Patents by Inventor Oren Wolf
Oren Wolf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9632875Abstract: Techniques for adjusting the frequency of data backups and initiating event-driven backups in a storage system are disclosed herein. In one embodiment, a self-adjusting backup frequency, known as a “Change Rate Objective,” is defined to conduct or delay backups for one or more volumes in the storage system on the basis of an associated policy value. The Change Rate Objective may be tied to one or more business or data activity events, such as the amount and type of data changes since a last backup. The storage system may also be tailored to conduct or delay full or incremental backups on the basis of a Change Rate Objective that measures whether a full or incremental or differential backup is more appropriate. Various data or system failures, or data or business events may also be used to adjust the retention periods of continuous data protection (CDP) data and delay a rollup of CDP data.Type: GrantFiled: October 6, 2010Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Eran Raichstein, James P. Smith, Gregory J. Tevis, David G. Van Hise, Oren Wolf
-
Patent number: 9575978Abstract: Provided are a computer program product, system, and method for restoring objects in a client-server environment. An entry is added to an index for each chunk identifier. Each index entry includes one of the chunk identifiers and a reference to the chunk of data in the target storage from which the chunk identifier was calculated. A request is transmitted to a server recovery agent to recover an object from the storage server. Chunk identifiers of chunks of data in the requested object to recover are received from the server recovery agent. A determination is made from the index of whether the received chunk identifiers for the requested object matches the chunk identifiers indicated in the index. A request is made of the chunks from the server recovery agent for the received chunk identifiers not matching chunk identifiers in the index entries.Type: GrantFiled: June 26, 2012Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Gregory J. Tevis, Oren Wolf
-
Patent number: 8838545Abstract: A first computational platform generates a data structure that indicates a set of blocks, wherein the indicated set of blocks have to be rewritten to revert a logical storage structure stored in the first computational platform to a previous state. An Input/Output (I/O) request that corresponds to a read operation on a selected block of the logical storage structure is received. A determination is made from the data structure that the selected block has to be rewritten to revert the logical storage structure stored in the first computational platform to the previous state. The first computational platform receives the selected block from a second computational platform, in response to a request made by the first computational platform to the second computational platform for the selected block.Type: GrantFiled: January 25, 2010Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: Gregory John Tevis, Oren Wolf
-
Publication number: 20130346374Abstract: Provided are a computer program product, system, and method for restoring objects in a client-server environment. An entry is added to an index for each chunk identifier. Each index entry includes one of the chunk identifiers and a reference to the chunk of data in the target storage from which the chunk identifier was calculated. A request is transmitted to a server recovery agent to recover an object from the storage server. Chunk identifiers of chunks of data in the requested object to recover are received from the server recovery agent. A determination is made from the index of whether the received chunk identifiers for the requested object matches the chunk identifiers indicated in the index. A request is made of the chunks from the server recovery agent for the received chunk identifiers not matching chunk identifiers in the index entries.Type: ApplicationFiled: June 26, 2012Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oren Wolf, Gregory J. Tevis
-
Patent number: 8380938Abstract: Providing shared access to data storage resources in a cluster computing environment, including detecting when a computer node requests access to a data storage device in a manner that excludes a computing device from accessing the data storage device, where the computer node is configured to communicate with the data storage device along a first communications channel, and where the computing device is configured to communicate with the data storage device along a second communications channel that is exclusive of the first communications channel, and responsive to the detecting, causing the data storage device to allow the computer node and the computing device to share access to the data storage device.Type: GrantFiled: February 24, 2010Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Ofer Elrom, Eran Raichstein, Gregory John Tevis, Oren Wolf
-
Patent number: 8234470Abstract: Described is a method, system, and computer program product for selecting a data repository within a computing environment. The data repository can exist on multiple target computing systems as a logical entity called a volume or a file system. When selecting at least one data repository, a data protection system of the computing environment analyzes the incoming data from a source computing system, in conjunction with information describing the data repositories. The data repository information, or repository characteristic information, can be stored on a repository volume table (RVT) of the data protection system. By determining a weighted selection score from the analysis of all the information available to the data protection system, the data protection system can intelligently select a data repository for storing data from the source computing system.Type: GrantFiled: August 25, 2009Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Gregory John Tevis, Ofer Peretz, Eran Raichstein, David Gregory Van Hise, Oren Wolf, Uri Wolloch
-
Publication number: 20120089572Abstract: Techniques for adjusting the frequency of data backups and initiating event-driven backups in a storage system are disclosed herein. In one embodiment, a self-adjusting backup frequency, known as a “Change Rate Objective,” is defined to conduct or delay backups for one or more volumes in the storage system on the basis of an associated policy value. The Change Rate Objective may be tied to one or more business or data activity events, such as the amount and type of data changes since a last backup. The storage system may also be tailored to conduct or delay full or incremental backups on the basis of a Change Rate Objective that measures whether a full or incremental or differential backup is more appropriate. Various data or system failures, or data or business events may also be used to adjust the retention periods of continuous data protection (CDP) data and delay a rollup of CDP data.Type: ApplicationFiled: October 6, 2010Publication date: April 12, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eran Raichstein, James P. Smith, Gregory J. Tevis, David G. Van Hise, Oren Wolf
-
Patent number: 8140537Abstract: Embodiments for data tagging in a computing environment are provided. A write operation in an operating system (OS) file system level storage layer is intercepted. A set of signatures in a sub-chunk level is calculated. The set of signatures are aligned to the beginning of an OS file system-level object and stored in a memory location, such as a cache, along with file system information relating to the write operation and to the file system-level object that the data is written into. Following file system processing, and as the data is written into storage in blocks, the write operation is intercepted in the block level storage layer. A secondary set of signatures in a sub-block level is calculated using a common algorithm used to create the original set of signatures. The sets of signatures are compared against each other, and blocks of the data having matching signatures are tagged with the file system information stored in the memory location.Type: GrantFiled: July 21, 2009Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Ofer Elrom, Eran Raichstein, Gregory J. Tevis, Oren Wolf
-
Publication number: 20110208930Abstract: Providing shared access to data storage resources in a cluster computing environment, including detecting when a computer node requests access to a data storage device in a manner that excludes a computing device from accessing the data storage device, where the computer node is configured to communicate with the data storage device along a first communications channel, and where the computing device is configured to communicate with the data storage device along a second communications channel that is exclusive of the first communications channel, and responsive to the detecting, causing the data storage device to allow the computer node and the computing device to share access to the data storage device.Type: ApplicationFiled: February 24, 2010Publication date: August 25, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ofer Elrom, Eran Raichstein, Gregory John Tevis, Oren Wolf
-
Publication number: 20110184916Abstract: A first computational platform generates a data structure that indicates a set of blocks, wherein the indicated set of blocks have to be rewritten to revert a logical storage structure stored in the first computational platform to a previous state. An Input/Output (I/O) request that corresponds to a read operation on a selected block of the logical storage structure is received. A determination is made from the data structure that the selected block has to be rewritten to revert the logical storage structure stored in the first computational platform to the previous state. The first computational platform receives the selected block from a second computational platform, in response to a request made by the first computational platform to the second computational platform for the selected block.Type: ApplicationFiled: January 25, 2010Publication date: July 28, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory John Tevis, Oren Wolf
-
Publication number: 20110055293Abstract: Described is a method, system, and computer program product for selecting a data repository within a computing environment. The data repository can exist on multiple target computing systems as a logical entity called a volume or a file system. When selecting at least one data repository, a data protection system of the computing environment analyzes the incoming data from a source computing system, in conjunction with information describing the data repositories. The data repository information, or repository characteristic information, can be stored on a repository volume table (RVT) of the data protection system. By determining a weighted selection score from the analysis of all the information available to the data protection system, the data protection system can intelligently select a data repository for storing data from the source computing system.Type: ApplicationFiled: August 25, 2009Publication date: March 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory John Tevis, Ofer Peretz, Eran Raichstein, David Gregory Van Hise, Oren Wolf, Uri Wolloch
-
Publication number: 20110022601Abstract: Embodiments for data tagging in a computing environment are provided. A write operation in an operating system (OS) file system level storage layer is intercepted. A set of signatures in a sub-chunk level is calculated. The set of signatures are aligned to the beginning of an OS file system-level object and stored in a memory location, such as a cache, along with file system information relating to the write operation and to the file system-level object that the data is written into. Following file system processing, and as the data is written into storage in blocks, the write operation is intercepted in the block level storage layer. A secondary set of signatures in a sub-block level is calculated using a common algorithm used to create the original set of signatures. The sets of signatures are compared against each other, and blocks of the data having matching signatures are tagged with the file system information stored in the memory location.Type: ApplicationFiled: July 21, 2009Publication date: January 27, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ofer ELROM, Eran RAICHSTEIN, Gregory J. TEVIS, Oren WOLF