Patents by Inventor Alexander H. Ainscow
Alexander H. Ainscow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11755419Abstract: Method, apparatus, and computer program product utilizing a hot-spare node in a storage network having a deduplication fingerprints database. A plurality of nodes is provided in the storage network including at least one active node and at least one hot-spare node. A portion of the deduplication fingerprints database is stored on each active node and on each hot-spare node. Data from the deduplication fingerprints database is provided from at least one of said at least one hot-spare node during normal operation. Responsive to a failure of one of said at least one active node, a portion of the deduplication fingerprints database associated with data stored on the failed one of said at least one active node is retained on one of the at least one hot-spare node. The failed one active node is replaced with one of the at least one hot-spare node.Type: GrantFiled: September 6, 2018Date of Patent: September 12, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander H. Ainscow, Ben Sasson, Gordon Hutchison, Miles Mulholland, Lee J. Sanders
-
Patent number: 10956084Abstract: According to one embodiment, a method, computer system, and computer program product for adjusting tiering based on operation types in a multi-tier storage system is provided. The present invention may include retrieving an extent to be managed and operations associated with the extent; analyzing the operations of the extent to determine an IO pattern associated with the extent; receiving a list of storage devices within the multi-tier storage system; querying each storage device of the storage devices for suitable pattern types; selecting, based on the querying and the IO pattern associated with the extent, a suitable storage device; and transferring the extent to the suitable storage device.Type: GrantFiled: May 4, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Alexander H. Ainscow, Duo Chen, John M. Clifton, Kushal Patel, Sarvesh Patel
-
Patent number: 10691357Abstract: A computer-implemented method, according to one embodiment, includes: detecting that a configuration change for a virtualization layer in a multi-tiered data storage system has been received, and determining whether the configuration change corresponds to a tiering adjustment. In response to determining that the configuration change corresponds to a tiering adjustment, I/O pattern changes are predicted. Moreover, a determination is made as to whether each specific extent is stored in a tier of the multi-tiered data storage system suitable to satisfy the predicted I/O pattern changes which correspond to the respective specific extent. In response to determining that one of the specific extents is stored in a tier of the multi-tiered data storage system which is not suitable to satisfy the predicted I/O pattern changes, the at least one specific extent is migrated to another one of the tiers determined as being suitable to satisfy the predicted I/O pattern changes.Type: GrantFiled: August 8, 2018Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Alexander H. Ainscow, John M. Clifton, Sarvesh S. Patel, Kushal S. Patel, Kalpesh Chhajed
-
Publication number: 20200081797Abstract: Method, apparatus, and computer program product utilizing a hot-spare node in a storage network having a deduplication fingerprints database. A plurality of nodes is provided in the storage network including at least one active node and at least one hot-spare node. A portion of the deduplication fingerprints database is stored on each active node and on each hot-spare node. Data from the deduplication fingerprints database is provided from at least one of said at least one hot-spare node during normal operation. Responsive to a failure of one of said at least one active node, a portion of the deduplication fingerprints database associated with data stored on the failed one of said at least one active node is retained on one of the at least one hot-spare node. The failed one active node is replaced with one of the at least one hot-spare node.Type: ApplicationFiled: September 6, 2018Publication date: March 12, 2020Inventors: Alexander H. Ainscow, Ben Sasson, Gordon Hutchison, Miles Mulholland, Lee J. Sanders
-
Publication number: 20200050381Abstract: A computer-implemented method, according to one embodiment, includes: detecting that a configuration change for a virtualization layer in a multi-tiered data storage system has been received, and determining whether the configuration change corresponds to a tiering adjustment. In response to determining that the configuration change corresponds to a tiering adjustment, I/O pattern changes are predicted. Moreover, a determination is made as to whether each specific extent is stored in a tier of the multi-tiered data storage system suitable to satisfy the predicted I/O pattern changes which correspond to the respective specific extent. In response to determining that one of the specific extents is stored in a tier of the multi-tiered data storage system which is not suitable to satisfy the predicted I/O pattern changes, the at least one specific extent is migrated to another one of the tiers determined as being suitable to satisfy the predicted I/O pattern changes.Type: ApplicationFiled: August 8, 2018Publication date: February 13, 2020Inventors: Alexander H. Ainscow, John M. Clifton, Sarvesh S. Patel, Kushal S. Patel, Kalpesh Chhajed
-
Publication number: 20190339903Abstract: According to one embodiment, a method, computer system, and computer program product for adjusting tiering based on operation types in a multi-tier storage system is provided. The present invention may include retrieving an extent to be managed and operations associated with the extent; analyzing the operations of the extent to determine an IO pattern associated with the extent; receiving a list of storage devices within the multi-tier storage system; querying each storage device of the storage devices for suitable pattern types; selecting, based on the querying and the IO pattern associated with the extent, a suitable storage device; and transferring the extent to the suitable storage device.Type: ApplicationFiled: May 4, 2018Publication date: November 7, 2019Inventors: Alexander H. Ainscow, Duo Chen, John M. Clifton, Kushal Patel, Sarvesh Patel
-
Publication number: 20190235959Abstract: Disclosed is a computer-implemented method in a storage controller of changing a preferred node from a first node to a second node, comprising: receiving a notification of a request to remove the first node; reporting ports on the first node as non-preferred instead of reporting them as preferred; reporting ports on the second node as preferred instead of reporting them as non-preferred; compiling a target port groups report for each of the first node and the second node; and raising an asymmetric access state changed unit attention notification.Type: ApplicationFiled: January 30, 2018Publication date: August 1, 2019Inventors: Alexander H. Ainscow, Christopher W. Bulmer, Andrew D. Martin, Timothy A. Moran
-
Patent number: 10210127Abstract: A method includes monitoring port login requests initiated by elements of a storage system, the storage system comprising interconnection cabling, constructing a connection graph corresponding to the port login requests, wherein each edge of the connection graph corresponds to a specific port login request and each vertex of the connection graph corresponds to a port within the storage system, and using the connection graph to evaluate the interconnection cabling of the storage system. A corresponding computer program product and computer system are also disclosed herein.Type: GrantFiled: July 13, 2015Date of Patent: February 19, 2019Assignee: International Business Machines CorporationInventors: Alexander H. Ainscow, Carlos F. Fuente, Chelsea L. Jones
-
Publication number: 20170017602Abstract: A method includes monitoring port login requests initiated by elements of a storage system, the storage system comprising interconnection cabling, constructing a connection graph corresponding to the port login requests, wherein each edge of the connection graph corresponds to a specific port login request and each vertex of the connection graph corresponds to a port within the storage system, and using the connection graph to evaluate the interconnection cabling of the storage system. A corresponding computer program product and computer system are also disclosed herein.Type: ApplicationFiled: July 13, 2015Publication date: January 19, 2017Inventors: Alexander H. Ainscow, Carlos F. Fuente, Chelsea L. Jones
-
Publication number: 20160173603Abstract: The disclosure relates to a method and apparatus of managing a file system of a unified storage system. According to embodiments of the present disclosure, the method comprises: creating a thin provisioning storage pool in a block level; mapping the thin provisioning storage pool to a file storage pool in a file level; and creating a file system by using the file storage pool. In this way, a capacity of the file system is expanded or shrunk without rebalancing or migrating data in the storage system.Type: ApplicationFiled: November 5, 2015Publication date: June 16, 2016Inventors: Alexander H. Ainscow, Li Hui Guo, Long Wen Lan
-
Patent number: 8090907Abstract: A method, system, computer program product, and computer program storage device for receiving and processing I/O requests from a host device and providing data consistency in both a primary site and a secondary site, while migrating a SRC (Synchronous Peer to Peer Remote Copy) from a backend storage subsystem to a storage virtualization appliance. While transferring SRC from the backend storage subsystem to the storage virtualization appliance, all new I/O requests are saved in both a primary cache memory and a secondary cache memory, allowing a time window during which the SRC at the backend storage subsystem can be stopped and the secondary storage device is made as a readable and writable medium. The primary cache memory and secondary cache memory operates separately on each I/O request in write-through, read-write or no-flush mode.Type: GrantFiled: July 9, 2008Date of Patent: January 3, 2012Assignee: International Business Machines CorporationInventors: Alexander H. Ainscow, John M. Clifton
-
Publication number: 20100011177Abstract: A method, system, computer program product, and computer program storage device for receiving and processing I/O requests from a host device and providing data consistency in both a primary site and a secondary site, while migrating a SRC (Synchronous Peer to Peer Remote Copy) from a backend storage subsystem to a storage virtualization appliance. While transferring SRC from the backend storage subsystem to the storage virtualization appliance, all new I/O requests are saved in both a primary cache memory and a secondary cache memory, allowing a time window during which the SRC at the backend storage subsystem can be stopped and the secondary storage device is made as a readable and writable medium. The primary cache memory and secondary cache memory operates separately on each I/O request in write-through, read-write or no-flush mode.Type: ApplicationFiled: July 9, 2008Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander H. Ainscow, John M. Clifton
-
Patent number: 7085970Abstract: A method, in an oversampling clock and data recovery system, for detecting that sampling is stuck taking place at a data edge, by detecting a data edge in an early or a late region relative to a good region and incrementing a stuck early or stuck late counter; and if one counter reaching a maximum, setting a condition indicating that sampling is stuck taking place at a data edge. If a data edge is detected in the good region, or in each of an early and a late region in a single data period, the stuck counters are reset to zero. The detection of which stuck counter has reached a maximum can cause the moving of a sampling clock forward or backward, ending when a data edge occurs in a good region, or in each of an early region and a late region in a single data period.Type: GrantFiled: July 23, 2002Date of Patent: August 1, 2006Assignee: International Business Machines CorporationInventors: Gareth J. Nicholls, Alexander H. Ainscow, Jon D. Garlett, Bobak Modaress-Razavi, Vernon R. Norman, Martin L. Schmatz
-
Publication number: 20040019837Abstract: A method, in an oversampling clock and data recovery system, for detecting that sampling is stuck taking place at a data edge, by detecting a data edge in an early or a late region relative to a good region and incrementing a stuck early or stuck late counter; and if one counter reaching a maximum, setting a condition indicating that sampling is stuck taking place at a data edge. If a data edge is detected in the good region, or in each of an early and a late region in a single data period, the stuck counters are reset to zero. The detection of which stuck counter has reached a maximum can cause the moving of a sampling clock forward or backward, ending when a data edge occurs in a good region, or in each of an early region and a late region in a single data period.Type: ApplicationFiled: July 23, 2002Publication date: January 29, 2004Applicant: International Business Machines CorporationInventors: Gareth J. Nicholls, Alexander H. Ainscow, Jon D. Garlett, Bobak Modaress-Razavi, Vernon R. Norman, Martin L. Schmatz