consistency application; and in response to determining that the data consistency application is idle, preventing a formation of a new consistency group by the data consistency application during the withdrawal of the point-in-time snapshot copy operation.Type: GrantFiled: January 27, 2020Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Patent number: 11644997Abstract: A computer-implemented method according to one aspect includes receiving an indication of a track range to be released within a storage volume; identifying a data backup within a backup storage space for the storage volume that corresponds to the track range; and releasing the track range within the storage volume in response to determining that the corresponding data backup has expired within the backup storage space.Type: GrantFiled: August 6, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Matthew Sanchez, Theresa Mary Brown, Nedlaya Yazzie Francisco, Nicolas Marc Clayton, David Brent Schreiber, Mark L. Lipets, Jared Michael Minch
-
Publication number: 20220164116Abstract: A computer-implemented method according to one aspect includes monitoring a current usage of a backup storage space for a storage volume; comparing the current usage to a capacity threshold; and conditionally increasing a size of the backup storage space, based on the comparing and a predetermined size limitation.Type: ApplicationFiled: February 10, 2022Publication date: May 26, 2022Inventors: Nedlaya Yazzie Francisco, Theresa Mary Brown, Nicolas Marc Clayton, David Fei, Terry O'Connor
-
Patent number: 11275514Abstract: A computer-implemented method according to one aspect includes receiving a request to increase a size of a backup storage space for a storage volume; adding additional extents to the backup storage space in response to the request; identifying a current extent location within the backup storage space; determining whether any filled extent locations exist between the current extent location and the additional extents added to the backup storage space; and conditionally utilizing the additional extents added to the backup storage space, based on the determining.Type: GrantFiled: August 10, 2020Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Nedlaya Yazzie Francisco, Theresa Mary Brown, Nicolas Marc Clayton, David Fei, Terry O'Connor
-
Publication number: 20220043583Abstract: A computer-implemented method according to one aspect includes receiving a request to increase a size of a backup storage space for a storage volume; adding additional extents to the backup storage space in response to the request; identifying a current extent location within the backup storage space; determining whether any filled extent locations exist between the current extent location and the additional extents added to the backup storage space; and conditionally utilizing the additional extents added to the backup storage space, based on the determining.Type: ApplicationFiled: August 10, 2020Publication date: February 10, 2022Inventors: Nedlaya Yazzie Francisco, Theresa Mary Brown, Nicolas Marc Clayton, David Fei, Terry O'Connor
-
Publication number: 20220043573Abstract: A computer-implemented method according to one aspect includes receiving an indication of a track range to be released within a storage volume; identifying a data backup within a backup storage space for the storage volume that corresponds to the track range; and releasing the track range within the storage volume in response to determining that the corresponding data backup has expired within the backup storage space.Type: ApplicationFiled: August 6, 2020Publication date: February 10, 2022Inventors: Matthew Sanchez, Theresa Mary Brown, Nedlaya Yazzie Francisco, Nicolas Marc Clayton, David Brent Schreiber, Mark L. Lipets, Jared Michael Minch
-
Patent number: 11093320Abstract: Described herein are techniques for diagnostic analysis in computational systems. The techniques including a method comprising receiving error documentation related to a system having a plurality of hardware components and a plurality of software components, where the error documentation is received from a user device associated with a user profile having permissions. The method further comprises generating a diagnostic plan including a diagnostic tool based on the error documentation. The method further comprises implementing the diagnostic tool on at least one component selected from a group consisting of: the plurality of hardware components, and the plurality of software components. The method further comprises receiving censored diagnostic output in response to implementing the diagnostic tool, where the censored diagnostic output is censored according to the defined permissions of the user profile.Type: GrantFiled: August 12, 2019Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: David C. Reed, Becky Enderle, Theresa Mary Brown, Christina Lara, Rubi Roxana Ballesteros
-
Publication number: 20210232462Abstract: A computer-implemented method according to one embodiment includes receiving a request to withdraw a point-in-time snapshot copy operation being implemented by a data consistency application; in response to determining that the data consistency application is creating a current consistency group, maintaining the withdrawal request while allowing the creation of the current consistency group by the data consistency application; and in response to determining that the data consistency application is idle, preventing a formation of a new consistency group by the data consistency application during the withdrawal of the point-in-time snapshot copy operation.Type: ApplicationFiled: January 27, 2020Publication date: July 29, 2021Inventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Publication number: 20210232316Abstract: A computer-implemented method according to one embodiment includes determining that a consistency group has not been created within a predetermined period of time; sending a request to create the consistency group, where the request includes an indication that a creation of the consistency group is mandatory; identifying one or more logical storage volumes associated with the request to create the consistency group; marking each of the identified one or more logical storage volumes to indicate that a point-in-time snapshot copy operation is not allowed for the one or more logical storage volumes; creating the consistency group; sending the consistency group from a source site to a destination site; and removing the marking from each of the identified one or more logical storage volumes to indicate that a point-in-time snapshot copy operation is allowed for the one or more logical storage volumes.Type: ApplicationFiled: January 27, 2020Publication date: July 29, 2021Inventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Publication number: 20210232315Abstract: A computer-implemented method according to one embodiment includes identifying data to be transferred as part of a point-in-time snapshot copy operation; setting a data consistency application in an idle state; marking the data while the data consistency application is in the idle state; restarting the data consistency application; identifying, by the data consistency application, the marked data; creating, by the data consistency application, a consistency group including the marked data; and performing replication of the consistency group.Type: ApplicationFiled: January 27, 2020Publication date: July 29, 2021Inventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Patent number: 11055017Abstract: A computer-implemented method according to one embodiment includes determining that a consistency group has not been created within a predetermined period of time; sending a request to create the consistency group, where the request includes an indication that a creation of the consistency group is mandatory; identifying one or more logical storage volumes associated with the request to create the consistency group; marking each of the identified one or more logical storage volumes to indicate that a point-in-time snapshot copy operation is not allowed for the one or more logical storage volumes; creating the consistency group; sending the consistency group from a source site to a destination site; and removing the marking from each of the identified one or more logical storage volumes to indicate that a point-in-time snapshot copy operation is allowed for the one or more logical storage volumes.Type: GrantFiled: January 27, 2020Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Matthew J. Ward, Theresa Mary Brown, Nedlaya Yazzie Francisco, Gail Spear
-
Publication number: 20210096959Abstract: Aspects of the invention include a continuous availability for workload and site switches with no data loss at unlimited distances in an active-active sites configuration. A non-limiting example computer-implemented method includes synchronously replicating commit records of changed workload data, by a processor, from an active site to a bunker site upon a workload data commit. The method asynchronously replicates committed transactions on changed workload data, by the processor, from the bunker site to a recovery site.Type: ApplicationFiled: September 27, 2019Publication date: April 1, 2021Inventors: David PETERSEN, Paul M. CADARETTE, Serge BOURBONNAIS, Michael Gerard FITZPATRICK, John Simon TILLING, Pamela L. MCLEAN, Gregory Walter VANCE, Matthew J. WARD, Theresa Mary BROWN, Nicolas Marc CLAYTON, Wei LIU, Hua ZHU, Xing Jun ZHOU
-
Publication number: 20210049063Abstract: Described herein are techniques for diagnostic analysis in computational systems. The techniques including a method comprising receiving error documentation related to a system having a plurality of hardware components and a plurality of software components, where the error documentation is received from a user device associated with a user profile having permissions. The method further comprises generating a diagnostic plan including a diagnostic tool based on the error documentation. The method further comprises implementing the diagnostic tool on at least one component selected from a group consisting of: the plurality of hardware components, and the plurality of software components. The method further comprises receiving censored diagnostic output in response to implementing the diagnostic tool, where the censored diagnostic output is censored according to the defined permissions of the user profile.Type: ApplicationFiled: August 12, 2019Publication date: February 18, 2021Inventors: David C. Reed, Becky Enderle, Theresa Mary Brown, Christina Lara, Rubi Roxana Ballesteros
-
Patent number: 9092155Abstract: A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein.Type: GrantFiled: March 15, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8892834Abstract: A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x.Type: GrantFiled: April 28, 2012Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8850147Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein.Type: GrantFiled: March 15, 2013Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren