Concurrency Control And Recovery (epo) Patents (Class 707/E17.007)
-
Publication number: 20110184912Abstract: A method begins by a processing module obtaining a directory file and determining a new snapshot identifier (ID) for the directory file. The method continues with the processing module identifying a version of a filename to associate with the new snapshot ID and updating the directory file by associating the snapshot ID to the version of the filename to produce an updated directory file. The method continues with the processing module dispersed storage error encoding the updated directory file to produce a set of encoded updated directory file slices and sending the set of encoded updated directory file slices to a dispersed storage network (DSN) memory for storage.Type: ApplicationFiled: November 9, 2010Publication date: July 28, 2011Applicant: CLEVERSAFE, INC.Inventors: ANDREW BAPTIST, ILYA VOLVOVSKI, WESLEY LEGGETTE
-
Publication number: 20110178999Abstract: The invention relates to a device for monitoring physical objects that comprises one or more short-range remote readers (13), memory elements (5) to be attached to physical objects, and a controller (15) adapted for executing a reading function capable of interaction with the one or more remote readers in order to acquire data contained in adjacent memory elements, and for executing an integrity validation function capable of distinguishing, from the acquired data, individual identifiers particular to each of the memory elements as well as group description data stored in at least some of said memory elements, and of checking the sufficiency of group description data while checking the compliance of individual identifiers with corresponding group description data.Type: ApplicationFiled: May 20, 2009Publication date: July 21, 2011Applicant: INRIA INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUEInventors: Michel Banatre, Paul Couderc, Mathieu Becus, Fabien Allars
-
Publication number: 20110179082Abstract: Atomic test and set (ATS) operations are carried out to perform lock operations that allow a node to acquire or release a lock to a resource of a shared file system that is stored in a data storage unit (DSU) and update its liveness information. Each ATS operation includes the step of comparing contents accessed and read through the shared file system and contents stored at a particular logical block number of the DSU. If the two contents match, updates to the contents of the lock or the liveness information are permitted.Type: ApplicationFiled: March 29, 2011Publication date: July 21, 2011Applicant: VMWARE, INC.Inventors: Satyam B. VAGHANI, Manjunath RAJASHEKHAR
-
Publication number: 20110178997Abstract: A computer readable medium having software instructions that, when executed, perform a method for preserving data stored in a file system with a plurality of files. The method involves determining whether storage capacity of the file system has reached a threshold level, wherein the threshold level is stored in at least one of a plurality of size-reducing policies, obtaining a criterion from the at least one size-reducing policy, identifying a subset of the plurality of files that match the criterion, accessing metadata of each of the identified subset of files, wherein the metadata of each of the identified subset of files comprises at least one option for reducing a size of the file, and performing a size-reducing action to reduce a size of each of the identified subset of files based on the option for reducing the size of each of the identified subset of files and the criterion.Type: ApplicationFiled: January 15, 2010Publication date: July 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Darrin P. Johnson, William H. Moore, Eric C. Saxe
-
Publication number: 20110178985Abstract: The present invention faces the issue of data replication in different database nodes of a geographically distributed database wherein clients cannot always perform any database-related operation in the closest database node.Type: ApplicationFiled: September 30, 2009Publication date: July 21, 2011Inventors: Marta San Martin Arribas, Jorge Nevado Jimenez, Dennis Henriksen
-
Publication number: 20110178988Abstract: Provided are a computer system and its data control method that enable safe backup of data and reduction in the capacity of data to be backed up. A control processor refers to a differential and, if a differential bit is “0,” encrypts data of an online VOL with an encryption circuit by using key information, and transfers the encrypted data to a second storage system. If the differential bit is “1,” the control processor performs redundancy elimination processing to journal data, thereafter compresses the journal data with a compression circuit, encrypts the compressed journal data with an encryption circuit according to the key information, and transfers the journal data that was encrypted after compression to the second storage system.Type: ApplicationFiled: May 25, 2009Publication date: July 21, 2011Inventors: Ai Satoyama, Yoshiaki Eguchi
-
Publication number: 20110178993Abstract: Described are techniques for determining an implemented data protection policy. One or more recovery points corresponding to each of one or more storage objects are determined. A data protection method determined in accordance with a facility and replication type associated with said each recovery point is selected for each of said one or more recovery points. A data protection category for each of said one or more recovery points is determined in accordance with said data protection method, a recovery point type, and a recovery point location associated with said each recovery point. A data protection policy indicating an implemented data protection policy for each of said one or more storage objects for at least one data protection category is stored.Type: ApplicationFiled: April 4, 2011Publication date: July 21, 2011Inventors: Aharon BLITZER, Aviram KATZ, Roy DAHAN, Amit LIEBERMAN, Maayan MALTZ
-
Publication number: 20110178987Abstract: A method and apparatus for processing data at a data storage device according to remote control are provided. In response to a remote control permission request being received from a remote control device, identification information included in the remote control permission request may be authenticated. A remote control command according to a right corresponding to the identification information may be performed when the remote control command is received from the remote control device.Type: ApplicationFiled: December 9, 2010Publication date: July 21, 2011Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Jin Hyeock Choi
-
Publication number: 20110178989Abstract: According to the invention, a managing server, using a snapshot-appended information table which stores management information for identifying snapshots of a virtual server, a setting change table which stores setting change information on the virtual server, and a policy table which stores policies to be met by the virtual server, acquires the setting change information from the setting change table, selects the setting change information items from the acquired setting change information matching policies stored in the policy table, acquires management information on the snapshots of the virtual server from the snapshot-appended information table, identifies a snapshot of the virtual server with reference to the acquired management information, changes the identified snapshot of the virtual server based on the selected setting change information items, and rolls back the virtual server according to the changed snapshot.Type: ApplicationFiled: March 31, 2011Publication date: July 21, 2011Applicant: HITACHI, LTD.Inventors: Kentaro WATANABE, Yoshimasa MASUOKA
-
Publication number: 20110178983Abstract: A cluster recovery process is implemented across a set of distributed archives, where each individual archive is a storage cluster of preferably symmetric nodes. Each node of a cluster typically executes an instance of an application that provides object-based storage of fixed content data and associated metadata. According to the storage method, an association or “link” between a first cluster and a second cluster is first established to facilitate replication. The first cluster is sometimes referred to as a “primary” whereas the “second” cluster is sometimes referred to as a “replica.” Once the link is made, the first cluster's fixed content data and metadata are then replicated from the first cluster to the second cluster, preferably in a continuous manner. Upon a failure of the first cluster, however, a failover operation occurs, and clients of the first cluster are redirected to the second cluster.Type: ApplicationFiled: March 28, 2011Publication date: July 21, 2011Applicant: HITACHI DATA SYSTEMS CORPORATIONInventors: Benjamin K.D. Bernhard, Robert S. Mason, JR.
-
Publication number: 20110173154Abstract: A method for reorganizing a catalog to improve I/O performance includes initially placing a shared lock on a source catalog. The method then makes a point-in-time copy of the source catalog to generate a target catalog. Once the target catalog is generated, the method reorganizes the contents of the target catalog. Optionally, while reorganizing the contents of the target catalog, the method temporarily releases the shared lock on the source catalog and mirrors I/O intended for the source catalog to a buffer. The buffered I/O may then be used to update the target catalog to bring it current with the source catalog. When the target catalog is reorganized and up-to-date, the method upgrades the shared lock on the source catalog to an exclusive lock, overwrites the source catalog with the target catalog, and releases the exclusive lock. A corresponding apparatus and computer program product are also disclosed and claimed herein.Type: ApplicationFiled: January 9, 2010Publication date: July 14, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Philip R. Chauvet, David C. Reed, Michael R. Scott, Max D. Smith
-
Publication number: 20110173159Abstract: Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object.Type: ApplicationFiled: March 25, 2011Publication date: July 14, 2011Applicant: EMC CORPORATIONInventors: Thomas L. Dings, Jacob M. Jacob, Subramanian Periyagaram, Pashupati Kumar, Robert W. Toop
-
Publication number: 20110173157Abstract: Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is communicated between endpoints are disclosed. In such systems and methods the representation of data on an endpoint may be modified so that constraints on that particular endpoint are enforced, without requiring a similar or the same modification to the data when it is synchronized to other endpoints.Type: ApplicationFiled: March 23, 2011Publication date: July 14, 2011Applicant: MICROSOFT CORPORATIONInventors: Akash J. Sagar, George P. Moromisato, Richard Yiu-Sai Chung, Paresh S. Suthar, Raymond E. Ozzie, Jack E. Ozzie, Matthew S. Augustine
-
Publication number: 20110167050Abstract: Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, file or operating system activity relating to a code module is intercepted. A cryptographic hash value of the code module is authenticated with reference to a multi-level whitelist, which includes a remote global whitelist and a local whitelist. The remote global whitelist is maintained by a trusted service provider and contains cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist is accessible by computer systems within the LAN and contains cryptographic hash values of a subset of the approved code modules. The cryptographic hash value is checked against the local whitelist. If no match is found, it is checked against the global whitelist. The code module is allowed to be loaded and executed if the cryptographic hash value corresponds to an approved code module.Type: ApplicationFiled: February 17, 2011Publication date: July 7, 2011Applicant: FORTINET, INC.Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
-
Publication number: 20110167046Abstract: An information processing apparatus includes a discrimination unit that discriminates types of recording media recording contents, a search unit that searches for a predetermined folder determined by a standard of recording of the contents recorded on the recording media, a determination unit that determines whether a recording position of the predetermined folder searched for by the search unit meets a standard of the recording media, and a restoration unit that restores the predetermined folder when the determination unit determines that the recording position of the predetermined folder does not meet the standard of the recording media.Type: ApplicationFiled: December 6, 2010Publication date: July 7, 2011Applicant: Sony CorporationInventor: Kenichi MIZUKAMI
-
Publication number: 20110167043Abstract: Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user's location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user's identification, the IP address, the time of search, and differences between the search terms used in the search queries.Type: ApplicationFiled: March 17, 2011Publication date: July 7, 2011Applicant: MICROSOFT CORPORATIONInventors: Michael D. Hintze, Frederic H. Behr, JR., Randall F. Kern, Zijian Zheng, Kimberly J. Howell
-
Publication number: 20110161295Abstract: This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time.Type: ApplicationFiled: December 27, 2010Publication date: June 30, 2011Inventor: David Ngo
-
Publication number: 20110161285Abstract: An approach is provided for automatic controlled value expansion of information. A value expansion controller detects a request at a device to perform an information operation on a set of data elements of an information space, wherein the request identifies the set by a name and the information operation applies to each data element within the set. The value expansion controller intercepts the request based on the detection and determines the location of the data elements within a communication network based on the name. The value expansion controller retrieves the data elements from the location and populates an expansion table with the retrieved data elements, wherein the expansion table is correlated to the set. The value expansion controller performs the information operation on each data element in the expansion table and causes transmission of one or more results of the information operation to the device.Type: ApplicationFiled: December 30, 2009Publication date: June 30, 2011Applicant: Nokia CorporationInventors: Sergey Boldyrev, Jukka Honkola, Vesa Luukkala
-
Publication number: 20110161560Abstract: Systems and methods are disclosed to reduce the number of partial logical groups that are erased by writing erase patterns to memory in a non-volatile memory system. When a non-aligned erase command is received, the logical addresses of data associated with the erase command may be marked as erased. If the logical group corresponds to the size of a physical metablock, the controller may also issue a physical erase command for complete logical groups within the erase command. For those parts of the erase command that encompass only partial logical groups, the ranges of the logical block addresses marked for erasure are stored. As subsequent erase commands are received the address ranges of the erase commands are added to the previously stored address ranges. When a set of erase commands spans an entire logical group, the logical group is marked for physical erasure in its entirety.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Inventors: Neil D. Hutchison, Alan D. Bennett, Sergey A. Gorobets, Steven T. Sprouse
-
Publication number: 20110161303Abstract: A system and method for analyzing official notices of an electronically filed patent application are based on a file server that connects to patent office websites, a database, and client computers. An official notice of the patent application is downloaded from one of the patent office websites according to a download command from one of the client computers, and is converted to an image format document. Character data of the image format document are identified, and patent information of the electronically filed patent application are extracted from the character data using a regular expression. In addition, the patent information are analyzed to generate analysis results of the official notice according to the comparison.Type: ApplicationFiled: June 17, 2010Publication date: June 30, 2011Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD, HON HAI PRECISION INDUSTRY CO., LTD.Inventors: CHUNG-I LEE, HAI-HONG LIN, DE-YI XIE, ZHENG-CAI ZHU, HAI-YUN CHEN, SHUAI-JUN TAO
-
Publication number: 20110161299Abstract: A system and method for using a snapshot as a data source is described. In some cases, the system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions.Type: ApplicationFiled: December 27, 2010Publication date: June 30, 2011Inventors: Anand Prahlad, Rahul S. Pawar
-
Publication number: 20110153573Abstract: A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.Type: ApplicationFiled: December 17, 2009Publication date: June 23, 2011Applicant: American Express Travel Related Services Company, Inc.Inventor: Tracey R. Thomas
-
Publication number: 20110153565Abstract: A configuration information management device includes a storage unit for storing a configuration item and an item relationship. The configuration information management device controls to cause the storage unit or the different configuration information management device to store the item relationship. The configuration information management device also controls to cause the storage unit or the different configuration information management device containing a configuration item connected to the item relationship to store a replica of the item relationship. When a search request including a series of the configuration item and the item relationship is accepted, the configuration information management device decomposes the search request such that the configuration item and the item relationship arranged in series are together treated as a unit of processing, and performs a search process for each unit of processing.Type: ApplicationFiled: December 20, 2010Publication date: June 23, 2011Applicant: FUJITSU LIMITEDInventors: Masazumi MATSUBARA, Hiroshi Otsuka, Yuji Wada, Yasuhide Matsumoto
-
Publication number: 20110153566Abstract: The subject disclosure relates to a concurrency control technique that ensures isolation among concurrently execution transactions optimistically in a multiversion database by applying two optional tests at the end of a read-write transaction: validating the visibility of the read set of the read-write transaction(s) and phantom detection by re-scanning and confirming no new version have appeared in the view. Depending on desired level of isolation, both, one or none of the test are applied. Each version of a data record in an applicable database can be assigned two timestamps indicating the lifetime the version. The value of a version timestamp, though assigned, may be conditional on a transaction committing.Type: ApplicationFiled: December 18, 2009Publication date: June 23, 2011Applicant: MICROSOFT CORPORATIONInventors: Per-Ake Larson, Cristian Diaconu, Michael J. Zwilling, Craig Steven Freedman
-
Publication number: 20110153569Abstract: In one embodiment, systems and methods are provided for nonlinear journaling. In one embodiment, groups of data designated for storage in a data storage unit are journaled into persistent storage. In one embodiment, the journal data is recorded nonlinearly. In one embodiment, a linked data structure records data and data descriptors in persistent storage.Type: ApplicationFiled: February 25, 2011Publication date: June 23, 2011Inventors: Neal T. Fachan, Peter J. Godman, Justin M. Husted, Aaron J. Passey
-
Publication number: 20110153571Abstract: One embodiment of a system for analyzing client file systems in accordance with the present disclosure comprises a backup repository storing backup data of file systems of client computers remote from the backup repository. The system further comprises a backup server that analyzes the file systems of the client computers using the backup data at the backup repository and reports a problem detected in a file system of a client computer to a user of the client computer.Type: ApplicationFiled: September 15, 2008Publication date: June 23, 2011Inventors: Philip M. Walker, Jason D. Goldman, Charles M. Mcjilton
-
Publication number: 20110153373Abstract: A reservation management system includes at least one processing node that includes a memory and a processor. The at least one processing node further includes a set of reservation processing and transaction modules that manage and process reservation requests and inquiries. At least one general purpose database is communicatively coupled to the at least one processing node. The at least one general purpose database includes a set of pre-allocated tables of fixed length records. At least one persistent storage device is communicatively coupled to the at least one processing node. The general purpose database persistently stores the set of pre-allocated tables of fixed length records on the at least one persistent storage device.Type: ApplicationFiled: December 22, 2009Publication date: June 23, 2011Applicant: International Business Machines CorporationInventors: Paul M. Dantzig, Sastry S. Duri, Arun Iyengar, Francis Parr
-
Publication number: 20110145202Abstract: An archiving system for enabling searching for collections of items is disclosed. A processing unit displays an archived items collection management template in respect of a particular collection of items and prompts a user to complete the template fields with data obtained by the user from manually reviewing that collection of items to capture information relevant to each of the template fields. An archiving controller stores, in pre-determined data fields of a storage area of a data store corresponding to said collection of items, the data from the completed template fields. A document search controller may search the pre-determined data fields of the storage areas of the data store corresponding to each of the collections of items to identify ones of the collection of items which match search criteria.Type: ApplicationFiled: November 19, 2010Publication date: June 16, 2011Inventors: Gabrielle Sarah Phyo, Nickola John Vidovich, Elizabeth Foster
-
Publication number: 20110145204Abstract: A technique for transaction recovery by one transaction manager of another transaction manager's transactions in which each transaction manager is adapted to manage two phase commit transactional operations on transactional resources and to record commit or rollback decisions in a transaction recovery log. The recovery transaction manager detects apparent unavailability of the another transaction manager for transaction processing and initiates a transaction recovery process for the another transaction manager's transactions. This process also determines whether any of the transactions of the another transaction manager have all respective resources prepared to commit without there yet being a pending commit decision record in the another transaction manager's recovery log. If so, the recovery transaction manager writes a rollback record indicating an intention to roll back the identified transaction, in the another transaction manager's recovery log provided no commit decision record has been recorded.Type: ApplicationFiled: October 4, 2010Publication date: June 16, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon J. Maple, Ian Robinson
-
Publication number: 20110145197Abstract: By considering a device life and time needed for data migration, data stored in a storage apparatus is securely preserved until a retention term of each of the data. Multiple disk devices 40A to 40C that store a data file generated by a service server apparatus 30 are included. A migration manager 11 of a management server apparatus 10 acquires preservation period information that indicates a preservation period of the data file from the service server apparatus 30, and calculates a preservation term of the data file based on the preservation period information. The migration manager 11 of the management server apparatus 10 also acquires data amount information of the data file from the service server apparatus 30, and calculates a necessary time needed for migrating the data file to other disk devices A40A to 40C.Type: ApplicationFiled: December 3, 2008Publication date: June 16, 2011Applicant: Hitachi Ltd.Inventors: Toshiki Kamohara, Shiori Inoue, Naoto Yanagi
-
Publication number: 20110137877Abstract: An apparatus for creating and managing personalized services includes: a pre-processing unit for converting vendor- and device-specific sensor data into a normalized form; an analysis unit for determining a current state of entities being managed based on the normalized sensor data to thereby determine whether current services and/or resources that have been allocated to a user are being satisfied or not; and a personalization unit for examining state-related context data to determine what action to take. The personalization of the services and/or resources provided to a user or set of users is managed by context-sensitive policy rules. In addition, a set of abstractions, in the form of preferences, profiles, and subscriptions, are collectively used to determine the set of services and/or resources, as a function of context, that a user or set of users are entitled to receive.Type: ApplicationFiled: September 9, 2010Publication date: June 9, 2011Applicant: POSTECH ACADEMY-INDUSTRY FOUNDATIONInventors: John Charles STRASSNER, James Won Ki HONG
-
Publication number: 20110137875Abstract: An incremental refresh of a materialized view may be simplified, and therefore made more cost efficient, by reducing the number of DML operations being merged with the materialized view during the incremental refresh. Specifically, subsequences of sequences of data manipulation language operations that have been recorded for a particular row of a base table may be inspected to determine whether the subsequences conform to particular patterns of data manipulation language operator types. If a subsequence conforms to one of the particular patterns, the subsequence may be replaced with a single substitute: either a single data manipulation language operation, or null. Refresh operations that are generated based on the simplified sequences of data manipulation language operations are more simple, and therefore, less costly to perform.Type: ApplicationFiled: December 9, 2009Publication date: June 9, 2011Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Mohamed Ziauddin, Andrew Witkowski
-
Publication number: 20110137867Abstract: When updating the data in each generation's logical units, the snapshot processing unit writes the update data in accordance with the update as forward differential data 221 to the base volume, and saves the old data that existed in the base volume before that update data was written as backward differential data in the backward differential data pool, and, when each generation's logical unit backward differential data is updated, deletes the forward differential data belonging the production LUs and the snapshots that together with those production LUs form the forward differential group. As a result of this, the amount of metadata necessary for executing a host command is able to be reduced in production LUs utilizing snapshots using the forward differential method.Type: ApplicationFiled: February 23, 2009Publication date: June 9, 2011Inventor: Yusuke Nonaka
-
Publication number: 20110137863Abstract: A storage system including: a storage device for storing a file; a plurality of file systems for managing the file; and a plurality of NAS servers that control access from a client to the file systems via a global namespace formed by grouping local namespaces for the one or more file systems; wherein, each NAS server includes a memory to store global namespace management information including global paths of the file systems; one NAS server of the NAS servers accepts a request to obtain snapshots of the file systems from external of the storage system; the one NAS server instructs itself and the other NAS servers to obtain snapshots of the file systems; the one NAS server and the other NAS servers obtain the snapshots of the file systems, and inform the one NAS server of snapshot identifiers and of local paths of the snapshots; the one NAS server makes snapshot management information including global paths of the snapshots based on each of the snapshot identifiers received from the other NAS servers and eachType: ApplicationFiled: January 18, 2011Publication date: June 9, 2011Inventors: Tomoya ANZAI, Takahiro Nakano, Yoji Nakatani
-
Publication number: 20110137879Abstract: Apparatus, systems, and methods may operate to grant a renewable lease synchronization lock to a node for a file having copies distributed among a group of nodes that is unsynchronized and for which no write lock has already been granted. The synchronization lock disables modification of the file, and enables synchronization of a file copy on the requesting node to a synchronization master copy on another node in the group. A renewable lease write lock can be granted to a node in the group when the file is synchronized and when the write lock has not already been granted. The write lock disables granting the synchronization lock, and enables file modification. The synchronization lock and write lock are maintained until their respective leases expire. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: December 7, 2009Publication date: June 9, 2011Inventors: Saurabh Dubey, Kalyanasundaram S.
-
Publication number: 20110137864Abstract: Provided are techniques for, in response to a source object being changed by a local transaction, generating log records, wherein each of the log records includes a sequence identifier, a source system entity modification timestamp, a target key, a target partition identifier, and values of source properties, wherein the source properties are identified using a target key indicator. The log records to process are selected based on a phase value of each log record, wherein the phase value is one of submitted, in-flight, and source system entity state change complete. One or more disjoint partitions are assigned to each of multiple processing instances. Under control of each of the multiple processing instances, it is determined whether to transmit a log record in the one or more disjoint partitions assigned to said processing instance and, in response to determining that the log record is to be transmitted, the log record is transmitted.Type: ApplicationFiled: December 4, 2009Publication date: June 9, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Harish Deshmukh, Frank C. Hayes, Roger C. Raphael, Paul S. Taylor
-
Publication number: 20110131192Abstract: Lock communications in a shared disk database system is reduced by several approaches: sending a single message to a lock manager for locks required for an operation and locks that will be required in the future, the operations may include row update, row delete, large scan, and row insert; performing an operation in two executions, where in a first execution locks required for the operation is determined without performing the operation, and in a second execution a single message is sent to a lock manager for the required locks and the operation is performed; in free space searching, sending a single message to a lock manager for row and page locks before a row insert is actually performed; and granting locks in an unfair manner.Type: ApplicationFiled: November 27, 2009Publication date: June 2, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James L. Finnie, Ronen Grosman, Matthew A. Huras, Keriley K. Romanufa, Aamer Sachedina, Xun Xue, Roger L.Q. Zheng
-
Publication number: 20110131187Abstract: A system and method of managing stored data in a storage management system. The storage management system includes a storage manager, a media agent connected to the storage manager, and a primary volume connected to the media agent. A plurality of snapshots are taken of the primary volume. The snapshots are indexed by associating respective information with the snapshot. The indexed snapshots are copied to a recovery volume. In this way, browsing features are enabled for the user. The user may view the snapshots in a hierarchical format, and may even view snapshot data in association with the corresponding application. The resultant recovery volume may be used to replace a primary volume.Type: ApplicationFiled: January 18, 2011Publication date: June 2, 2011Applicant: CommVault Systems, Inc.Inventors: Anand Prahlad, Andreas May, Norman R. Lunde, Lixin Zhou, Avinash Kumar, David Ngo
-
Publication number: 20110131193Abstract: Systems, methods, computer program product embodiments are provided for locking retained resources of database information in a distributed shared disk cluster environment. An embodiment includes providing a request on demand for physical access to a page by a task of a node among a cluster of nodes, managing selective bypassing of waiting access requests to the page at intranode and internode levels in response to the request on demand, and handling requests for page ownership to prioritize a request on demand. Further included are determining whether another node holds a lock on the page and identifying an access type for the waiting access requests in order to coordinate transfer of the lock to the node.Type: ApplicationFiled: December 1, 2009Publication date: June 2, 2011Applicant: Sybase, Inc.Inventors: Kantikiran Krishna PASUPULETI, Anantha Krian KANDUKURI
-
Publication number: 20110131189Abstract: A method for managing a queue, such as for example a FIFO queue, and executing a look-ahead function on the data contained in the queue includes associating to the data in the queue respective state variables (C1, C2, . . . CK), the value of each of which represents the number of times a datum is present in the queue. The look-ahead function is then executed on the respective state variables, preferentially using a number of state variables (C1, C2, . . . CK) equal to the number of different values that may be assumed by the data in the queue. The look-ahead function can involve identification of the presence of a given datum in the queue and is, in that case, executed by verifying whether among the state variables (C1, C2, . . . CK) there exists a corresponding state variable with non-nil value.Type: ApplicationFiled: November 22, 2010Publication date: June 2, 2011Applicant: STMicroelectronics S.r.I.Inventors: Daniele MANGANO, Giovanni Strano, Salvatore Pisasale
-
Publication number: 20110131183Abstract: A virtual machine may be discovered through a directory service or via an agent that is installed on the host operating system that is running the virtual machine. If the agent is installed on the virtual machine, the agent monitors changes to a set of protected volumes on the virtual machine. If the agent is installed on the host, the agent monitors changes to the protected volumes, which may contain one or more virtual servers on the host. Periodically, these changes from the host or the virtual server are sent to a data protection server. The data protection server updates its replicas of protected volumes with the sent changes. Versions of files on a data protection server corresponding to a volume of a virtual server may be restored to the virtual machine, to another machine, or may be viewed from the data protection server.Type: ApplicationFiled: February 4, 2011Publication date: June 2, 2011Applicant: Microsoft CorporationInventors: Nikhil Vijay Chandhok, Michael L. Michael, Robert M. Fries
-
Publication number: 20110125715Abstract: A method in a computer system for retrieving data from one of multiple copies of the data is provided, referred to as the data management system. The data management system receives a request identifying at least one data object to be accessed. Then, the data management system queries a metabase to locate data copies that contain the identified at least one data object, wherein the data copies are created from similar source data, and wherein for each data copy the metabase contains an indication of the availability of the copy relative to other copies. Next, the data management system determines one of the located data copies to use to access the identified at least one data object, wherein the determination is made based on the indicated availability contained in the metabase for each of the located data copies. Then, the data management system accesses the identified at least one data object using the determined one of the located data copies.Type: ApplicationFiled: February 1, 2011Publication date: May 26, 2011Inventors: Rajiv Kottomtharayil, Parag Gokhale, Jun Lu
-
Publication number: 20110125721Abstract: Methods and apparatus, including computer program products, for deletion in data file forwarding framework. A framework includes a network of interconnected computer system nodes in which data files are continuously forwarded from computer memory to computer memory without storing on any physical storage device in the network, a central server coupled to the network, and a deletion server coupled to the network.Type: ApplicationFiled: May 6, 2009Publication date: May 26, 2011Applicant: Tajitshu Transfer Limited Liability CompanyInventors: Gene Fein, Edward Merritt
-
Publication number: 20110119235Abstract: The invention is a hierarchical backup system. The interconnected network computing devices are put into groups of backup cells. A backup cell has a manager software agent responsible maintaining and initiating a backup regime for the network computing devices in the backup cell. The backups are directed to backup devices within the backup cell. Several backup cells can be defined. A manager software agent for a particular cell may be placed into contact with the manager software agent of another cell, by which information about the cells may be passed back and forth. Additionally, one of the software agents may be given administrative control over another software agent with which it is in communication.Type: ApplicationFiled: January 21, 2011Publication date: May 19, 2011Applicant: COMMVAULT SYSTEMS, INC.Inventors: John Crescenti, Srinivas Kavuri, David Alan Oshinsky, Anand Prahlad
-
Publication number: 20110113015Abstract: Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node.Type: ApplicationFiled: January 12, 2011Publication date: May 12, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Maxwell Cannon, Colin Scott Dawson, Robert Clair Edwards, JR., Michael Allen Kaczmarski, Christopher Zaremba
-
Publication number: 20110113019Abstract: A database manager, computer program product and methods for managing a database utilized by multiple applications. In one embodiment, the database manager performs a database record change to database records by a first application. The database manager branches the database records such that the database record change is visible to the first application and is not visible to one or more other applications accessing the database. The database manager can merge database record changes made by the other applications such that database schema changes made by the other applications are visible to the first application.Type: ApplicationFiled: November 9, 2009Publication date: May 12, 2011Inventors: Avraham Leff, James T. Rayfield
-
Publication number: 20110112819Abstract: System and methods for viewing a mobile screen from a mobile device on the desktop of a computer by operating a predefined pair of a mobile application program and a computer application program to provide continuous seamless integration of the processing of the data file as a pseudo-single session. When the user operates certain operations, the document opened by the mobile device application program is saved as a file, and automatically transferred from the mobile device storage file system to the computer storage file system. A pre-defined equivalent application software on the computer is launched and the copied computer file is opened on the computer screen outside or overlapping to the mobile device screen emulation window.Type: ApplicationFiled: November 11, 2009Publication date: May 12, 2011Applicant: SONY CORPORATIONInventors: Kazuhiko Shirai, Yasuhiro Habara, Tsuyoshi Kodera, Koki Iwazaki
-
Publication number: 20110113012Abstract: Embodiments of the invention relate to creating an operating system and file system independent incremental data backup. A first data backup of a source system and second version of the data on the source system is received. A second data backup of the second version of the data is created by determining differences between the first data backup and the second version of the data. Each portion of the second version of the data that is the same as a portion of the first data backup is referenced in the second data backup. Each portion of the second version of the data that is different than all portions of the first data backup is included in the second data backup. The second data backup is appended to the first data backup to create an incremental data backup.Type: ApplicationFiled: November 6, 2009Publication date: May 12, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel Gruhl, Jan H. Pieper, Mark Andrew Smith
-
Publication number: 20110106769Abstract: A distributed storage network receives a data object and determines a size of the data object. The network then determines whether the data object should be segmented into fixed size segments or variable sizes segments based upon some variable-length algorithm. If the fixed approach is selected, the data object is segmented into two or more fixed size segments with attached header information and the information is further processed using error coding dispersal storage functions within the network. If the variable approach is selected, the data object is segmented into two or more variable-sized segments with attached header information and the information is further processed using error coding dispersal storage functions within the network. Both the variable and fixed approaches enable storage of error-correctable data slices in a distributed storage manner.Type: ApplicationFiled: June 17, 2010Publication date: May 5, 2011Applicant: CLEVERSAFE, INC.Inventors: ANDREW BAPTIST, SRINIVAS PALTHEPU, BART CILFONE, JASON K. RESCH, ILYA VOLVOVSKI
-
Publication number: 20110106765Abstract: A backup device which backs up data in a predetermined medium includes a first data acquisition element that acquires backup data, a second data acquisition element that acquires recorded data which has been already recorded in the predetermined medium, and a backup processing element that judges whether the backup data matches with the recorded data, records the backup data and reference data for referring to the backup data in the predetermined medium when the backup processing element judges that the backup data does not match with the recorded data, and records reference data of which reference destination is set to the recorded data which matches with the backup data in the predetermined medium when the backup processing element judges that the backup data matches with the recorded data.Type: ApplicationFiled: November 1, 2010Publication date: May 5, 2011Applicant: Seiko Epson CorporationInventor: Yutaka Yoshida