Patents by Inventor Juan A. Coronado
Juan A. Coronado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8909827Abstract: A method for replacing logical path resources, a host is able to replace a logical path it owns with a new logical path. Such a system is especially applicable when the condition of “out of resources” has been reached for a port. With this system, a host is guaranteed that it can replace a logical path it owns with a new logical path. It is not necessary for a control unit to have reached its maximum number of logical paths per port. A host is able to replace one logical path with a new logical path any time.Type: GrantFiled: January 30, 2008Date of Patent: December 9, 2014Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Roger G. Hathorn, Bret W. Holley, Dinh H. Le
-
Publication number: 20140208028Abstract: Various embodiments for managing data in a computing storage environment by a processor device are provided. In one such embodiment, by way of example only, an extender storage pool system is configured for at least one of a source and a target storage pool to expand an available storage capacity for the at least one of the source and the target storage pool. A most recent snapshot of the data is sent to the extender storage pool system. The most recent snapshot of the data is stored on the extender storage pool system as a last replicated snapshot of the data.Type: ApplicationFiled: March 20, 2014Publication date: July 24, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. CORONADO, Christina A. LARA, Lisa R. MARTINEZ
-
Patent number: 8776235Abstract: An approach to handling connection errors between an external antivirus server and a storage device is disclosed. The storage device is equipped with an internal antivirus server. Antivirus metadata that describes the antivirus scan is stored in an antivirus metadata repository on the storage device. The connection between the external antivirus server and the storage device is monitored. The external antivirus server executes the antivirus scan on the storage device. If the connection fails, control of the antivirus scan is passed from the external antivirus server to the internal antivirus server. The internal antivirus server determines where to begin based on the antivirus metadata. When the connection is restored, control is passed back to the external antivirus server.Type: GrantFiled: January 10, 2012Date of Patent: July 8, 2014Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 8769147Abstract: System, apparatus, and methods for dynamically managing logical path resources are provided. The logical path resources are managed by adding, removing, and establishing logic paths based on specified priority schemes associated with the logical path resources. Information associated with the logical path resources is updated in a logical path resource table.Type: GrantFiled: January 17, 2013Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Roger G. Hathorn, Bret W. Holley
-
Patent number: 8732429Abstract: An apparatus, system, and method for preserving a deleted storage volume. One embodiment of the apparatus includes a receiving module, a reference module, and a preservation module. The receiving module receives a deletion command to delete a data volume managed by a storage controller. The data volume is associated with one or more deletion parameters specifying that data of the data volume is to be preserved upon deletion of the data volume. The reference module references the deletion parameters. The preservation module preserves the data of the data volume prior to the storage controller deleting the data volume. The preservation module preserves the data of the data volume according to the deletion parameters.Type: GrantFiled: October 20, 2010Date of Patent: May 20, 2014Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Paul W. Garcia, Beth A. Peterson, Xavier E. Somoza
-
Patent number: 8706946Abstract: Various embodiments for managing data in a computing storage environment by a processor device are provided. In one such embodiment, by way of example only, an extender storage pool system is configured for at least one of a source and a target storage pool to expand an available storage capacity for the at least one of the source and the target storage pool. A most recent snapshot of the data is sent to the extender storage pool system. The most recent snapshot of the data is stored on the extender storage pool system as a last replicated snapshot of the data.Type: GrantFiled: February 11, 2011Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Christina A. Lara, Lisa R. Martinez
-
Publication number: 20140068566Abstract: A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric.Type: ApplicationFiled: August 29, 2012Publication date: March 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Lee C. LaFrese, Lisa R. Martinez
-
Publication number: 20140059687Abstract: For file scanning, a division module divides a file into plurality of subfiles. An access module maintains a status of each subfile and scans each subfile with a separate server.Type: ApplicationFiled: August 22, 2012Publication date: February 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Publication number: 20130179972Abstract: An approach to handling connection errors between an external antivirus server and a storage device is disclosed. The storage device is equipped with an internal antivirus server. Antivirus metadata that describes the antivirus scan is stored in an antivirus metadata repository on the storage device. The connection between the external antivirus server and the storage device is monitored. The external antivirus server executes the antivirus scan on the storage device. If the connection fails, control of the antivirus scan is passed from the external antivirus server to the internal antivirus server. The internal antivirus server determines where to begin based on the antivirus metadata. When the connection is restored, control is passed back to the external antivirus server.Type: ApplicationFiled: January 10, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Publication number: 20130086351Abstract: A main data storage system has a main storage control and data storage, and a user interface, the main storage control in communication with a local storage control of a local data storage system with local data storage. In response to a request to increase data storage from the user interface, the main control determines whether the main data storage is out of space. If so, the main control sends a command to the local control to create data space in local data storage. The local control creates the data space and associates the data space with the main control; and, in response to the local control creating data space in the local data storage and notifying the main control, the main control updates its metadata with respect to the data space, creating the impression that all the data is stored in the main data storage.Type: ApplicationFiled: September 30, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: JUAN A. CORONADO, SARA M. CORONADO, JENNIFER S. SHIOYA, XAVIER E. SOMOZA
-
Patent number: 8392610Abstract: A system, apparatus, and method dynamically manages logical path resources by adding, removing, and establishing logic paths based on specified priority schemes associated with the logical path resources. Information associated with the logical path resources is updated in a logical path resource table.Type: GrantFiled: January 30, 2008Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Roger G. Hathorn, Bret W. Holley
-
Publication number: 20130046950Abstract: Exemplary method, system, and computer program product embodiments for priority based depopulation of ranks in a computing storage environment are provided. In one embodiment, by way of example only, multiple ranks selected for depopulation are prioritized. The highest priority rank of the multiple ranks is depopulated to a target rank. Additional system and computer program product embodiments are disclosed and provide related advantages.Type: ApplicationFiled: August 17, 2011Publication date: February 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. CORONADO, Jennifer S. SHIOYA, Todd M. TOSSETH
-
Patent number: 8365008Abstract: A mechanism is provided in a storage control unit in a data processing system for providing unsolicited global disconnect requests to users. The mechanism stores lock control data in the storage control unit. The storage control unit allocates its resources into a plurality of clusters. Responsive to a given user connecting to a given partition that is for a logical subsystem resident on a first cluster within the plurality of clusters, the mechanism sends reflected partition information from the first cluster to a second cluster within the plurality of clusters. Responsive to the first cluster experiencing a failure condition, the mechanism moves control data from one or more logical subsystems from the first cluster to the second cluster and for each logical subsystem that moved from the first logical subsystem to the second logical subsystem and that has reflected partition information, presents unsolicited status to one or more users.Type: GrantFiled: October 13, 2010Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Brian D. Clark, Juan A. Coronado, Christopher D. Filachek, Beth A. Peterson
-
Patent number: 8352960Abstract: A logical partition (LPAR) is managed in a data processing system by performing an initial program load (IPL), commencing execution of an application on the LPAR and selecting from a plurality of unsolicited events of which the application is to receive notice. A command is transmitted to a storage controller indicating the identity of the selected unsolicited events, wherein the storage controller will store the information in a data structure. Upon the later occurrence of an unsolicited event, the storage controller will transmit to the LPAR only notices of the selected unsolicited events.Type: GrantFiled: August 13, 2007Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventors: Brian D. Clark, Juan A. Coronado, Beth A. Peterson
-
Patent number: 8341364Abstract: An apparatus, system, and method are disclosed for maintaining asynchronous mirroring. A detection module detects insufficient storage space to store a snapshot of a logical volume in at least one of a primary storage system and a secondary storage system. The primary storage system comprises the logical volume. A write from a host to the logical volume is acknowledged, maintaining asynchronous mode mirroring between the primary storage system and the host. The mirror module mirrors the write to the logical volume at the secondary storage system using a backup synchronous mode in response to detecting the insufficient storage space. Under the backup synchronous mode, the primary storage system acknowledges the write to the host while concurrently mirroring the write to the secondary storage system. The secondary storage system acknowledges the mirrored write to the primary storage system.Type: GrantFiled: August 12, 2010Date of Patent: December 25, 2012Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Christina A. Lara, Lisa R. Martinez, Robert J. McNamara
-
Patent number: 8250402Abstract: An FTDC interface with the host or user. The interface can include a command application programming interface (API) or a data storage Command-Line Interface (DS CLI)/Graphical User Interface (GUI). In certain embodiments, the FTDC interface allows a host or user to customize a desired FTDC on a two-tiered system. The first tier is one in which a host/user selects, from a list of conditions, which ones, upon occurrence of those conditions, they would like the controller to perform FTDC. In the second tier a second selection is made such that for each first tier item, the host/user will select the level of FTDC (collection and offloading of logs and/or the forcing and offloading of a statesave).Type: GrantFiled: March 24, 2008Date of Patent: August 21, 2012Assignee: International Business Machines CorporationInventors: Brian D. Clark, Beth A. Peterson, Juan A. Coronado, Warren K. Stanley, Raul E. Saba
-
Publication number: 20120210064Abstract: Various embodiments for managing data in a computing storage environment by a processor device are provided. In one such embodiment, by way of example only, an extender storage pool system is configured for at least one of a source and a target storage pool to expand an available storage capacity for the at least one of the source and the target storage pool. A most recent snapshot of the data is sent to the extender storage pool system. The most recent snapshot of the data is stored on the extender storage pool system as a last replicated snapshot of the data.Type: ApplicationFiled: February 11, 2011Publication date: August 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. CORONADO, Christina A. LARA, Lisa R. MARTINEZ
-
Publication number: 20120198188Abstract: To prevent loss of a data volume by unintended deletion, including various versions of the data volume, the data is preserved, and, when needed, is regenerated at a different volume address than that of the deleted volume. In a computer-implemented data storage system, a method responds to a received command to delete a volume of data identified by a volume address, preserving data of the volume prior to deletion, and generates a unique token associated with the volume and version of the volume as of the deletion. The unique token is communicated as associated with the received delete command. The method responds to a received command to regenerate the data of the deleted volume, generating a command to find the data identified by the unique token, and creating a new, different, volume address for the data of the preserved deleted volume, thereby keeping both volume versions.Type: ApplicationFiled: February 2, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: JUAN A. CORONADO, BETH A. PETERSON
-
Publication number: 20120102279Abstract: An apparatus, system, and method for preserving a deleted storage volume. One embodiment of the apparatus includes a receiving module, a reference module, and a preservation module. The receiving module receives a deletion command to delete a data volume managed by a storage controller. The data volume is associated with one or more deletion parameters specifying that data of the data volume is to be preserved upon deletion of the data volume. The reference module references the deletion parameters. The preservation module preserves the data of the data volume prior to the storage controller deleting the data volume. The preservation module preserves the data of the data volume according to the deletion parameters.Type: ApplicationFiled: October 20, 2010Publication date: April 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Paul W. Garcia, Beth A. Peterson, Xavier E. Somoza
-
Publication number: 20120096304Abstract: A mechanism is provided in a storage control unit in a data processing system for providing unsolicited global disconnect requests to users. The mechanism stores lock control data in the storage control unit. The storage control unit allocates its resources into a plurality of clusters. Responsive to a given user connecting to a given partition that is for a logical subsystem resident on a first cluster within the plurality of clusters, the mechanism sends reflected partition information from the first cluster to a second cluster within the plurality of clusters. Responsive to the first cluster experiencing a failure condition, the mechanism moves control data from one or more logical subsystems from the first cluster to the second cluster and for each logical subsystem that moved from the first logical subsystem to the second logical subsystem and that has reflected partition information, presents unsolicited status to one or more users.Type: ApplicationFiled: October 13, 2010Publication date: April 19, 2012Applicant: International Business Machines CorporationInventors: Brian D. Clark, Juan A. Coronado, Christopher D. Filachek, Beth A. Peterson