Patents by Inventor Carol Santich Mellgren
Carol Santich Mellgren has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9092155Abstract: A method for performing a write to a volume x in a cascaded architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume, wherein each of the volume x and the child volume have a target bit map (TBM) associated therewith. The method then determines whether the TBMs of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Finding the HS volume includes travelling up the cascaded architecture until the source of the data is found. Once the HS volume is found, the method copies the data from the HS volume to the child volume and performs the write to the volume x. A method for performing a read is also disclosed herein.Type: GrantFiled: March 15, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8892834Abstract: A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x.Type: GrantFiled: April 28, 2012Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8850147Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein.Type: GrantFiled: March 15, 2013Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8843719Abstract: A method for performing a write to a source volume in a multi-target architecture is described. The multi-target architecture includes a source volume and multiple target volumes mapped thereto. In one embodiment, such a method includes copying data in a track of the source volume to a corresponding track of a target volume (target x). The method enables one or more sibling target volumes (siblings) mapped to the source volume to inherit the data from the target x. When the data is successfully copied to the target x, the method performs a write to the track of the source volume. Other methods for reading and writing data to volumes in the multi-target architecture are also described.Type: GrantFiled: March 15, 2013Date of Patent: September 23, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8782362Abstract: A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x. A corresponding computer program product is also described.Type: GrantFiled: March 8, 2011Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8667237Abstract: A method for deleting a relation between a source and a target in a multi-target architecture is described. The multi-target architecture includes a source and multiple targets mapped thereto. In one embodiment, such a method includes initially identifying a relation for deletion from the multi-target architecture. A target associated with the relation is then identified. The method then identifies a sibling target that inherits data from the target. Once the target and the sibling target are identified, the method copies the data from the target to the sibling target. The relation between the source and the target is then deleted. A corresponding computer program product is also disclosed and claimed herein.Type: GrantFiled: March 8, 2011Date of Patent: March 4, 2014Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Jr., Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren
-
Patent number: 8458134Abstract: A method for providing rolling continuous data protection of source data is disclosed. In one embodiment, such a method includes enabling a user to select source data and establish a first interval when point-in-time copies of the source data are generated. The method further enables the user to specify a first number of point-in-time copies to retain at the first interval. The method further enables the user to specify a second number of point-in-time copies to retain at a second interval, wherein the second interval is a (n?2) multiple of the first interval. The method further enables the user to specify a third number of point-in-time copies to retain at a third interval, wherein the third interval is a (n?2) multiple of the second interval. A corresponding apparatus and computer program product are also disclosed.Type: GrantFiled: March 30, 2011Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Michael Thomas Benhase, Theresa Mary Brown, Lokesh Mohan Gupta, Carol Santich Mellgren, Gail Andrea Spear
-
Patent number: 8214341Abstract: Provided are a method, system, and article of manufacture for managing writes received to data units that are being transferred to a secondary storage as part of a mirror relationship. Synchronization information indicates data units to transfer from a primary storage to a secondary storage, wherein the synchronization information data is updated to indicate the transfer of one of the data units from the primary storage to the secondary storage. A storage controller receives a write request having an update to a target data unit comprising one of the data units indicated in the synchronization information that has not been transferred from the primary storage to the secondary storage. The write request is allowed to apply the update to the target data unit in response to transferring the data in the target data unit to a network adapter of the storage controller and before the data in the target data unit is transferred to the secondary storage.Type: GrantFiled: March 31, 2008Date of Patent: July 3, 2012Assignee: International Business Machines CorporationInventors: Robert Francis Bartfai, Michael E. Factor, Shachar Fienblit, Olympia Gluck, Eyal Gordon, Thomas Charles Jarvis, Eli Malul, Carol Santich Mellgren, Gail Andrea Spear, Aviad Zlotnick
-
Publication number: 20100191925Abstract: A method, system, and computer program product for managing modified metadata in a storage controller cache pursuant to a recovery action by a processor in communication with a memory device is provided. A count of modified metadata tracks for a storage rank is compared against a predetermined criterion. If the predetermined criterion is met, a storage volume having the storage rank is designated with a metadata invalidation flag to defer metadata invalidation of the modified metadata tracks until after the recovery action is performed.Type: ApplicationFiled: January 28, 2009Publication date: July 29, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence Carter BLOUNT, Lokesh Mohan GUPTA, Carol Santich MELLGREN, Kenneth Wayne TODD
-
Publication number: 20090249116Abstract: Provided are a method, system, and article of manufacture for managing writes received to data units that are being transferred to a secondary storage as part of a mirror relationship. Synchronization information indicates data units to transfer from a primary storage to a secondary storage, wherein the synchronization information data is updated to indicate the transfer of one of the data units from the primary storage to the secondary storage. A storage controller receives a write request having an update to a target data unit comprising one of the data units indicated in the synchronization information that has not been transferred from the primary storage to the secondary storage. The write request is allowed to apply the update to the target data unit in response to transferring the data in the target data unit to a network adapter of the storage controller and before the data in the target data unit is transferred to the secondary storage.Type: ApplicationFiled: March 31, 2008Publication date: October 1, 2009Applicant: International Business Machines CorporationInventors: Robert Francis BARTFAI, Michael E. FACTOR, Shachar FIENBLIT, Olympia GLUCK, Eyal GORDON, Thomas Charles JARVIS, Eli MALUL, Carol Santich MELLGREN, Gail Andrea SPEAR, Aviad ZLOTNICK
-
Patent number: 7451283Abstract: Provided are a method, system, and program for copying tracks between a primary controller and secondary controller. A track is received from the primary controller that is part of a copy job comprising a sequence of tracks to copy along with a sequence number of the received track and a context number identifying computational resources in the primary controller used to transmit the track, sequence number, and context number. The context number and sequence number transmitted with the track are used to determine if a track preceding the received track was written to storage. The secondary-controller writes the received track to storage if the track preceding the received track was written to storage.Type: GrantFiled: January 9, 2004Date of Patent: November 11, 2008Assignee: International Business Machines CorporationInventors: James Chien-Chiung Chen, Minh-Ngoc Le Huynh, Chung Man Fung, Patricia Ching Lu, Edwin K. Scott, Carol Santich Mellgren, Richard Anthony Ripberger
-
Patent number: 7171610Abstract: Provided are a method, system, and an article of manufacture for preventing data loss. Modified data is stored in a volatile storage. The stored modified data is copied onto a non-volatile storage. A determination is made as to whether the non-volatile storage should be checked for errors. In certain implementations, on determining that the nonvolatile storage should be checked for errors the non-volatile storage is checked for errors. If on checking the non-volatile storage is found to have an error, an indication of the error is provided.Type: GrantFiled: June 12, 2002Date of Patent: January 30, 2007Assignee: International Business Machines CorporationInventors: Kevin John Ash, Michael Thomas Benhase, Carol Santich Mellgren, Brian Anthony Rinaldi, Kenneth Wayne Todd
-
Patent number: 7051174Abstract: Provided are a method, system, and program for maintaining data in a first cache and second cache, wherein a backup cache maintains a backup copy of data in the first cache, and wherein the first cache is used to cache a first set of data in a storage system and the second cache is used to cache a second set of data in the storage system. An unavailable state of the first cache is detected. In response to detecting the unavailable state, requests to the first set of data are blocked and at least one space in the second cache is allocated for data in the backup cache. Requests to the first set of data are allowed to proceed after the at least one space is allocated in the second cache and before the data in the backup cache is copied to the at least one allocated space in the second cache. The data from the backup cache is copied to the allocated at least one space in the second cache after the requests to the first set of data are allowed to proceed.Type: GrantFiled: September 24, 2002Date of Patent: May 23, 2006Assignee: International Business Machines CorporationInventors: Kevin John Ash, Vernon J. Legvold, Steven Robert Lowe, David Frank Mannenbach, Carol Santich Mellgren, Kenneth Wayne Todd, William Dennis Williams
-
Publication number: 20040059870Abstract: Provided are a method, system, and program for maintaining data in a first cache and second cache, wherein a backup cache maintains a backup copy of data in the first cache, and wherein the first cache is used to cache a first set of data in a storage system and the second cache is used to cache a second set of data in the storage system. An unavailable state of the first cache is detected. In response to detecting the unavailable state, requests to the first set of data are blocked and at least one space in the second cache is allocated for data in the backup cache. Requests to the first set of data are allowed to proceed after the at least one space is allocated in the second cache and before the data in the backup cache is copied to the at least one allocated space in the second cache. The data from the backup cache is copied to the allocated at least one space in the second cache after the requests to the first set of data are allowed to proceed.Type: ApplicationFiled: September 24, 2002Publication date: March 25, 2004Applicant: International Business Machines CorporationInventors: Kevin John Ash, Vernon J. Legvold, Steven Robert Lowe, David Frank Mannenbach, Carol Santich Mellgren, Kenneth Wayne Todd, William Dennis Williams
-
Publication number: 20030233613Abstract: Provided are a method, system, and an article of manufacture for preventing data loss. Modified data is stored in a volatile storage. The stored modified data is copied onto a non-volatile storage. A determination is made as to whether the non-volatile storage should be checked for errors. In certain implementations, on determining that the nonvolatile storage should be checked for errors the non-volatile storage is checked for errors. If on checking the non-volatile storage is found to have an error, an indication of the error is provided.Type: ApplicationFiled: June 12, 2002Publication date: December 18, 2003Applicant: International Business Machines CorporationInventors: Kevin John Ash, Michael Thomas Benhase, Carol Santich Mellgren, Brian Anthony Rinaldi, Kenneth Wayne Todd