Patents by Inventor Edward Hsiu-Wei Lin
Edward Hsiu-Wei Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11620218Abstract: A computer-implemented method, according to one approach, includes: determining whether to satisfy an I/O request using a first tier of memory in a secondary cache by inspecting a bypass indication in response to determining that the input/output (I/O) request includes a bypass indication. The secondary cache is coupled to a primary cache and a data storage device. The secondary cache also includes the first tier of memory and a second tier of memory. Moreover, in response to determining to satisfy the I/O request using the first tier of memory in the secondary cache, the I/O request is satisfied using the first tier of memory in the secondary cache. The updated data is also destaged from the secondary cache to the data storage device in response to determining that data associated with the I/O request has been updated as the result of satisfying the I/O request using the secondary cache.Type: GrantFiled: October 5, 2021Date of Patent: April 4, 2023Assignee: International Business Machines CorporationInventors: Lokesh Mohan Gupta, Edward Hsiu-Wei Lin, Beth Ann Peterson, Matthew G. Borlick
-
Patent number: 11287982Abstract: A computer-implemented method, according to one embodiment, is for managing data received at a storage device. The computer-implemented method includes: receiving data management policies, and receiving two or more connection names from a host. Each of the connection names is correlated with one or more of the data management policies. Moreover, a connection path which extends between the storage device and the host is created. The connection path also has a connection name which corresponds thereto. Data is received along the connection path, and the connection name which corresponds to the connection path is matched to one of the connection names received from the host. Furthermore, the received data is processed according to the one or more data management policies that are correlated with the matching one of the connection names received from the host.Type: GrantFiled: July 12, 2019Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Lourie Goodall, Joseph M. Swingler, Edward Hsiu-Wei Lin, Erika Dawson
-
Publication number: 20220027267Abstract: A computer-implemented method, according to one approach, includes: determining whether to satisfy an I/O request using a first tier of memory in a secondary cache by inspecting a bypass indication in response to determining that the input/output (I/O) request includes a bypass indication. The secondary cache is coupled to a primary cache and a data storage device. The secondary cache also includes the first tier of memory and a second tier of memory. Moreover, in response to determining to satisfy the I/O request using the first tier of memory in the secondary cache, the I/O request is satisfied using the first tier of memory in the secondary cache. The updated data is also destaged from the secondary cache to the data storage device in response to determining that data associated with the I/O request has been updated as the result of satisfying the I/O request using the secondary cache.Type: ApplicationFiled: October 5, 2021Publication date: January 27, 2022Inventors: Lokesh Mohan Gupta, Edward Hsiu-Wei Lin, Beth Ann Peterson, Matthew G. Borlick
-
Patent number: 11204712Abstract: Provided are a computer program product, system, and method for using mirror path statistics in recalling extents to a primary storage system and a secondary storage system from a third storage system, A recall request is received to recall extents from the third storage that were migrated from the primary storage or the secondary storage to the third storage. A determination is made as to whether mirror paths used to migrate extents from the primary storage to the secondary storage exceed a degradation criteria. Commands are sent to cause the recall extents to be recalled from the third storage to both the primary storage and the secondary storage in response to determining that the mirror paths exceed the degradation criteria.Type: GrantFiled: February 14, 2020Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Edward Hsiu-Wei Lin, Lokesh Mohan Gupta, Clint A. Hardy
-
Patent number: 11182291Abstract: A computer-implemented method, according to one approach, includes: receiving an I/O request. In response to determining that the I/O request does not include a bypass indication, the I/O request is satisfied using a primary cache which is coupled to a data storage device and a secondary cache having SCM. In response to determining that the data associated with the I/O request has been updated as a result of satisfying the I/O request: the updated data is destaged from the primary cache to the data storage device, the updated data is copied to the secondary cache, and the updated data is demoted from the primary cache. Yet, in response to determining that the data associated with the I/O request has not been updated: the data associated with the I/O request is copied to the secondary cache, and the data associated with the I/O request is demoted from the primary cache.Type: GrantFiled: February 3, 2020Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Lokesh Mohan Gupta, Edward Hsiu-Wei Lin, Beth Ann Peterson, Matthew G. Borlick
-
Publication number: 20210255795Abstract: Provided are a computer program product, system, and method for using storage access statistics to determine mirrored extents to migrate from a primary storage system and a secondary storage system to a third storage system. A determination is made of access statistics with respect to mirrored extents of data at the primary storage mirrored to the secondary storage to migrate to the third storage. A first set of the mirrored extents associated with access statistics indicating a highest level of access of the mirrored extents are migrated from the secondary storage to the third storage. A second set of the mirrored extents associated with access statistics indicating a lower level of access than the mirrored extents in the first set are migrated from the primary storage to the secondary storage.Type: ApplicationFiled: February 14, 2020Publication date: August 19, 2021Inventors: Edward Hsiu-Wei Lin, Lokesh Mohan Gupta, Clint A. Hardy
-
Publication number: 20210255772Abstract: Provided are a computer program product, system, and method for using mirror path statistics in recalling extents to a primary storage system and a secondary storage system from a third storage system, A recall request is received to recall extents from the third storage that were migrated from the primary storage or the secondary storage to the third storage. A determination is made as to whether mirror paths used to migrate extents from the primary storage to the secondary storage exceed a degradation criteria. Commands are sent to cause the recall extents to be recalled from the third storage to both the primary storage and the secondary storage in response to determining that the mirror paths exceed the degradation criteria.Type: ApplicationFiled: February 14, 2020Publication date: August 19, 2021Inventors: Edward Hsiu-Wei Lin, Lokesh Mohan Gupta, Clint A. Hardy
-
Patent number: 11093156Abstract: Provided are a computer program product, system, and method for using storage access statistics to determine mirrored extents to migrate from a primary storage system and a secondary storage system to a third storage system. A determination is made of access statistics with respect to mirrored extents of data at the primary storage mirrored to the secondary storage to migrate to the third storage. A first set of the mirrored extents associated with access statistics indicating a highest level of access of the mirrored extents are migrated from the secondary storage to the third storage. A second set of the mirrored extents associated with access statistics indicating a lower level of access than the mirrored extents in the first set are migrated from the primary storage to the third storage.Type: GrantFiled: February 14, 2020Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Edward Hsiu-Wei Lin, Lokesh Mohan Gupta, Clint A. Hardy
-
Publication number: 20210240618Abstract: A computer-implemented method, according to one approach, includes: receiving an I/O request. In response to determining that the I/O request does not include a bypass indication, the I/O request is satisfied using a primary cache which is coupled to a data storage device and a secondary cache having SCM. In response to determining that the data associated with the I/O request has been updated as a result of satisfying the I/O request: the updated data is destaged from the primary cache to the data storage device, the updated data is copied to the secondary cache, and the updated data is demoted from the primary cache. Yet, in response to determining that the data associated with the I/O request has not been updated: the data associated with the I/O request is copied to the secondary cache, and the data associated with the I/O request is demoted from the primary cache.Type: ApplicationFiled: February 3, 2020Publication date: August 5, 2021Inventors: Lokesh Mohan Gupta, Edward Hsiu-Wei Lin, Beth Ann Peterson, Matthew G. Borlick
-
Publication number: 20210011624Abstract: A computer-implemented method, according to one embodiment, is for managing data received at a storage device. The computer-implemented method includes: receiving data management policies, and receiving two or more connection names from a host. Each of the connection names is correlated with one or more of the data management policies. Moreover, a connection path which extends between the storage device and the host is created. The connection path also has a connection name which corresponds thereto. Data is received along the connection path, and the connection name which corresponds to the connection path is matched to one of the connection names received from the host. Furthermore, the received data is processed according to the one or more data management policies that are correlated with the matching one of the connection names received from the host.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Applicant: International Business Machines CorporationInventors: Lourie Goodall, Joseph M. Swingler, Edward Hsiu-Wei Lin, Erika Dawson
-
Patent number: 8458510Abstract: Various embodiments for automated error recovery in a computing storage environment by a processor device are provided. In one embodiment, pursuant to performing one of creating a new and rebuilding an existing logical partition (LPAR) operable in the computing storage environment by a hardware management console (HMC) in communication with the LPAR, at least one failure scenario is evaluated by identifying error code. If a failure is caused by an operation of the HMC and a malfunction of a current network connection, a cleanup operation is performed on at least a portion of a current HMC configuration, an alternative network connection to the current network connection is made, and a retry operation is performed.Type: GrantFiled: August 12, 2010Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Xu Han, Edward Hsiu-Wei Lin, Yang Liu
-
Publication number: 20120042198Abstract: Various embodiments for automated error recovery in a computing storage environment by a processor device are provided. In one embodiment, pursuant to performing one of creating a new and rebuilding an existing logical partition (LPAR) operable in the computing storage environment by a hardware management console (HMC) in communication with the LPAR, at least one failure scenario is evaluated by identifying error code. If a failure is caused by an operation of the HMC and a malfunction of a current network connection, a cleanup operation is performed on at least a portion of a current HMC configuration, an alternative network connection to the current network connection is made, and a retry operation is performed.Type: ApplicationFiled: August 12, 2010Publication date: February 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xu HAN, Edward Hsiu-Wei LIN, Yang LIU
-
Patent number: 7734883Abstract: Provided are a method, system, and program for forming a consistency group of data. Information is provided on a consistency group relationship indicating a plurality of slave controllers and, for each indicated slave controller, a slave storage unit managed by the slave controller. A command is transmitted to each slave controller in the consistency group relationship to cause each slave controller to transmit data in the slave storage unit to a remote storage in a manner that forms the consistency group. A determination is made as to whether all the slave controllers successfully transmitted the data in the slave storage units that is part of the consistency group to the remote storage.Type: GrantFiled: September 6, 2006Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: Gail Andrea Spear, Robert Francis Bartfai, Edward Hsiu-Wei Lin, William Frank Micka, Olympia Gluck, Aviad Zlotnick, Michael E. Factor, Thomas Charles Jarvis, Sam Clark Werner
-
Patent number: 7133986Abstract: Provided are a method, system, and program for forming a consistency group of data. Information is provided on a consistency group relationship indicating a plurality of slave controllers and, for each indicated slave controller, a slave storage unit managed by the slave controller. A command is transmitted to each slave controller in the consistency group relationship to cause each slave controller to transmit data in the slave storage unit to a remote storage in a manner that forms the consistency group. A determination is made as to whether all the slave controllers successfully transmitted the data in the slave storage units that is part of the consistency group to the remote storage.Type: GrantFiled: September 29, 2003Date of Patent: November 7, 2006Assignee: International Business Machines CorporationInventors: Gail Andrea Spear, Robert Francis Bartfai, Edward Hsiu-Wei Lin, William Frank Micka, Olympia Gluck, Aviad Zlotnick, Michael E. Factor, Thomas Charles Jarvis, Sam Clark Werner