Patents Assigned to Veritas Software
-
Patent number: 7523276Abstract: A method, system, computer system, and computer program product are provided to quickly synchronize selected data, such as a single file, from two or more versions of the data stored on different storage volumes. Selected data are synchronized with a snapshot of the data stored on a different storage volume without copying all of the data and without copying the entire set of selected data. The present invention has minimal impact on performance of applications using the data having one or more snapshots. Other data stored on the storage volumes (not part of the selected data) remain available for use and retain changes made prior to the synchronization.Type: GrantFiled: June 30, 2003Date of Patent: April 21, 2009Assignee: Veritas Software CorporationInventor: Vinod R. Shankar
-
Publication number: 20040123031Abstract: Disclosed is a method and apparatus for refreshing a copy of a data volume. In one embodiment of the method first and second data portions of a data volume are copied to first and second memory blocks, respectively, of a memory coupled to a computer system. First and second bits of a first map stored in memory are then set, wherein the first and second bits correspond to the first and second memory blocks, respectively. The first data portion of the data volume is modified after the first data portion is copied to the first memory block. A first bit in a second map stored in memory is set after data of the first data portion is modified. An instruction is generated to refresh the data contents of the first and second memory blocks. The first bit of the first map is cleared in response to generation of the refresh instruction.Type: ApplicationFiled: December 19, 2002Publication date: June 24, 2004Applicant: VERITAS Software CorporationInventors: Oleg Kiselev, John A. Colgrove, Anand A. Kekre
-
Publication number: 20040123030Abstract: A method, system, and computer program product for adaptively implementing capabilities of a logical volume. If a particular capability is an inherent attribute of an existing storage device, the existing storage device is chosen to implement the volume. If the particular capability is not an inherent attribute of an existing storage device, one or more storage devices are selected and configured to provide the capability. If a capacity is requested for the logical volume and a storage device provides only a portion of the capacity, multiple storage devices having the capability are combined to provide the requested capability and capacity.Type: ApplicationFiled: December 20, 2002Publication date: June 24, 2004Applicant: VERITAS Software CorporationInventors: Chirag Deepak Dalal, Vaijayanti Rakshit Bharadwaj, Pradip Madhukar Kulkarni, Ronald S. Karr
-
Publication number: 20040123053Abstract: Systems and methods for I/O fencing in a shared storage environment are provided. Prior to initiating an I/O request, when feasible, the current time from a local timer is compared to the current state of an interval obtained for the target device. As a result, a device reset occurring while the interval is viable does not arbitrarily end a multiphase I/O operation. However, a device reset occurring once the lease has expired results in a delay or termination of the multiphase I/O operation. As a result, multiphase I/O operations from initiating hosts that have lost contact with the shared storage environment are not allowed to corrupt the shared storage devices.Type: ApplicationFiled: December 18, 2002Publication date: June 24, 2004Applicant: Veritas Software CorporationInventors: Ronald S. Karr, John A. Colgrove, Oleg Kiselev
-
Publication number: 20040123062Abstract: A method, system, language, and computer program product to enable a user to provide a high-level specification of storage requirements without having detailed knowledge of the underlying vendor-specific APIs and command line utilities for each possible storage device used to meet the storage requirements. The user does not specify how to implement the storage requirements. The system implements the high-level specification in hardware and/or software without further direction from the user.Type: ApplicationFiled: December 20, 2002Publication date: June 24, 2004Applicant: VERITAS Software CorporationInventors: Chirag Deepak Dalal, Vaijayanti Rakshit Bharadwaj, Pradip Madhukar Kulkarni, Ronald S. Karr, John A. Colgrove
-
Publication number: 20040120225Abstract: A method, system, and language to express storage requirements. The language provides keywords and rules corresponding to commands for configuring a set of storage devices to provide requested capabilities of a logical volume. The language also has keywords and constructs for defining capabilities. The language supports direct inheritance of a capability, where a template specifies another template that contains rules to be used to provide a given capability. The language also supports indirect inheritance of a capability, where a template requires a capability but does not provide an implementation of the capability. In addition, the language is processed to “merge” rules by selecting a single storage device that conforms to more than one rule when possible. Merging rules enables a minimum number of storage devices to be used to meet a given logical volume configuration and set of capabilities.Type: ApplicationFiled: December 20, 2002Publication date: June 24, 2004Applicant: VERITAS Software CorporationInventors: Chirag Deepak Dalal, Vaijayanti Rakshit Bharadwaj, Pradip Madhukar Kulkarni, Ronald S. Karr
-
Publication number: 20040044856Abstract: Methods and systems for storage architectures are provided. Storage resource provider modules interface with storage resources to perform storage operations. A storage management data store maintains storage data associated with a storage environment of the storage resources. The storage resource provider modules retrieve and update the storage management data in response to processing the storage operations. In one embodiment, a storage management application requests a selected storage resource provider module to perform a selected storage operation. The storage management application determines the selected storage resource provider module by acquiring the storage management data in the data store.Type: ApplicationFiled: August 30, 2002Publication date: March 4, 2004Applicant: Veritas Software CorporationInventors: Steven Michael Umbehocker, Allen Unueco, Bruce Lowe, Venkeepuram R. Satish
-
Publication number: 20040039756Abstract: A secondary host on a storage area network (SAN) replicates files utilized and/or managed by a primary host by direct transfer of the files over the SAN to achieve substantially network free file replication. The secondary host receives SAN-relative extent information from the primary host system, converts the SAN-relative extent information to local extent information that is used by the secondary host to retrieve the files directly from disk storage on the SAN. The secondary host may then retrieve the files from the SAN using the local extent information, and may store the files on storage elements of the SAN thus creating a copy of the files. The SAN-relative extent information may be received over an external network from the primary host system. The SAN-relative extent information may physically identify actual storage elements and may include an identifier that uniquely identifies the storage elements on the SAN.Type: ApplicationFiled: August 20, 2002Publication date: February 26, 2004Applicant: Veritas Software CorporationInventor: Graham Bromley
-
Publication number: 20040034703Abstract: A table-based packet sniffing/decoding system and method suitable for cluster server systems is provided. Packets having portions of various protocols are communicated between nodes of a cluster server. Fields of the packets are decoded using protocol definition tables and may be stored for subsequent analysis. A protocol is identified from a protocol identification field of a packet and the field definition table is identified for the identified protocol. The field definition table defines fields of packets for a particular protocol and identifies a field decode handler for use in decoding each field. A filter may be applied to selectively decode (or refrain from decoding) certain fields. A filter may also be applied to selectively decode particular protocols.Type: ApplicationFiled: August 16, 2002Publication date: February 19, 2004Applicant: Veritas Software CorporationInventor: Abhay N. Phadke
-
Publication number: 20040024984Abstract: Methods and systems to bridge storage management software are provided. A first storage management application communicates with a host and performs an analysis of a storage environment associated with the host. The first storage management application uses the analysis to determine if a storage resource interface is controlled by a second storage management application, and if so a plugin application is accessed by the first storage management application to permit the second storage management application to perform a storage management operation on behalf of the host. In one embodiment, the analysis is updated by the first storage management application upon receiving results from second storage management application, where the results reflect the processing of the storage management operation by the second storage management application.Type: ApplicationFiled: July 30, 2002Publication date: February 5, 2004Applicant: Veritas Software CorporationInventors: Thomas W. Lanzatella, John A. Colgrove, Blaine T. Cuykendall, Allen Unueco, Graham Bromley
-
Publication number: 20040010666Abstract: Storage services and systems are provided. Virtual disks include a number of storage states and are associated with storage operations that are provided with the virtual disks. Moreover, a storage management set of executable instructions is configured based on values assigned to the states when the storage operations are performed against the virtual disks. In some embodiments, a selection set of executable instructions permits the selective execution of the storage operations.Type: ApplicationFiled: July 11, 2002Publication date: January 15, 2004Applicant: Veritas Software CorporationInventors: Steven Michael Umbehocker, Allen Unueco, Ankur Kemkar, Shaloo K. Chaudhary
-
Publication number: 20030233510Abstract: Storage resource integration layer interfaces are provided. Storage operations associated with interfaces of a plurality of storage resources are normalized and provided as a common set of modules accessible to a storage application. Moreover, configuration modules are provided to the storage application to acquire configuration settings associated with storage residing on the storage resources. In one embodiment, virtualization modules are provided to the storage application to permit the storage application to create and link virtual storage resources from the storage resources.Type: ApplicationFiled: June 18, 2002Publication date: December 18, 2003Applicant: Veritas Software CorporationInventors: Steven Michael Umbehocker, Allen Unueco
-
Publication number: 20030163495Abstract: Methods and systems to backup data are provided. A first computing device identifies data to backup and stabilizes a frozen image of that data. Next, the frozen image is decomposed into physical storage addresses housing the data. The decomposed storage addresses are sent to a second computing device. The second computing device uses the storage addresses along with existing operating system I/O operations to backup the data to computer readable media.Type: ApplicationFiled: February 28, 2002Publication date: August 28, 2003Applicant: Veritas Software CorporationInventors: Thomas W. Lanzatella, Graham Bromley, Weibao Wu
-
Patent number: 6282710Abstract: A computer readable memory to direct a computer to enable AutoRun functionality for basic removable disc drives. The computer readable memory stores a first, second and third set of instructions. The first set of instructions directs the computer to determine whether a removable disc has been inserted into a basic removable disc drive. The second set of instructions directs the computer to inform the operating system that the removable disc has been inserted into the basic removable disc drive, causing the operating system to execute an autorun.inf file on the removable disk without any user input. The third set of instructions directs the computer to repeat the execution of the first and second set of instructions while the computer does not seek to power down.Type: GrantFiled: October 28, 1998Date of Patent: August 28, 2001Assignee: Veritas Software Corp.Inventor: Paul Joseph Boehler
-
Patent number: 6145012Abstract: A method of transferring a file is executed by a client computer under control of a first program portion and is alsoexecuted by a server computer under control of a second program portion. The server computer stores a baseline file having baseline data. The client computer stores a local file that is a modified baseline file having modified data. The client computer is coupled to the server computer. First tier baseline reference keys are generated for and associated with first tier subsets of the baseline data stored in the baseline file. First tier client reference keys are generated for and associated with first tier subsets of the modified data stored in the local file. When the associated reference keys match, one of the first tier subsets of baseline data is transferred to a destination file stored on the server computer.Type: GrantFiled: October 14, 1998Date of Patent: November 7, 2000Assignee: Veritas Software CorporationInventor: Hunter Small
-
Patent number: 6021408Abstract: A log device is coupled in the logical data transfer path between a storage device, which provides for the storage of file and system data within a main filesystem layout, and a computer system. The log device provides for the storage of the file and system data within a log structured filesystem layout. A control program is executed to manage the storage of file and system data in data segments in the log device filesystem and to selectively transfer the file and system data from the log device to the storage device. The control program utilizes location data provided in the file and system data to identify a destination storage location for the file and system data within the main filesystem layout.Type: GrantFiled: September 12, 1996Date of Patent: February 1, 2000Assignee: Veritas Software Corp.Inventors: Joel E. Ledain, John A. Colgrove, Dan Koren
-
Patent number: 5996054Abstract: A log device based data storage subsystem provides for the efficient storage and retrieval of data with respect to an operating system executing on a computer system coupled to the data storage system. The data storage system includes a storage device providing for the storage of predetermined file and system data, as provided by the computer system, within a main filesystem layout established in the storage device. The data storage system also includes a log device coupled in the logical data transfer path between storage device and the computer system. The log device provides for the storage of the predetermined file and system data within a log structured filesystem layout established in the log device.Type: GrantFiled: September 12, 1996Date of Patent: November 30, 1999Assignee: Veritas Software Corp.Inventors: Joel E. Ledain, John A. Colgrove, Dan Koren
-
Patent number: 5944782Abstract: A management system for event management in a computer network includes management interfaces residing on an administrative computers, management engines residing on server computers, and management agents residing on managed computers within the network. The management agent uses alarms corresponding to predefined events to notify the management interface via the management engine if the predefined events occur, thereby allowing the system administrator to administer the managed computer network. The management agents may also include corrective scripts which are automatically executed in response to the predefined events and a threshold adjustment module which adjusts threshold values which are used to trigger the alarms.Type: GrantFiled: October 16, 1996Date of Patent: August 31, 1999Assignee: Veritas Software CorporationInventors: Ken Noble, Scott Foote, Steve Foote
-
Patent number: 5872931Abstract: A management system for event management in a computer network includes management interfaces residing on an administrative computers, management engines residing on server computers, and management agents residing on managed computers within the network. The management agent uses alarms corresponding to predefined events to notify the management interface via the management engine if the predefined events occur, thereby allowing the system administrator to administer the managed computer network. The management agents may also include corrective scripts which are automatically executed in response to the predefined event and a connection aging module which releases inactive connections between the management agent and the management engine.Type: GrantFiled: August 13, 1996Date of Patent: February 16, 1999Assignee: Veritas Software, Corp.Inventor: Dinkar Chivaluri
-
Patent number: 5852724Abstract: The present invention is directed toward a system and method for server back-up. A set of Primary servers and at least on secondary server is coupled to a set of networks. Each server has a host file module for assigning it a common node name and a unique node name. Each server has a high availability module for transmitting a server status over a network. The primary servers each have a set of services operating on their respective networks. The secondary server has a duplicate set of each service running on each primary server. Upon detecting a primary server status which indicates that a primary server is inoperative, the secondary server starts the duplicate set of the primary set of services corresponding to the now inoperative primary server.Type: GrantFiled: June 18, 1996Date of Patent: December 22, 1998Assignee: Veritas Software Corp.Inventors: Fletcher M. Glenn, II, Bruce D. Parker