Concurrency Control And Recovery (epo) Patents (Class 707/E17.007)
  • Publication number: 20110184912
    Abstract: A method begins by a processing module obtaining a directory file and determining a new snapshot identifier (ID) for the directory file. The method continues with the processing module identifying a version of a filename to associate with the new snapshot ID and updating the directory file by associating the snapshot ID to the version of the filename to produce an updated directory file. The method continues with the processing module dispersed storage error encoding the updated directory file to produce a set of encoded updated directory file slices and sending the set of encoded updated directory file slices to a dispersed storage network (DSN) memory for storage.
    Type: Application
    Filed: November 9, 2010
    Publication date: July 28, 2011
    Applicant: CLEVERSAFE, INC.
    Inventors: ANDREW BAPTIST, ILYA VOLVOVSKI, WESLEY LEGGETTE
  • Publication number: 20110178999
    Abstract: The invention relates to a device for monitoring physical objects that comprises one or more short-range remote readers (13), memory elements (5) to be attached to physical objects, and a controller (15) adapted for executing a reading function capable of interaction with the one or more remote readers in order to acquire data contained in adjacent memory elements, and for executing an integrity validation function capable of distinguishing, from the acquired data, individual identifiers particular to each of the memory elements as well as group description data stored in at least some of said memory elements, and of checking the sufficiency of group description data while checking the compliance of individual identifiers with corresponding group description data.
    Type: Application
    Filed: May 20, 2009
    Publication date: July 21, 2011
    Applicant: INRIA INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE
    Inventors: Michel Banatre, Paul Couderc, Mathieu Becus, Fabien Allars
  • Publication number: 20110179082
    Abstract: Atomic test and set (ATS) operations are carried out to perform lock operations that allow a node to acquire or release a lock to a resource of a shared file system that is stored in a data storage unit (DSU) and update its liveness information. Each ATS operation includes the step of comparing contents accessed and read through the shared file system and contents stored at a particular logical block number of the DSU. If the two contents match, updates to the contents of the lock or the liveness information are permitted.
    Type: Application
    Filed: March 29, 2011
    Publication date: July 21, 2011
    Applicant: VMWARE, INC.
    Inventors: Satyam B. VAGHANI, Manjunath RAJASHEKHAR
  • Publication number: 20110178997
    Abstract: A computer readable medium having software instructions that, when executed, perform a method for preserving data stored in a file system with a plurality of files. The method involves determining whether storage capacity of the file system has reached a threshold level, wherein the threshold level is stored in at least one of a plurality of size-reducing policies, obtaining a criterion from the at least one size-reducing policy, identifying a subset of the plurality of files that match the criterion, accessing metadata of each of the identified subset of files, wherein the metadata of each of the identified subset of files comprises at least one option for reducing a size of the file, and performing a size-reducing action to reduce a size of each of the identified subset of files based on the option for reducing the size of each of the identified subset of files and the criterion.
    Type: Application
    Filed: January 15, 2010
    Publication date: July 21, 2011
    Applicant: SUN MICROSYSTEMS, INC.
    Inventors: Darrin P. Johnson, William H. Moore, Eric C. Saxe
  • Publication number: 20110178985
    Abstract: The present invention faces the issue of data replication in different database nodes of a geographically distributed database wherein clients cannot always perform any database-related operation in the closest database node.
    Type: Application
    Filed: September 30, 2009
    Publication date: July 21, 2011
    Inventors: Marta San Martin Arribas, Jorge Nevado Jimenez, Dennis Henriksen
  • Publication number: 20110178988
    Abstract: Provided are a computer system and its data control method that enable safe backup of data and reduction in the capacity of data to be backed up. A control processor refers to a differential and, if a differential bit is “0,” encrypts data of an online VOL with an encryption circuit by using key information, and transfers the encrypted data to a second storage system. If the differential bit is “1,” the control processor performs redundancy elimination processing to journal data, thereafter compresses the journal data with a compression circuit, encrypts the compressed journal data with an encryption circuit according to the key information, and transfers the journal data that was encrypted after compression to the second storage system.
    Type: Application
    Filed: May 25, 2009
    Publication date: July 21, 2011
    Inventors: Ai Satoyama, Yoshiaki Eguchi
  • Publication number: 20110178993
    Abstract: Described are techniques for determining an implemented data protection policy. One or more recovery points corresponding to each of one or more storage objects are determined. A data protection method determined in accordance with a facility and replication type associated with said each recovery point is selected for each of said one or more recovery points. A data protection category for each of said one or more recovery points is determined in accordance with said data protection method, a recovery point type, and a recovery point location associated with said each recovery point. A data protection policy indicating an implemented data protection policy for each of said one or more storage objects for at least one data protection category is stored.
    Type: Application
    Filed: April 4, 2011
    Publication date: July 21, 2011
    Inventors: Aharon BLITZER, Aviram KATZ, Roy DAHAN, Amit LIEBERMAN, Maayan MALTZ
  • Publication number: 20110178987
    Abstract: A method and apparatus for processing data at a data storage device according to remote control are provided. In response to a remote control permission request being received from a remote control device, identification information included in the remote control permission request may be authenticated. A remote control command according to a right corresponding to the identification information may be performed when the remote control command is received from the remote control device.
    Type: Application
    Filed: December 9, 2010
    Publication date: July 21, 2011
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventor: Jin Hyeock Choi
  • Publication number: 20110178989
    Abstract: According to the invention, a managing server, using a snapshot-appended information table which stores management information for identifying snapshots of a virtual server, a setting change table which stores setting change information on the virtual server, and a policy table which stores policies to be met by the virtual server, acquires the setting change information from the setting change table, selects the setting change information items from the acquired setting change information matching policies stored in the policy table, acquires management information on the snapshots of the virtual server from the snapshot-appended information table, identifies a snapshot of the virtual server with reference to the acquired management information, changes the identified snapshot of the virtual server based on the selected setting change information items, and rolls back the virtual server according to the changed snapshot.
    Type: Application
    Filed: March 31, 2011
    Publication date: July 21, 2011
    Applicant: HITACHI, LTD.
    Inventors: Kentaro WATANABE, Yoshimasa MASUOKA
  • Publication number: 20110178983
    Abstract: A cluster recovery process is implemented across a set of distributed archives, where each individual archive is a storage cluster of preferably symmetric nodes. Each node of a cluster typically executes an instance of an application that provides object-based storage of fixed content data and associated metadata. According to the storage method, an association or “link” between a first cluster and a second cluster is first established to facilitate replication. The first cluster is sometimes referred to as a “primary” whereas the “second” cluster is sometimes referred to as a “replica.” Once the link is made, the first cluster's fixed content data and metadata are then replicated from the first cluster to the second cluster, preferably in a continuous manner. Upon a failure of the first cluster, however, a failover operation occurs, and clients of the first cluster are redirected to the second cluster.
    Type: Application
    Filed: March 28, 2011
    Publication date: July 21, 2011
    Applicant: HITACHI DATA SYSTEMS CORPORATION
    Inventors: Benjamin K.D. Bernhard, Robert S. Mason, JR.
  • Publication number: 20110173154
    Abstract: A method for reorganizing a catalog to improve I/O performance includes initially placing a shared lock on a source catalog. The method then makes a point-in-time copy of the source catalog to generate a target catalog. Once the target catalog is generated, the method reorganizes the contents of the target catalog. Optionally, while reorganizing the contents of the target catalog, the method temporarily releases the shared lock on the source catalog and mirrors I/O intended for the source catalog to a buffer. The buffered I/O may then be used to update the target catalog to bring it current with the source catalog. When the target catalog is reorganized and up-to-date, the method upgrades the shared lock on the source catalog to an exclusive lock, overwrites the source catalog with the target catalog, and releases the exclusive lock. A corresponding apparatus and computer program product are also disclosed and claimed herein.
    Type: Application
    Filed: January 9, 2010
    Publication date: July 14, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Philip R. Chauvet, David C. Reed, Michael R. Scott, Max D. Smith
  • Publication number: 20110173159
    Abstract: Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object.
    Type: Application
    Filed: March 25, 2011
    Publication date: July 14, 2011
    Applicant: EMC CORPORATION
    Inventors: Thomas L. Dings, Jacob M. Jacob, Subramanian Periyagaram, Pashupati Kumar, Robert W. Toop
  • Publication number: 20110173157
    Abstract: Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is communicated between endpoints are disclosed. In such systems and methods the representation of data on an endpoint may be modified so that constraints on that particular endpoint are enforced, without requiring a similar or the same modification to the data when it is synchronized to other endpoints.
    Type: Application
    Filed: March 23, 2011
    Publication date: July 14, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Akash J. Sagar, George P. Moromisato, Richard Yiu-Sai Chung, Paresh S. Suthar, Raymond E. Ozzie, Jack E. Ozzie, Matthew S. Augustine
  • Publication number: 20110167050
    Abstract: Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, file or operating system activity relating to a code module is intercepted. A cryptographic hash value of the code module is authenticated with reference to a multi-level whitelist, which includes a remote global whitelist and a local whitelist. The remote global whitelist is maintained by a trusted service provider and contains cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist is accessible by computer systems within the LAN and contains cryptographic hash values of a subset of the approved code modules. The cryptographic hash value is checked against the local whitelist. If no match is found, it is checked against the global whitelist. The code module is allowed to be loaded and executed if the cryptographic hash value corresponds to an approved code module.
    Type: Application
    Filed: February 17, 2011
    Publication date: July 7, 2011
    Applicant: FORTINET, INC.
    Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
  • Publication number: 20110167046
    Abstract: An information processing apparatus includes a discrimination unit that discriminates types of recording media recording contents, a search unit that searches for a predetermined folder determined by a standard of recording of the contents recorded on the recording media, a determination unit that determines whether a recording position of the predetermined folder searched for by the search unit meets a standard of the recording media, and a restoration unit that restores the predetermined folder when the determination unit determines that the recording position of the predetermined folder does not meet the standard of the recording media.
    Type: Application
    Filed: December 6, 2010
    Publication date: July 7, 2011
    Applicant: Sony Corporation
    Inventor: Kenichi MIZUKAMI
  • Publication number: 20110167043
    Abstract: Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user's location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user's identification, the IP address, the time of search, and differences between the search terms used in the search queries.
    Type: Application
    Filed: March 17, 2011
    Publication date: July 7, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Michael D. Hintze, Frederic H. Behr, JR., Randall F. Kern, Zijian Zheng, Kimberly J. Howell
  • Publication number: 20110161295
    Abstract: This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time.
    Type: Application
    Filed: December 27, 2010
    Publication date: June 30, 2011
    Inventor: David Ngo
  • Publication number: 20110161285
    Abstract: An approach is provided for automatic controlled value expansion of information. A value expansion controller detects a request at a device to perform an information operation on a set of data elements of an information space, wherein the request identifies the set by a name and the information operation applies to each data element within the set. The value expansion controller intercepts the request based on the detection and determines the location of the data elements within a communication network based on the name. The value expansion controller retrieves the data elements from the location and populates an expansion table with the retrieved data elements, wherein the expansion table is correlated to the set. The value expansion controller performs the information operation on each data element in the expansion table and causes transmission of one or more results of the information operation to the device.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Applicant: Nokia Corporation
    Inventors: Sergey Boldyrev, Jukka Honkola, Vesa Luukkala
  • Publication number: 20110161560
    Abstract: Systems and methods are disclosed to reduce the number of partial logical groups that are erased by writing erase patterns to memory in a non-volatile memory system. When a non-aligned erase command is received, the logical addresses of data associated with the erase command may be marked as erased. If the logical group corresponds to the size of a physical metablock, the controller may also issue a physical erase command for complete logical groups within the erase command. For those parts of the erase command that encompass only partial logical groups, the ranges of the logical block addresses marked for erasure are stored. As subsequent erase commands are received the address ranges of the erase commands are added to the previously stored address ranges. When a set of erase commands spans an entire logical group, the logical group is marked for physical erasure in its entirety.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Inventors: Neil D. Hutchison, Alan D. Bennett, Sergey A. Gorobets, Steven T. Sprouse
  • Publication number: 20110161303
    Abstract: A system and method for analyzing official notices of an electronically filed patent application are based on a file server that connects to patent office websites, a database, and client computers. An official notice of the patent application is downloaded from one of the patent office websites according to a download command from one of the client computers, and is converted to an image format document. Character data of the image format document are identified, and patent information of the electronically filed patent application are extracted from the character data using a regular expression. In addition, the patent information are analyzed to generate analysis results of the official notice according to the comparison.
    Type: Application
    Filed: June 17, 2010
    Publication date: June 30, 2011
    Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD, HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: CHUNG-I LEE, HAI-HONG LIN, DE-YI XIE, ZHENG-CAI ZHU, HAI-YUN CHEN, SHUAI-JUN TAO
  • Publication number: 20110161299
    Abstract: A system and method for using a snapshot as a data source is described. In some cases, the system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions.
    Type: Application
    Filed: December 27, 2010
    Publication date: June 30, 2011
    Inventors: Anand Prahlad, Rahul S. Pawar
  • Publication number: 20110153573
    Abstract: A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 23, 2011
    Applicant: American Express Travel Related Services Company, Inc.
    Inventor: Tracey R. Thomas
  • Publication number: 20110153565
    Abstract: A configuration information management device includes a storage unit for storing a configuration item and an item relationship. The configuration information management device controls to cause the storage unit or the different configuration information management device to store the item relationship. The configuration information management device also controls to cause the storage unit or the different configuration information management device containing a configuration item connected to the item relationship to store a replica of the item relationship. When a search request including a series of the configuration item and the item relationship is accepted, the configuration information management device decomposes the search request such that the configuration item and the item relationship arranged in series are together treated as a unit of processing, and performs a search process for each unit of processing.
    Type: Application
    Filed: December 20, 2010
    Publication date: June 23, 2011
    Applicant: FUJITSU LIMITED
    Inventors: Masazumi MATSUBARA, Hiroshi Otsuka, Yuji Wada, Yasuhide Matsumoto
  • Publication number: 20110153566
    Abstract: The subject disclosure relates to a concurrency control technique that ensures isolation among concurrently execution transactions optimistically in a multiversion database by applying two optional tests at the end of a read-write transaction: validating the visibility of the read set of the read-write transaction(s) and phantom detection by re-scanning and confirming no new version have appeared in the view. Depending on desired level of isolation, both, one or none of the test are applied. Each version of a data record in an applicable database can be assigned two timestamps indicating the lifetime the version. The value of a version timestamp, though assigned, may be conditional on a transaction committing.
    Type: Application
    Filed: December 18, 2009
    Publication date: June 23, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Per-Ake Larson, Cristian Diaconu, Michael J. Zwilling, Craig Steven Freedman
  • Publication number: 20110153569
    Abstract: In one embodiment, systems and methods are provided for nonlinear journaling. In one embodiment, groups of data designated for storage in a data storage unit are journaled into persistent storage. In one embodiment, the journal data is recorded nonlinearly. In one embodiment, a linked data structure records data and data descriptors in persistent storage.
    Type: Application
    Filed: February 25, 2011
    Publication date: June 23, 2011
    Inventors: Neal T. Fachan, Peter J. Godman, Justin M. Husted, Aaron J. Passey
  • Publication number: 20110153571
    Abstract: One embodiment of a system for analyzing client file systems in accordance with the present disclosure comprises a backup repository storing backup data of file systems of client computers remote from the backup repository. The system further comprises a backup server that analyzes the file systems of the client computers using the backup data at the backup repository and reports a problem detected in a file system of a client computer to a user of the client computer.
    Type: Application
    Filed: September 15, 2008
    Publication date: June 23, 2011
    Inventors: Philip M. Walker, Jason D. Goldman, Charles M. Mcjilton
  • Publication number: 20110153373
    Abstract: A reservation management system includes at least one processing node that includes a memory and a processor. The at least one processing node further includes a set of reservation processing and transaction modules that manage and process reservation requests and inquiries. At least one general purpose database is communicatively coupled to the at least one processing node. The at least one general purpose database includes a set of pre-allocated tables of fixed length records. At least one persistent storage device is communicatively coupled to the at least one processing node. The general purpose database persistently stores the set of pre-allocated tables of fixed length records on the at least one persistent storage device.
    Type: Application
    Filed: December 22, 2009
    Publication date: June 23, 2011
    Applicant: International Business Machines Corporation
    Inventors: Paul M. Dantzig, Sastry S. Duri, Arun Iyengar, Francis Parr
  • Publication number: 20110145202
    Abstract: An archiving system for enabling searching for collections of items is disclosed. A processing unit displays an archived items collection management template in respect of a particular collection of items and prompts a user to complete the template fields with data obtained by the user from manually reviewing that collection of items to capture information relevant to each of the template fields. An archiving controller stores, in pre-determined data fields of a storage area of a data store corresponding to said collection of items, the data from the completed template fields. A document search controller may search the pre-determined data fields of the storage areas of the data store corresponding to each of the collections of items to identify ones of the collection of items which match search criteria.
    Type: Application
    Filed: November 19, 2010
    Publication date: June 16, 2011
    Inventors: Gabrielle Sarah Phyo, Nickola John Vidovich, Elizabeth Foster
  • Publication number: 20110145204
    Abstract: A technique for transaction recovery by one transaction manager of another transaction manager's transactions in which each transaction manager is adapted to manage two phase commit transactional operations on transactional resources and to record commit or rollback decisions in a transaction recovery log. The recovery transaction manager detects apparent unavailability of the another transaction manager for transaction processing and initiates a transaction recovery process for the another transaction manager's transactions. This process also determines whether any of the transactions of the another transaction manager have all respective resources prepared to commit without there yet being a pending commit decision record in the another transaction manager's recovery log. If so, the recovery transaction manager writes a rollback record indicating an intention to roll back the identified transaction, in the another transaction manager's recovery log provided no commit decision record has been recorded.
    Type: Application
    Filed: October 4, 2010
    Publication date: June 16, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon J. Maple, Ian Robinson
  • Publication number: 20110145197
    Abstract: By considering a device life and time needed for data migration, data stored in a storage apparatus is securely preserved until a retention term of each of the data. Multiple disk devices 40A to 40C that store a data file generated by a service server apparatus 30 are included. A migration manager 11 of a management server apparatus 10 acquires preservation period information that indicates a preservation period of the data file from the service server apparatus 30, and calculates a preservation term of the data file based on the preservation period information. The migration manager 11 of the management server apparatus 10 also acquires data amount information of the data file from the service server apparatus 30, and calculates a necessary time needed for migrating the data file to other disk devices A40A to 40C.
    Type: Application
    Filed: December 3, 2008
    Publication date: June 16, 2011
    Applicant: Hitachi Ltd.
    Inventors: Toshiki Kamohara, Shiori Inoue, Naoto Yanagi
  • Publication number: 20110137877
    Abstract: An apparatus for creating and managing personalized services includes: a pre-processing unit for converting vendor- and device-specific sensor data into a normalized form; an analysis unit for determining a current state of entities being managed based on the normalized sensor data to thereby determine whether current services and/or resources that have been allocated to a user are being satisfied or not; and a personalization unit for examining state-related context data to determine what action to take. The personalization of the services and/or resources provided to a user or set of users is managed by context-sensitive policy rules. In addition, a set of abstractions, in the form of preferences, profiles, and subscriptions, are collectively used to determine the set of services and/or resources, as a function of context, that a user or set of users are entitled to receive.
    Type: Application
    Filed: September 9, 2010
    Publication date: June 9, 2011
    Applicant: POSTECH ACADEMY-INDUSTRY FOUNDATION
    Inventors: John Charles STRASSNER, James Won Ki HONG
  • Publication number: 20110137875
    Abstract: An incremental refresh of a materialized view may be simplified, and therefore made more cost efficient, by reducing the number of DML operations being merged with the materialized view during the incremental refresh. Specifically, subsequences of sequences of data manipulation language operations that have been recorded for a particular row of a base table may be inspected to determine whether the subsequences conform to particular patterns of data manipulation language operator types. If a subsequence conforms to one of the particular patterns, the subsequence may be replaced with a single substitute: either a single data manipulation language operation, or null. Refresh operations that are generated based on the simplified sequences of data manipulation language operations are more simple, and therefore, less costly to perform.
    Type: Application
    Filed: December 9, 2009
    Publication date: June 9, 2011
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Mohamed Ziauddin, Andrew Witkowski
  • Publication number: 20110137867
    Abstract: When updating the data in each generation's logical units, the snapshot processing unit writes the update data in accordance with the update as forward differential data 221 to the base volume, and saves the old data that existed in the base volume before that update data was written as backward differential data in the backward differential data pool, and, when each generation's logical unit backward differential data is updated, deletes the forward differential data belonging the production LUs and the snapshots that together with those production LUs form the forward differential group. As a result of this, the amount of metadata necessary for executing a host command is able to be reduced in production LUs utilizing snapshots using the forward differential method.
    Type: Application
    Filed: February 23, 2009
    Publication date: June 9, 2011
    Inventor: Yusuke Nonaka
  • Publication number: 20110137863
    Abstract: A storage system including: a storage device for storing a file; a plurality of file systems for managing the file; and a plurality of NAS servers that control access from a client to the file systems via a global namespace formed by grouping local namespaces for the one or more file systems; wherein, each NAS server includes a memory to store global namespace management information including global paths of the file systems; one NAS server of the NAS servers accepts a request to obtain snapshots of the file systems from external of the storage system; the one NAS server instructs itself and the other NAS servers to obtain snapshots of the file systems; the one NAS server and the other NAS servers obtain the snapshots of the file systems, and inform the one NAS server of snapshot identifiers and of local paths of the snapshots; the one NAS server makes snapshot management information including global paths of the snapshots based on each of the snapshot identifiers received from the other NAS servers and each
    Type: Application
    Filed: January 18, 2011
    Publication date: June 9, 2011
    Inventors: Tomoya ANZAI, Takahiro Nakano, Yoji Nakatani
  • Publication number: 20110137879
    Abstract: Apparatus, systems, and methods may operate to grant a renewable lease synchronization lock to a node for a file having copies distributed among a group of nodes that is unsynchronized and for which no write lock has already been granted. The synchronization lock disables modification of the file, and enables synchronization of a file copy on the requesting node to a synchronization master copy on another node in the group. A renewable lease write lock can be granted to a node in the group when the file is synchronized and when the write lock has not already been granted. The write lock disables granting the synchronization lock, and enables file modification. The synchronization lock and write lock are maintained until their respective leases expire. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: December 7, 2009
    Publication date: June 9, 2011
    Inventors: Saurabh Dubey, Kalyanasundaram S.
  • Publication number: 20110137864
    Abstract: Provided are techniques for, in response to a source object being changed by a local transaction, generating log records, wherein each of the log records includes a sequence identifier, a source system entity modification timestamp, a target key, a target partition identifier, and values of source properties, wherein the source properties are identified using a target key indicator. The log records to process are selected based on a phase value of each log record, wherein the phase value is one of submitted, in-flight, and source system entity state change complete. One or more disjoint partitions are assigned to each of multiple processing instances. Under control of each of the multiple processing instances, it is determined whether to transmit a log record in the one or more disjoint partitions assigned to said processing instance and, in response to determining that the log record is to be transmitted, the log record is transmitted.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harish Deshmukh, Frank C. Hayes, Roger C. Raphael, Paul S. Taylor
  • Publication number: 20110131192
    Abstract: Lock communications in a shared disk database system is reduced by several approaches: sending a single message to a lock manager for locks required for an operation and locks that will be required in the future, the operations may include row update, row delete, large scan, and row insert; performing an operation in two executions, where in a first execution locks required for the operation is determined without performing the operation, and in a second execution a single message is sent to a lock manager for the required locks and the operation is performed; in free space searching, sending a single message to a lock manager for row and page locks before a row insert is actually performed; and granting locks in an unfair manner.
    Type: Application
    Filed: November 27, 2009
    Publication date: June 2, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James L. Finnie, Ronen Grosman, Matthew A. Huras, Keriley K. Romanufa, Aamer Sachedina, Xun Xue, Roger L.Q. Zheng
  • Publication number: 20110131187
    Abstract: A system and method of managing stored data in a storage management system. The storage management system includes a storage manager, a media agent connected to the storage manager, and a primary volume connected to the media agent. A plurality of snapshots are taken of the primary volume. The snapshots are indexed by associating respective information with the snapshot. The indexed snapshots are copied to a recovery volume. In this way, browsing features are enabled for the user. The user may view the snapshots in a hierarchical format, and may even view snapshot data in association with the corresponding application. The resultant recovery volume may be used to replace a primary volume.
    Type: Application
    Filed: January 18, 2011
    Publication date: June 2, 2011
    Applicant: CommVault Systems, Inc.
    Inventors: Anand Prahlad, Andreas May, Norman R. Lunde, Lixin Zhou, Avinash Kumar, David Ngo
  • Publication number: 20110131193
    Abstract: Systems, methods, computer program product embodiments are provided for locking retained resources of database information in a distributed shared disk cluster environment. An embodiment includes providing a request on demand for physical access to a page by a task of a node among a cluster of nodes, managing selective bypassing of waiting access requests to the page at intranode and internode levels in response to the request on demand, and handling requests for page ownership to prioritize a request on demand. Further included are determining whether another node holds a lock on the page and identifying an access type for the waiting access requests in order to coordinate transfer of the lock to the node.
    Type: Application
    Filed: December 1, 2009
    Publication date: June 2, 2011
    Applicant: Sybase, Inc.
    Inventors: Kantikiran Krishna PASUPULETI, Anantha Krian KANDUKURI
  • Publication number: 20110131189
    Abstract: A method for managing a queue, such as for example a FIFO queue, and executing a look-ahead function on the data contained in the queue includes associating to the data in the queue respective state variables (C1, C2, . . . CK), the value of each of which represents the number of times a datum is present in the queue. The look-ahead function is then executed on the respective state variables, preferentially using a number of state variables (C1, C2, . . . CK) equal to the number of different values that may be assumed by the data in the queue. The look-ahead function can involve identification of the presence of a given datum in the queue and is, in that case, executed by verifying whether among the state variables (C1, C2, . . . CK) there exists a corresponding state variable with non-nil value.
    Type: Application
    Filed: November 22, 2010
    Publication date: June 2, 2011
    Applicant: STMicroelectronics S.r.I.
    Inventors: Daniele MANGANO, Giovanni Strano, Salvatore Pisasale
  • Publication number: 20110131183
    Abstract: A virtual machine may be discovered through a directory service or via an agent that is installed on the host operating system that is running the virtual machine. If the agent is installed on the virtual machine, the agent monitors changes to a set of protected volumes on the virtual machine. If the agent is installed on the host, the agent monitors changes to the protected volumes, which may contain one or more virtual servers on the host. Periodically, these changes from the host or the virtual server are sent to a data protection server. The data protection server updates its replicas of protected volumes with the sent changes. Versions of files on a data protection server corresponding to a volume of a virtual server may be restored to the virtual machine, to another machine, or may be viewed from the data protection server.
    Type: Application
    Filed: February 4, 2011
    Publication date: June 2, 2011
    Applicant: Microsoft Corporation
    Inventors: Nikhil Vijay Chandhok, Michael L. Michael, Robert M. Fries
  • Publication number: 20110125715
    Abstract: A method in a computer system for retrieving data from one of multiple copies of the data is provided, referred to as the data management system. The data management system receives a request identifying at least one data object to be accessed. Then, the data management system queries a metabase to locate data copies that contain the identified at least one data object, wherein the data copies are created from similar source data, and wherein for each data copy the metabase contains an indication of the availability of the copy relative to other copies. Next, the data management system determines one of the located data copies to use to access the identified at least one data object, wherein the determination is made based on the indicated availability contained in the metabase for each of the located data copies. Then, the data management system accesses the identified at least one data object using the determined one of the located data copies.
    Type: Application
    Filed: February 1, 2011
    Publication date: May 26, 2011
    Inventors: Rajiv Kottomtharayil, Parag Gokhale, Jun Lu
  • Publication number: 20110125721
    Abstract: Methods and apparatus, including computer program products, for deletion in data file forwarding framework. A framework includes a network of interconnected computer system nodes in which data files are continuously forwarded from computer memory to computer memory without storing on any physical storage device in the network, a central server coupled to the network, and a deletion server coupled to the network.
    Type: Application
    Filed: May 6, 2009
    Publication date: May 26, 2011
    Applicant: Tajitshu Transfer Limited Liability Company
    Inventors: Gene Fein, Edward Merritt
  • Publication number: 20110119235
    Abstract: The invention is a hierarchical backup system. The interconnected network computing devices are put into groups of backup cells. A backup cell has a manager software agent responsible maintaining and initiating a backup regime for the network computing devices in the backup cell. The backups are directed to backup devices within the backup cell. Several backup cells can be defined. A manager software agent for a particular cell may be placed into contact with the manager software agent of another cell, by which information about the cells may be passed back and forth. Additionally, one of the software agents may be given administrative control over another software agent with which it is in communication.
    Type: Application
    Filed: January 21, 2011
    Publication date: May 19, 2011
    Applicant: COMMVAULT SYSTEMS, INC.
    Inventors: John Crescenti, Srinivas Kavuri, David Alan Oshinsky, Anand Prahlad
  • Publication number: 20110113015
    Abstract: Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node.
    Type: Application
    Filed: January 12, 2011
    Publication date: May 12, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Maxwell Cannon, Colin Scott Dawson, Robert Clair Edwards, JR., Michael Allen Kaczmarski, Christopher Zaremba
  • Publication number: 20110113019
    Abstract: A database manager, computer program product and methods for managing a database utilized by multiple applications. In one embodiment, the database manager performs a database record change to database records by a first application. The database manager branches the database records such that the database record change is visible to the first application and is not visible to one or more other applications accessing the database. The database manager can merge database record changes made by the other applications such that database schema changes made by the other applications are visible to the first application.
    Type: Application
    Filed: November 9, 2009
    Publication date: May 12, 2011
    Inventors: Avraham Leff, James T. Rayfield
  • Publication number: 20110112819
    Abstract: System and methods for viewing a mobile screen from a mobile device on the desktop of a computer by operating a predefined pair of a mobile application program and a computer application program to provide continuous seamless integration of the processing of the data file as a pseudo-single session. When the user operates certain operations, the document opened by the mobile device application program is saved as a file, and automatically transferred from the mobile device storage file system to the computer storage file system. A pre-defined equivalent application software on the computer is launched and the copied computer file is opened on the computer screen outside or overlapping to the mobile device screen emulation window.
    Type: Application
    Filed: November 11, 2009
    Publication date: May 12, 2011
    Applicant: SONY CORPORATION
    Inventors: Kazuhiko Shirai, Yasuhiro Habara, Tsuyoshi Kodera, Koki Iwazaki
  • Publication number: 20110113012
    Abstract: Embodiments of the invention relate to creating an operating system and file system independent incremental data backup. A first data backup of a source system and second version of the data on the source system is received. A second data backup of the second version of the data is created by determining differences between the first data backup and the second version of the data. Each portion of the second version of the data that is the same as a portion of the first data backup is referenced in the second data backup. Each portion of the second version of the data that is different than all portions of the first data backup is included in the second data backup. The second data backup is appended to the first data backup to create an incremental data backup.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 12, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Daniel Gruhl, Jan H. Pieper, Mark Andrew Smith
  • Publication number: 20110106769
    Abstract: A distributed storage network receives a data object and determines a size of the data object. The network then determines whether the data object should be segmented into fixed size segments or variable sizes segments based upon some variable-length algorithm. If the fixed approach is selected, the data object is segmented into two or more fixed size segments with attached header information and the information is further processed using error coding dispersal storage functions within the network. If the variable approach is selected, the data object is segmented into two or more variable-sized segments with attached header information and the information is further processed using error coding dispersal storage functions within the network. Both the variable and fixed approaches enable storage of error-correctable data slices in a distributed storage manner.
    Type: Application
    Filed: June 17, 2010
    Publication date: May 5, 2011
    Applicant: CLEVERSAFE, INC.
    Inventors: ANDREW BAPTIST, SRINIVAS PALTHEPU, BART CILFONE, JASON K. RESCH, ILYA VOLVOVSKI
  • Publication number: 20110106765
    Abstract: A backup device which backs up data in a predetermined medium includes a first data acquisition element that acquires backup data, a second data acquisition element that acquires recorded data which has been already recorded in the predetermined medium, and a backup processing element that judges whether the backup data matches with the recorded data, records the backup data and reference data for referring to the backup data in the predetermined medium when the backup processing element judges that the backup data does not match with the recorded data, and records reference data of which reference destination is set to the recorded data which matches with the backup data in the predetermined medium when the backup processing element judges that the backup data matches with the recorded data.
    Type: Application
    Filed: November 1, 2010
    Publication date: May 5, 2011
    Applicant: Seiko Epson Corporation
    Inventor: Yutaka Yoshida