Patents by Inventor Nagapramod S. Mandagere
Nagapramod S. Mandagere has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8818962Abstract: Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested.Type: GrantFiled: May 26, 2010Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Ramani R. Routray, Sandeep M. Uttamchandani, Pin Zhou
-
Patent number: 8781800Abstract: Embodiments of the present invention provide an approach that utilizes discrete event simulation to quantitatively analyze the reliability of a modeled de-duplication system in a computer storage environment. In addition, the approach described herein can perform such an analysis on systems having heterogeneous data stored on heterogeneous storage systems in the presence of primary faults and their secondary effects due to de-duplication. In a typical embodiment, data de-duplication parameters and a hardware configuration are received in a computer storage medium. A data de-duplication model is then applied to a set of data and to the data de-duplication parameters, and a hardware reliability model is applied to the hardware configuration. Then a set (at least one) of discrete events is simulated based on the data de-duplication model as applied to the set of data and the data de-duplication parameters, and the hardware reliability model as applied to the hardware configuration.Type: GrantFiled: November 1, 2011Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Kavita Chavda, Eric W. Davis Rozier, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Patent number: 8775376Abstract: Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”.Type: GrantFiled: June 30, 2011Date of Patent: July 8, 2014Assignee: International Business Machines CorporationInventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20140143207Abstract: An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and corresponding confidence score(s) are determined. The confidence score(s) indicate respective likelihood(s) that the candidate replica(s) include the data item.Type: ApplicationFiled: November 21, 2012Publication date: May 22, 2014Applicant: International Business Machines CorporationInventors: Billy S. Brewer, Kavita Chavda, Nagapramod S. Mandagere, Ramani R. Routray
-
INTELLIGENT RESTORE-CONTAINER SERVICE OFFERING FOR BACKUP VALIDATION TESTING AND BUSINESS RESILIENCY
Publication number: 20140122435Abstract: An existing data protection environment is analyzed to determine a plurality existing infrastructure containers. A popular infrastructure container is identified from the plurality of existing infrastructure containers. Responsive to determining that the popular infrastructure container does not exist within a central repository, the restore container is created within the central repository to match the popular infrastructure container.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Nagapramod S. Mandagere, Steven Pantridge, Ramani R. Routray -
Publication number: 20140074794Abstract: A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks can be utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that can be serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence.Type: ApplicationFiled: September 12, 2012Publication date: March 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Nagapramod S. Mandagere, Ramani R. Routray, Pin Zhou
-
Publication number: 20140059559Abstract: A method and system for intelligent tiering is provided. The method includes receiving a request for enabling a tiering process with respect to data. The computer processor retrieves a migration list indicating migration engines associated with the data. Additionally, an entity list of migration entities is retrieved and each migration entity is compared to associated policy conditions. In response, it is determined if matches exist between the migration entities and the associated policy conditions and a consolidated entity list is generated.Type: ApplicationFiled: August 21, 2012Publication date: February 27, 2014Applicant: International Business Machines CorporationInventors: Gabriel Alatorre, ann Corrao, Nagapramod S. Mandagere, James E. Olson, Aameek Singh
-
Publication number: 20130326279Abstract: A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario.Type: ApplicationFiled: May 29, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Nagapramod S. Mandagere, Steven Pantridge, Ramani R. Routray
-
Publication number: 20130290258Abstract: Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented.Type: ApplicationFiled: June 26, 2013Publication date: October 31, 2013Inventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Patent number: 8495018Abstract: Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented.Type: GrantFiled: June 24, 2011Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Patent number: 8452735Abstract: Embodiments of the invention relate to selecting a data restore point with an optimal recovery time and recovery point. An exemplary embodiment includes generating a problem search criterion for an entity with corrupted data. Dependencies relied on by the entity to function are determined. At least one event signature match is found that comprises information for an event being logged in a event log, and is associated with the dependencies. At least one data restore point created prior to an occurrence of a particular event in the at least one event signature match is selected. The particular event having caused the data to be corrupted. The at least one data restore point is selected to restore data to a storage system with the corrupted data.Type: GrantFiled: May 26, 2010Date of Patent: May 28, 2013Assignee: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Ramani Ranjan Routray, Sandeep Madhav Uttamchandani, Pin Zhou
-
Publication number: 20130110793Abstract: Embodiments of the present invention provide an approach that utilizes discrete event simulation to quantitatively analyze the reliability of a modeled de-duplication system in a computer storage environment. In addition, the approach described herein can perform such an analysis on systems having heterogeneous data stored on heterogeneous storage systems in the presence of primary faults and their secondary effects due to de-duplication. In a typical embodiment, data de-duplication parameters and a hardware configuration are received in a computer storage medium. A data de-duplication model is then applied to a set of data and to the data de-duplication parameters, and a hardware reliability model is applied to the hardware configuration. Then a set (at least one) of discrete events is simulated based on the data de-duplication model as applied to the set of data and the data de-duplication parameters, and the hardware reliability model as applied to the hardware configuration.Type: ApplicationFiled: November 1, 2011Publication date: May 2, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Eric W. Davis Rozier, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20130006943Abstract: Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”.Type: ApplicationFiled: June 30, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20120330895Abstract: Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented.Type: ApplicationFiled: June 24, 2011Publication date: December 27, 2012Applicant: International Business Machines CorporationInventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Patent number: 8315991Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.Type: GrantFiled: April 20, 2010Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Mark J. Seaman, Sandeep M. Uttamchandani
-
Publication number: 20120109907Abstract: Embodiments of the invention relate to performing on-demand data deduplication for managing data and storage space. Redundant data in a system is detected. Availability of data storage space in the system is periodically evaluated. Performance parameters of the system are evaluated. Detected redundant data is selected based on the data storage availability and performance parameters of the system. If at least a portion of the selected redundant data is to be deduplicated is determined.Type: ApplicationFiled: October 30, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Nagapramod S. Mandagere, David A. Pease, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20110295815Abstract: Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested.Type: ApplicationFiled: May 26, 2010Publication date: December 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nagapramod S. Mandagere, Ramani R. Routray, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20110296237Abstract: Embodiments of the invention relate to selecting a data restore point with an optimal recovery time and recovery point. An exemplary embodiment includes generating a problem search criterion for an entity with corrupted data. Dependencies relied on by the entity to function are determined. At least one event signature match is found that comprises information for an event being logged in a event log, and is associated with the dependencies. At least one data restore point created prior to an occurrence of a particular event in the at least one event signature match is selected. The particular event having caused the data to be corrupted. The at least one data restore point is selected to restore data to a storage system with the corrupted data.Type: ApplicationFiled: May 26, 2010Publication date: December 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nagapramod S. Mandagere, Ramani Ranjan Routray, Sandeep Madhav Uttamchandani, Pin Zhou
-
Publication number: 20110258164Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.Type: ApplicationFiled: April 20, 2010Publication date: October 20, 2011Applicant: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Mark J. Seaman, Sandeep M. Uttamchandani
-
Patent number: 8037349Abstract: A system and associated method for replicating data based on capacity optimization. A local node receives the data associated with a key. The local node within a local domain communicates with nodes of remote domains in a system through a communication network. Each domain has its own distributed hash table that partitions key space and assigns a certain key range to an owner node within the domain. For new data, the local node queries owner nodes of domains in the system progressively from the local domain to remote domains for a duplicate of the new data. Depending on a result returned by owner nodes and factors for replication strategies, the local node determines a replication strategy and records the new data in the local node pursuant to the replication strategy.Type: GrantFiled: August 28, 2009Date of Patent: October 11, 2011Assignee: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Seshashayee S. Murthy, Mark A. Smith, Sandeep M. Uttamchandani, Pin Zhou