Concurrency Control And Recovery (epo) Patents (Class 707/E17.007)
  • Publication number: 20130054531
    Abstract: A database management system (DBMS) maintains a clone database in a clone space without storing an entire copy of the database and without requiring a snapshot function from an underlying storage device. This DBMS may receive a database command to access a data block of the clone database, and may determine whether the data block is stored in the clone space. If the data block is not stored in the local clone space, the DBMS may receive the data block from a backup copy of the database. If the database command comprises a write operation, the DBMS may perform the write operation to update the data block, and may store the updated data block in the clone space. Also, if the database command comprises a read operation, the DBMS may perform the read operation on the data block received from the backup copy of the database.
    Type: Application
    Filed: August 25, 2011
    Publication date: February 28, 2013
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Margaret Susairaj, Sumanta K. Chatterjee
  • Publication number: 20130054533
    Abstract: The subject disclosure is directed towards verifying a data recovery component of a volume snapshot service using a managed interface. The managed interface enables interoperability between the data recovery component and one or more complementary data recovery components by converting compatible instructions for the data recovery component and a complementary data recovery component into native data recovery operations for the volume snapshot service and vice versa. Via the managed interface, the complementary data recovery component emulates the native data recovery operations. Using status information associated with such an emulation, the data recovery component is verifiable.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Howard Hao, James Robert Benton, Thothathri Vanamamalai
  • Publication number: 20130054539
    Abstract: A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, modifying records in the first set to make them consistent with the functional dependency to provide an output consistent database instance, determining a second set of records of the output consistent database instance comprising duplicate records, merging duplicate records in the second set in dependence on the functional dependencies of the records to provide a modified database instance.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Applicant: Qatar Foundation
    Inventors: Ihab Francis Ilyas KALDAS, Mohamed YAKOUT, Ahmed K. ELMAGARMID
  • Publication number: 20130054536
    Abstract: A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available.
    Type: Application
    Filed: November 18, 2011
    Publication date: February 28, 2013
    Applicant: ACCENTURE GLOBAL SERVICES LIMITED
    Inventors: Shubhashis Sengupta, Annervaz Karukapadath Mohamedrasheed
  • Publication number: 20130036104
    Abstract: Techniques for managing data objects of a data storage system are described herein. According to one embodiment, a hash function is generated for a plurality of data objects by analyzing each of the data objects stored in the data storage system. For each of the data objects, a hash operation is performed on the data object using the hash function, generating a hash value. The hash value is associated with a predetermined attribute of the data object, such that the predetermined attribute of the data object is uniquely identified using the hash function subsequently in response to a request for accessing the predetermined attribute of the data object. The data object is then stored at a persistent storage location of the data storage system, wherein the persistent storage location is identifiable based on a hash value obtained from the hash function.
    Type: Application
    Filed: October 11, 2012
    Publication date: February 7, 2013
    Inventor: Windsor W. Hsu
  • Publication number: 20130036093
    Abstract: The invention concerns reliable writing of database log data, In particular, the invention concerns a computer system, methods and software to enable database log data to be written to recoverable storage in a reliable way. There is provided a computer system (100) for writing database log data to recoverable storage (60) comprising a durable database management system (DBMS) (40); and a hypervisor (80) or kernel 81 that enables communications between the recoverable storage device driver (52) and a recoverable storage device (60) to write the log data written to the non recoverable storage (92) and (42) to the recoverable storage device (60) asynchronously to the continued writing of log data to the non-recoverable storage (42) and (92). This allows the DBMS (40) to ensure recoverability and serializability and still allowing logs to be written asynchronously removing a performance bottleneck for the DBMS.
    Type: Application
    Filed: December 17, 2010
    Publication date: February 7, 2013
    Applicant: National ICT Australia Limited
    Inventors: Gernot Heiser, Aleksander Budzynowsi
  • Publication number: 20130024645
    Abstract: Intercepting a requested memory operation corresponding to a conventional memory is disclosed. The requested memory operation is translated to be applied to a structured memory.
    Type: Application
    Filed: May 20, 2010
    Publication date: January 24, 2013
    Applicant: HICAMP SYSTEMS, INC.
    Inventors: David R. Cheriton, Alexandre Y. Solomatnikov
  • Publication number: 20130024436
    Abstract: Systems and methods for providing more efficient handling of I/O requests for clustered file system data subject to data migration or the like. For instance, exemplary systems can more quickly determine if certain files on primary storage represent actual file data or stub data for recalling file data from secondary storage. Certain embodiments utilize a driver cache on each cluster node to maintain a record of recently accessed files that represent regular files (as opposed to stubs). A dual-locking process, using both strict locking and relaxed locking, maintains consistency between driver caches on different nodes and the data of the underlying clustered file system, while providing improved access to the data by the different nodes. Moreover, a signaling process can be used, such as with zero-length files, for alerting drivers on different nodes that data migration is to be performed and/or that the driver caches should be flushed.
    Type: Application
    Filed: June 21, 2012
    Publication date: January 24, 2013
    Applicant: COMMVAULT SYSTEMS, INC.
    Inventor: Andrei Erofeev
  • Publication number: 20130024424
    Abstract: Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Applicant: CommVault Systems, Inc.
    Inventors: Anand Prahlad, Marcus S. Muller, Rajiv Kottomtharayil, Srinivas Kavuri, Parag Gokhale, Manoj Vijayan
  • Publication number: 20130024427
    Abstract: A method and an apparatus for recovering a database backup is provided by the present invention, wherein the method comprises: backing up an old version database, wherein table structures of the old version database are stored; clearing records of all tables in a new version database, and acquiring table structures of the new version database; comparing the table structures of the old version database with the table structures of the new version database, and determining that the table structures changes; and recovering a backup of the old version database into the new version database according to a type of the change and a corresponding preset strategy. The forward compatibility of database backup recovery is achieved by the present invention.
    Type: Application
    Filed: November 22, 2010
    Publication date: January 24, 2013
    Applicant: ZTE CORPORATION
    Inventor: Tao Long
  • Publication number: 20130018852
    Abstract: In one embodiment, a system includes a data storage device for storing one or more storage volumes, logic adapted for associating an indicator with a data set on the one or more storage volumes, wherein the indicator is in a first state indicating that the data set is accessible, logic adapted for storing the indicator associated with the data set in a data set descriptor record, wherein the record is stored in at least one mapping of the one or more storage volumes, logic adapted for receiving a request to delete the data set, logic adapted for changing the indicator to a second state indicating that the data set is inaccessible in response to the request to delete the data set, with the proviso that the data set is unchanged, logic adapted for receiving a request to restore the deleted data set, and logic adapted for restoring the indicator from the second state to the first state in response to the request to restore the deleted data set.
    Type: Application
    Filed: July 15, 2011
    Publication date: January 17, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leslie A. Barton, Gavin S. Johnson, Michael J. Koester, Carrie J. Van Noorden
  • Publication number: 20130018860
    Abstract: Various technologies and techniques are disclosed for supporting parallel nested transactions in a transactional memory system. Multiple closed nested transactions are created for a single parent transaction, and the closed nested transactions are executed concurrently as parallel nested transactions. Various techniques are used to ensure effects of the parallel nested transactions are hidden from other transactions outside the parent transaction until the parent transaction commits. For example, retry is allowed to work correctly with parallel nested transactions. When a transaction that is a parallel nested transaction or a child transaction of the parallel nested transaction executes a retry, a read set of the transaction is registered for the retry. When a decision is made to propagate the retry past a parallel nested transaction parent of the transaction, keeping the read set registered and making the read set part of a parent read set.
    Type: Application
    Filed: September 18, 2012
    Publication date: January 17, 2013
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20130013573
    Abstract: For recovery of data chunks from alternate data stores, a method detects a damaged copy of a first data chunk of a deduplicated data object within a first storage pool of plurality of storage pools storing data chunks. The method further locates an undamaged copy of the first data chunk in an alternate storage pool within the plurality of storage pools from a system-wide deduplication index that indexes each data chunk in each storage pool. In addition, the method creating a new object holding the undamaged copy in the first storage pool, the new object linked to the damaged copy through the system-wide deduplication index.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Matthew J. Anglin
  • Publication number: 20130013569
    Abstract: A method enables cluster-level backup and restore functionality of all Virtual Input/Output Server (VIOS) configuration data within a VIOS cluster and the data of a shared VIOS cluster database. The method comprises: performing, via a backup/restore utility of a VIOS partition, a cluster level backup, which creates a first VIOS cluster configuration backup file having configuration information about hardware, logical and virtual devices of each VIOS partition within a VIOS cluster and all cluster data from the shared VIOS database of the VIOS cluster; storing the VIOS cluster configuration backup file within a storage location; and responsive to receipt of a VIOS restore command at a VIOS partition: retrieving the configuration backup file from the storage location; restoring a configuration of the hardware, logical and virtual devices of each VIOS within the VIOS cluster to prior state; and restoring the shared VIOS database with the backed-up cluster data.
    Type: Application
    Filed: September 15, 2012
    Publication date: January 10, 2013
    Applicant: IBM Corporation
    Inventors: James A. Pafumi, Chintamani P. Siddeshwar, Rupesh Kumar Thota, Vasu Vallabhaneni
  • Publication number: 20130013572
    Abstract: Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy.
    Type: Application
    Filed: September 13, 2012
    Publication date: January 10, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory John Tevis, David Gregory Van Hise
  • Publication number: 20130013562
    Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20130013564
    Abstract: A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases.
    Type: Application
    Filed: July 4, 2011
    Publication date: January 10, 2013
    Applicant: ZERTO LTD.
    Inventors: Tomer Ben-Or, Gil Barash, Chen Burshan, Yair Kuszpet
  • Publication number: 20130013565
    Abstract: Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventor: Dhairesh Oza
  • Publication number: 20130013570
    Abstract: An extraction unit extracts, in accordance with a format of a file which the client apparatus requests a file storage apparatus to store to storing means, data possibly made into independent data as an independent file from the file which is data in a portion that can be stored to the storing means. A duplicate determination unit determines whether the storing means stores data matching the data possibly made into independent data that is extracted by the extraction unit or remaining data which are data obtained by deleting the data possibly made into independent data from the file. A storing processing unit stores, to the storing means, the data possibly made into independent data or the remaining data which do not match data stored to the storing means, on the basis of the determination result made by the duplicate determination unit.
    Type: Application
    Filed: March 11, 2011
    Publication date: January 10, 2013
    Applicant: NEC CORPORATION
    Inventor: Satoshi Yamakawa
  • Publication number: 20130013566
    Abstract: A method for dynamically synchronizing storage groups in a data replication environment is disclosed. In one embodiment, such a method includes detecting the addition of a volume to a storage group of a primary storage system. The method then automatically performs the following in response to detecting the addition of the volume: (1) adds a corresponding volume to a corresponding storage group on a secondary storage system; (2) creates a mirroring relationship between the volume added to the primary storage system and the volume added to the secondary storage system; and (3) adds the mirroring relationship to a mirroring session established between the storage groups on the primary and secondary storage systems. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: July 8, 2011
    Publication date: January 10, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dash D. Miller, David C. Reed, Max D. Smith, Herbert Yee
  • Publication number: 20130006950
    Abstract: Method for attaching one or more tables online to a range partitioned table, includes: starting a child transaction; obtaining an exclusive lock on a source table; obtaining an intent exclusive lock on a target table; soft invalidating queries on the target table where compiled form of queries are cached for reuse; attaching the source table(s) to the target table as a new partition(s) of the target table; modifying indices and table structure of the target table to reflect the attaching of the new partition; committing the child transaction; and releasing the exclusive lock and the intent exclusive lock, where concurrently running queries over the target table continue to run without considering the partition until the intent exclusive lock and the exclusive lock are released. Queries on the target table only consider existing partitions when the attaching is in progress. The new partition is available once the attach operation is complete.
    Type: Application
    Filed: July 1, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lynette D. Adayilamuriyil, Naresh K. Chainani, Raghupathi K. Murthy, Sitaram Vemulapalli, Liping Zhang
  • Publication number: 20130006919
    Abstract: In various embodiments, a computerized method includes presenting an electronic document to one user out of multiple users that have edit access to the electronic document as part of a collaborative editing of the electronic document. The computerized method may include receiving an input from the user to edit the electronic document, as well as invoking a lock to prevent edit access by the other users responsive to receiving the input from the user to edit the electronic document.
    Type: Application
    Filed: September 12, 2012
    Publication date: January 3, 2013
    Applicant: Adobe Systems Incorporated
    Inventors: Robert Shaver, Paul Kleppner
  • Publication number: 20130006943
    Abstract: Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20130007073
    Abstract: A method of memory management can include creating an initial root set of pointers for a program during execution of the program and performing a marking process by iteratively marking referred objects of each pointer of the root set and expanding the root set with filtered, encoded pointers. The method also can include identifying each non-live object for any marked object as red-marked and performing, using a processor, a re-marking process on the root set in which red-marked objects are excluded. Each object of the root set not marked can be designated as including a memory leak.
    Type: Application
    Filed: June 29, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Pradeep VARMA
  • Publication number: 20130006932
    Abstract: An approach is provided in which a standby component receives a database log record that corresponds to a modification to one of a primary database's corresponding physical storage spaces. The standby component determines whether a modified object associated with the database log record corresponds to a standby database, which includes a replication of a subset of the primary database's corresponding physical storage spaces. When the standby component determines that the modified object corresponds to the standby database, the standby component invokes a physical replay that replicates the modification on the standby database.
    Type: Application
    Filed: July 1, 2011
    Publication date: January 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Prasadarao Akulavenkatavara, Gary Nanhao Jin, Steven Robert Pearson
  • Publication number: 20120330915
    Abstract: Methods and systems are provided for identifying data transactions satisfying a streaming query and providing data corresponding to those data transactions to subscribed client devices. One exemplary method involves receiving a subscription request for a streaming query from a client device, monitoring a database for indication of a data transaction corresponding to the streaming query, and in response to identifying the indication of the data transaction corresponding to the streaming query, obtaining data for an entry associated with the data transaction from the database and providing at least a portion of the obtained data to the client device.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 27, 2012
    Applicant: salesforce.com, inc.
    Inventor: Vinod Mehra
  • Publication number: 20120330902
    Abstract: According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query program instructions using correlated order invariant encrypting, the data and query program instructions operating in a customer computer system. The encrypted data and encrypted query program instructions are then transferred to a servicing entity having a test system. The encrypted data and encrypted query program instructions are run on the test system to generate a set of results. The set of results are then used to generate a diagnosis of a problem with the customer computer system. Thus the customer problem can be resolved without the servicing entity having access to the customer's data and query program instructions.
    Type: Application
    Filed: August 29, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Pramod S. Gupta
  • Publication number: 20120330916
    Abstract: A method and system for performing at least one transaction on at least one column of a table in a database system is disclosed. The method includes determining whether a first transaction of the at least one transaction fulfills all of at least one criteria. The method further includes ensuring that the at least one column is in a shared numeric lock if the first transaction fulfills all of the at least one criteria, wherein the shared numeric lock is a lock that allows at least a second transaction fulfilling all of the at least one criteria to access the same column concurrently with the first transaction without releasing the shared numeric lock between transactions, and wherein the shared numeric lock is released only after all of the transactions fulfilling all of the criteria have completed processing. The method further includes processing the first transaction.
    Type: Application
    Filed: August 31, 2012
    Publication date: December 27, 2012
    Applicant: SAP Global IP Group
    Inventor: Konduru Israel RAJAKUMAR
  • Publication number: 20120330905
    Abstract: The present invention relates to a method for producing and managing a large-volume long-term archive which comprises an archive data memory and a management file, and to a corresponding long-term archive. The method according to the invention involves relocating archive data in a container file so that the legal validity of the data is maintained by virtue of qualified signing.
    Type: Application
    Filed: March 10, 2011
    Publication date: December 27, 2012
    Inventors: Jerry Artishdad, Christian Hett
  • Publication number: 20120330912
    Abstract: A method for verifying a target attribute of a company profile record for a procurement application. It is ascertained that a database stores the company profile record including the target attribute and a validity attribute associated with the target attribute. The validity attribute has a VALID or INVALID value respectively indicating that the target attribute in the company profile record has a valid or invalid value within the database. It is insured that the database stores a first and second user profile record, that a first user of a requisition transaction corresponds to the first user profile record, that the first user profile record includes the target attribute having a value identical to a value of the target attribute of a first company profile record associated with a first company represented by the first user, and that the validity attribute of the first company profile record has the VALID value.
    Type: Application
    Filed: September 10, 2012
    Publication date: December 27, 2012
    Applicant: International Business Machines Corporation
    Inventors: Macam S. Dattathreya, William Philip Shaouy, Russell Thomas White, JR.
  • Publication number: 20120323871
    Abstract: A method and system for indexed field based difference detection and correction. A data feed file is partitioned into a plurality of subsets based on an indexed field of the data feed file. A redundancy check value is calculated for each of the subsets, and the redundancy check value is compared to a database file which corresponds to each subset. If the redundancy check values do not match for a subset and a corresponding database file, a difference is detected between the subset and the corresponding database file and the corresponding database file is replaced by the subset.
    Type: Application
    Filed: August 24, 2012
    Publication date: December 20, 2012
    Applicant: AT&T INTELLECTUAL PROPERTY II, L.P.
    Inventor: Arthur L. Zaifman
  • Publication number: 20120323873
    Abstract: A method for managing access to data in a database system includes receiving requests to update data stored in one or more fields of a record in a database table. The method further identifies lock information of the one or more fields from a look-up table associated with the record. The look-up table associated with the record includes lock information of each field of the record. The method then handles the requests based on the identified lock information of the one or more fields.
    Type: Application
    Filed: June 17, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harjindersingh G. Mistry, Mayank Prasad, Neeraj S. Sharma
  • Publication number: 20120323865
    Abstract: A system may configure a safety-tag that indicates whether a private data area is safe to preserve. During operation, the system receives a file with a private data area. Specifically, in one embodiment, the private data area is contained within an Exchangeable Image File (EXIF) MakerNote tag, which allows makers of EXIF writers to record any desired information. Next, the system determines whether the private data area is safe to preserve. If the private data area is safe to preserve, the system configures a safety-tag to indicate that the private data area is safe to preserve. Otherwise, if the private data area is not safe to preserve, the system configures the safety-tag to indicate that the private data is not safe to preserve. Specifically, in one embodiment, the safety-tag is a Digital Negative (DNG) MakerNoteSafety tag.
    Type: Application
    Filed: August 3, 2012
    Publication date: December 20, 2012
    Inventor: Thomas F. Knoll
  • Publication number: 20120323848
    Abstract: Embodiments of the invention relate to creating and maintaining consistent data sets in a shared pool of configurable computer resources to support disaster recovery support. Data from an application is stored in local data storage and replicated to another data storage. A consistency point of the data is created in both of the data storage, with the consistency point representing an identical data set at a point-in-time. Based upon the created consistency points, a consistent set of application data may be requested to support a read operation for a migrated application.
    Type: Application
    Filed: August 13, 2012
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dean Hildebrand, Aameek Singh, Renu Tewari
  • Publication number: 20120317085
    Abstract: Systems and methods are provided for cataloging content metadata from a variety of sources and providing metadata to client devices. A processing device receives inconsistent data records representative of a common content element, with different values for a metadata field descriptive of a common attribute of the content element. The processor assign confidence scores metadata fields from each data record, and use these confidence scores to select the metadata that is transmitted to the client device.
    Type: Application
    Filed: February 24, 2012
    Publication date: December 13, 2012
    Applicant: United Video Properties, Inc.
    Inventors: Benjamin Green, Alex Helsinger, Michael Papish
  • Publication number: 20120317079
    Abstract: The invention relates to methods for replicating a primary file system on a primary host to a secondary file system on a secondary host including determining a primary data block to replicate by reading a space map block entry (b, e) of the primary data block, wherein b represents the first snapshot and e the last snapshot to use the primary data block; computing a checksum of a primary data block and sending its number to the secondary host and determining a secondary data block that corresponds and computing its checksum then comparing the primary and secondary data block checksums and replicating the primary data block on the secondary file system when the primary and secondary checksums mismatch for the primary file system. In another aspect of the method if the primary and secondary checksums mismatch the method sends all data blocks from the primary file system allocated after a reliable snapshot on the secondary file system to the secondary host to be written on the secondary file system.
    Type: Application
    Filed: June 8, 2011
    Publication date: December 13, 2012
    Inventors: Kurt Alan Shoens, Rex Rilen Hamilton
  • Patent number: 8332354
    Abstract: Technologies are described herein for skipping snapshots during a snapshot replication process in order to maintain an established recovery point objective. A first snapshot is selected after a previously replicated snapshot. A creation time of the first snapshot is retrieved. A difference between a current time and the creation time of the first snapshot is computed. A determination is made as to whether the difference is less than a recovery point objective. If the difference is less than a recovery point objective, then the first snapshot is replicated in the snapshot replicated process. If the difference is not less than a recovery point objective, then the first snapshot is skipped through the snapshot replication process.
    Type: Grant
    Filed: December 15, 2009
    Date of Patent: December 11, 2012
    Assignee: American Megatrends, Inc.
    Inventors: Paresh Chatterjee, Raja Jayaraman, Loganathan Ranganathan, Jomy Maliakal
  • Publication number: 20120310887
    Abstract: A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.
    Type: Application
    Filed: June 6, 2011
    Publication date: December 6, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Viktoriya Taranov, Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Tarkan Sevilmis, Nikita Voronkov, Ramanathan Somasundaram, Artsiom Kokhan, Bhavesh Doshi
  • Publication number: 20120310894
    Abstract: Methods and apparatus to restore resources to a device according to an order of the resources requested by a user are described. The restoration may be interrupted in response to a user request to update an order to restore remaining resources yet to restore. The remaining resources may be restored according to the updated order.
    Type: Application
    Filed: September 6, 2011
    Publication date: December 6, 2012
    Applicant: Apple Inc.
    Inventors: Gordon J. Freedman, Kenneth B. McNeil, Sean B. Kelly
  • Publication number: 20120310998
    Abstract: A method for efficiently implementing a remembered set for a region-based garbage collector includes maintaining, for each region in an object heap, a remembered set card list (RSCL). Each card in the RSCL identifies an area in the object heap that includes at least one object that references an object in the region associated with the RSCL. The method further establishes a collection set identifying a subset of regions in the object heap on which to perform partial garbage collection. Prior to performing the partial garbage collection, the method flushes cards from RSCLs associated with the collection set to the card table, globally discards cards that are about to be rebuilt from all RSCLs, and globally cleans the card table. The method then adds cards to the RSCLs for inter-region references discovered while traversing live objects in the collection set. A corresponding computer program product and apparatus are also disclosed.
    Type: Application
    Filed: June 4, 2011
    Publication date: December 6, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter W. Burka, Jeffrey M. Disher, Daryl J. Maier, Aleksandar Micic, Ryan A. Sciampacone
  • Publication number: 20120310883
    Abstract: Exemplary method, system, and computer program product embodiments for protecting data segments by a processor device in a computing environment, are provided. In one embodiment, by way of example only, a history table is configured to accompany data segments for consultation during a replication operation. If the history table indicates an ownership conflict, the replication operation is inhibited.
    Type: Application
    Filed: June 2, 2011
    Publication date: December 6, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shay H. AKIRAV, Elena DROBCHENKO, Itay MAOZ, Gil E. PAZ, Vadim STOTLAND
  • Publication number: 20120310896
    Abstract: Methods and apparatus to identify at least a first portion and a second portion of resources to restore to a device are described. The first portion of the resources may be restored atomically to the device before the second portion of the resources. The device may not respond to at least one user input during the restoration of the first portion of the resources. If the restoring of the first portion is successful, the second portion of the resources may be restored. The device may respond to the user input during the restoring of the second portion of the resources.
    Type: Application
    Filed: September 7, 2011
    Publication date: December 6, 2012
    Applicant: APPLE INC.
    Inventors: Gordon J. Freedman, Kenneth B. McNeil, Edward T. Schmidt, Thomas Alsina
  • Publication number: 20120303581
    Abstract: Embodiments of the present invention relate to systems, methods, and computer storage media for replicating data in a distributed computing environment utilizing a combination of replication methodologies. A full-object replication may be utilized to replicate a full state of an object from a primary data store to a secondary data store. A checkpoint created after initiating the full-object replication may be parsed to identify changes to the object that have been entered since initiating the full-object replication. This replication process is referred to as a delta-checkpoint replication methodology. Additionally, in an embodiment, a log-based replication methodology may be utilized. The log-based replication may communicate data from a log of the primary data store to the secondary data store. It is also contemplated in an exemplary embodiment that when the log-based replication fails to maintain a throughput threshold, one of the other replication methodologies may be initiated, at least temporarily.
    Type: Application
    Filed: May 23, 2011
    Publication date: November 29, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Bradley Gene Calder, Niranjan Nilakantan, Shashwat Srivastav, Jiesheng Wu, Abdul Rafay Abbasi, Shane Mainali, Padmanabha Chakravarthy Uddaraju
  • Publication number: 20120303525
    Abstract: A computer and a computer-based method for verifying compliance of transaction data for a chargeback transaction with a set of regulations is provided. The method includes storing transaction data and a plurality of regulation sets wherein each regulation set is associated with a reason code and defines compliance of a chargeback transaction with the associated reason code, and receiving a chargeback message for the chargeback transaction wherein the chargeback message includes an assigned reason code for requesting the chargeback transaction and a transaction identifier for identifying transaction data associated with the chargeback transaction.
    Type: Application
    Filed: May 23, 2011
    Publication date: November 29, 2012
    Inventor: Sharath Sahadevan
  • Publication number: 20120303587
    Abstract: Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed towards protected data. The intercepted file output is analyzed to determine whether a predetermined type of version of the protected data has been created. In the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted file output includes a modification to the protected data, the protected data automatically backed up, including by storing at least a portion of the file output as a backup version of the protected data. In the event it is determined that the predetermined type of version of the protected data has not been created, the protected data is not backed up.
    Type: Application
    Filed: August 7, 2012
    Publication date: November 29, 2012
    Applicant: EMC CORPORATION
    Inventors: Ajay Pratap Singh Kushwah, Akhil Kaushik, Jian Xing, Mayank Joshi, Pashupati Kumar, Subramanian Periyagaram, Rangarajan Suryanarayanan, Yogita Bijani
  • Publication number: 20120303579
    Abstract: Systems, Methods, and Computer Program Products are provided for concurrent checkpointing and modifications in a transactional clustered file system (CFS). Shadow data segments, whose contents are identical to an original data segment currently being written by a checkpoint operation, for users that require access for modification to data segments concurrently being written within a checkpoint operation.
    Type: Application
    Filed: August 6, 2012
    Publication date: November 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lior ARONOVICH, Yair TOAFF, Gil PAZ, Ron ASHER
  • Publication number: 20120303589
    Abstract: A method for mobile terminal scene management and backup recovery is disclosed, including: setting different scenes, dividing terminal applications into general local settings, local applications and third party installation applications, presetting status saving formats of each application under different scenes to be used for recovering applications accordingly under the different scenes; the terminal storing the activation hierarchical relationship of the applications and the call relationship between the applications under the different scenes; when a scene is saved, saving global configuration, and each activated application recording the current usage status as a scene record according to the preset status saving format; when a scene is recovered, recovering the global configuration for the selected scene according to the saved global configuration, and then according to the activation hierarchical relationship and the call relationship between the applications under this scene, starting the application
    Type: Application
    Filed: April 21, 2010
    Publication date: November 29, 2012
    Applicant: ZTE CORPORATION
    Inventor: Jinchuan Sha
  • Publication number: 20120296877
    Abstract: Fine-grained detection of data modification of original data is provided by associating separate guard bits with granules of memory storing original data from which translated data has been obtained. The guard bits indicating whether the original data stored in the associated granule is protected for data coherency. The guard bits are set and cleared by special-purpose instructions. Responsive to attempting access to translated data obtained from the original data, the guard bit(s) associated with the original data is checked to determine whether the guard bit(s) fail to indicate coherency of the original data, and if so, discarding of the translated data is initiated to facilitate maintaining data coherency between the original data and the translated data.
    Type: Application
    Filed: May 17, 2011
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guy L. GUTHRIE, Geraint NORTH, William J. STARKE, Derek E. WILLIAMS
  • Publication number: 20120296864
    Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.
    Type: Application
    Filed: May 19, 2011
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
  • Patent number: 8315982
    Abstract: In a state where the migration source NAS apparatus is continuously operated, a migration processing program confirms the update date and time of files stored in the migration source NAS apparatus, and migrates only the files that were not updated from a specific time to the start date and time of migration processing. Or, the migration processing program migrates the files stored in the migration source NAS apparatus sequentially from the oldest file. The migration performance is calculated based on the capacity and migration time of the migrated files, and the time required for migrating the non-migrated files is calculated based on the size and migration performance of the non-migrated files.
    Type: Grant
    Filed: August 18, 2011
    Date of Patent: November 20, 2012
    Assignee: Hitachi, Ltd.
    Inventor: Atsushi Ueoka