Concurrency Control And Recovery (epo) Patents (Class 707/E17.007)
-
Publication number: 20130054531Abstract: A database management system (DBMS) maintains a clone database in a clone space without storing an entire copy of the database and without requiring a snapshot function from an underlying storage device. This DBMS may receive a database command to access a data block of the clone database, and may determine whether the data block is stored in the clone space. If the data block is not stored in the local clone space, the DBMS may receive the data block from a backup copy of the database. If the database command comprises a write operation, the DBMS may perform the write operation to update the data block, and may store the updated data block in the clone space. Also, if the database command comprises a read operation, the DBMS may perform the read operation on the data block received from the backup copy of the database.Type: ApplicationFiled: August 25, 2011Publication date: February 28, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Margaret Susairaj, Sumanta K. Chatterjee
-
Publication number: 20130054533Abstract: The subject disclosure is directed towards verifying a data recovery component of a volume snapshot service using a managed interface. The managed interface enables interoperability between the data recovery component and one or more complementary data recovery components by converting compatible instructions for the data recovery component and a complementary data recovery component into native data recovery operations for the volume snapshot service and vice versa. Via the managed interface, the complementary data recovery component emulates the native data recovery operations. Using status information associated with such an emulation, the data recovery component is verifiable.Type: ApplicationFiled: August 24, 2011Publication date: February 28, 2013Applicant: MICROSOFT CORPORATIONInventors: Howard Hao, James Robert Benton, Thothathri Vanamamalai
-
Publication number: 20130054539Abstract: A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, modifying records in the first set to make them consistent with the functional dependency to provide an output consistent database instance, determining a second set of records of the output consistent database instance comprising duplicate records, merging duplicate records in the second set in dependence on the functional dependencies of the records to provide a modified database instance.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Applicant: Qatar FoundationInventors: Ihab Francis Ilyas KALDAS, Mohamed YAKOUT, Ahmed K. ELMAGARMID
-
Publication number: 20130054536Abstract: A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available.Type: ApplicationFiled: November 18, 2011Publication date: February 28, 2013Applicant: ACCENTURE GLOBAL SERVICES LIMITEDInventors: Shubhashis Sengupta, Annervaz Karukapadath Mohamedrasheed
-
Publication number: 20130036104Abstract: Techniques for managing data objects of a data storage system are described herein. According to one embodiment, a hash function is generated for a plurality of data objects by analyzing each of the data objects stored in the data storage system. For each of the data objects, a hash operation is performed on the data object using the hash function, generating a hash value. The hash value is associated with a predetermined attribute of the data object, such that the predetermined attribute of the data object is uniquely identified using the hash function subsequently in response to a request for accessing the predetermined attribute of the data object. The data object is then stored at a persistent storage location of the data storage system, wherein the persistent storage location is identifiable based on a hash value obtained from the hash function.Type: ApplicationFiled: October 11, 2012Publication date: February 7, 2013Inventor: Windsor W. Hsu
-
Publication number: 20130036093Abstract: The invention concerns reliable writing of database log data, In particular, the invention concerns a computer system, methods and software to enable database log data to be written to recoverable storage in a reliable way. There is provided a computer system (100) for writing database log data to recoverable storage (60) comprising a durable database management system (DBMS) (40); and a hypervisor (80) or kernel 81 that enables communications between the recoverable storage device driver (52) and a recoverable storage device (60) to write the log data written to the non recoverable storage (92) and (42) to the recoverable storage device (60) asynchronously to the continued writing of log data to the non-recoverable storage (42) and (92). This allows the DBMS (40) to ensure recoverability and serializability and still allowing logs to be written asynchronously removing a performance bottleneck for the DBMS.Type: ApplicationFiled: December 17, 2010Publication date: February 7, 2013Applicant: National ICT Australia LimitedInventors: Gernot Heiser, Aleksander Budzynowsi
-
Publication number: 20130024645Abstract: Intercepting a requested memory operation corresponding to a conventional memory is disclosed. The requested memory operation is translated to be applied to a structured memory.Type: ApplicationFiled: May 20, 2010Publication date: January 24, 2013Applicant: HICAMP SYSTEMS, INC.Inventors: David R. Cheriton, Alexandre Y. Solomatnikov
-
Publication number: 20130024436Abstract: Systems and methods for providing more efficient handling of I/O requests for clustered file system data subject to data migration or the like. For instance, exemplary systems can more quickly determine if certain files on primary storage represent actual file data or stub data for recalling file data from secondary storage. Certain embodiments utilize a driver cache on each cluster node to maintain a record of recently accessed files that represent regular files (as opposed to stubs). A dual-locking process, using both strict locking and relaxed locking, maintains consistency between driver caches on different nodes and the data of the underlying clustered file system, while providing improved access to the data by the different nodes. Moreover, a signaling process can be used, such as with zero-length files, for alerting drivers on different nodes that data migration is to be performed and/or that the driver caches should be flushed.Type: ApplicationFiled: June 21, 2012Publication date: January 24, 2013Applicant: COMMVAULT SYSTEMS, INC.Inventor: Andrei Erofeev
-
Publication number: 20130024424Abstract: Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy.Type: ApplicationFiled: September 14, 2012Publication date: January 24, 2013Applicant: CommVault Systems, Inc.Inventors: Anand Prahlad, Marcus S. Muller, Rajiv Kottomtharayil, Srinivas Kavuri, Parag Gokhale, Manoj Vijayan
-
Publication number: 20130024427Abstract: A method and an apparatus for recovering a database backup is provided by the present invention, wherein the method comprises: backing up an old version database, wherein table structures of the old version database are stored; clearing records of all tables in a new version database, and acquiring table structures of the new version database; comparing the table structures of the old version database with the table structures of the new version database, and determining that the table structures changes; and recovering a backup of the old version database into the new version database according to a type of the change and a corresponding preset strategy. The forward compatibility of database backup recovery is achieved by the present invention.Type: ApplicationFiled: November 22, 2010Publication date: January 24, 2013Applicant: ZTE CORPORATIONInventor: Tao Long
-
Publication number: 20130018852Abstract: In one embodiment, a system includes a data storage device for storing one or more storage volumes, logic adapted for associating an indicator with a data set on the one or more storage volumes, wherein the indicator is in a first state indicating that the data set is accessible, logic adapted for storing the indicator associated with the data set in a data set descriptor record, wherein the record is stored in at least one mapping of the one or more storage volumes, logic adapted for receiving a request to delete the data set, logic adapted for changing the indicator to a second state indicating that the data set is inaccessible in response to the request to delete the data set, with the proviso that the data set is unchanged, logic adapted for receiving a request to restore the deleted data set, and logic adapted for restoring the indicator from the second state to the first state in response to the request to restore the deleted data set.Type: ApplicationFiled: July 15, 2011Publication date: January 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Leslie A. Barton, Gavin S. Johnson, Michael J. Koester, Carrie J. Van Noorden
-
Publication number: 20130018860Abstract: Various technologies and techniques are disclosed for supporting parallel nested transactions in a transactional memory system. Multiple closed nested transactions are created for a single parent transaction, and the closed nested transactions are executed concurrently as parallel nested transactions. Various techniques are used to ensure effects of the parallel nested transactions are hidden from other transactions outside the parent transaction until the parent transaction commits. For example, retry is allowed to work correctly with parallel nested transactions. When a transaction that is a parallel nested transaction or a child transaction of the parallel nested transaction executes a retry, a read set of the transaction is registered for the retry. When a decision is made to propagate the retry past a parallel nested transaction parent of the transaction, keeping the read set registered and making the read set part of a parent read set.Type: ApplicationFiled: September 18, 2012Publication date: January 17, 2013Applicant: MICROSOFT CORPORATIONInventor: Microsoft Corporation
-
Publication number: 20130013573Abstract: For recovery of data chunks from alternate data stores, a method detects a damaged copy of a first data chunk of a deduplicated data object within a first storage pool of plurality of storage pools storing data chunks. The method further locates an undamaged copy of the first data chunk in an alternate storage pool within the plurality of storage pools from a system-wide deduplication index that indexes each data chunk in each storage pool. In addition, the method creating a new object holding the undamaged copy in the first storage pool, the new object linked to the damaged copy through the system-wide deduplication index.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Matthew J. Anglin
-
Publication number: 20130013569Abstract: A method enables cluster-level backup and restore functionality of all Virtual Input/Output Server (VIOS) configuration data within a VIOS cluster and the data of a shared VIOS cluster database. The method comprises: performing, via a backup/restore utility of a VIOS partition, a cluster level backup, which creates a first VIOS cluster configuration backup file having configuration information about hardware, logical and virtual devices of each VIOS partition within a VIOS cluster and all cluster data from the shared VIOS database of the VIOS cluster; storing the VIOS cluster configuration backup file within a storage location; and responsive to receipt of a VIOS restore command at a VIOS partition: retrieving the configuration backup file from the storage location; restoring a configuration of the hardware, logical and virtual devices of each VIOS within the VIOS cluster to prior state; and restoring the shared VIOS database with the backed-up cluster data.Type: ApplicationFiled: September 15, 2012Publication date: January 10, 2013Applicant: IBM CorporationInventors: James A. Pafumi, Chintamani P. Siddeshwar, Rupesh Kumar Thota, Vasu Vallabhaneni
-
Publication number: 20130013572Abstract: Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy.Type: ApplicationFiled: September 13, 2012Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory John Tevis, David Gregory Van Hise
-
Publication number: 20130013562Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20130013564Abstract: A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases.Type: ApplicationFiled: July 4, 2011Publication date: January 10, 2013Applicant: ZERTO LTD.Inventors: Tomer Ben-Or, Gil Barash, Chen Burshan, Yair Kuszpet
-
Publication number: 20130013565Abstract: Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Inventor: Dhairesh Oza
-
Publication number: 20130013570Abstract: An extraction unit extracts, in accordance with a format of a file which the client apparatus requests a file storage apparatus to store to storing means, data possibly made into independent data as an independent file from the file which is data in a portion that can be stored to the storing means. A duplicate determination unit determines whether the storing means stores data matching the data possibly made into independent data that is extracted by the extraction unit or remaining data which are data obtained by deleting the data possibly made into independent data from the file. A storing processing unit stores, to the storing means, the data possibly made into independent data or the remaining data which do not match data stored to the storing means, on the basis of the determination result made by the duplicate determination unit.Type: ApplicationFiled: March 11, 2011Publication date: January 10, 2013Applicant: NEC CORPORATIONInventor: Satoshi Yamakawa
-
Publication number: 20130013566Abstract: A method for dynamically synchronizing storage groups in a data replication environment is disclosed. In one embodiment, such a method includes detecting the addition of a volume to a storage group of a primary storage system. The method then automatically performs the following in response to detecting the addition of the volume: (1) adds a corresponding volume to a corresponding storage group on a secondary storage system; (2) creates a mirroring relationship between the volume added to the primary storage system and the volume added to the secondary storage system; and (3) adds the mirroring relationship to a mirroring session established between the storage groups on the primary and secondary storage systems. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: July 8, 2011Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dash D. Miller, David C. Reed, Max D. Smith, Herbert Yee
-
Publication number: 20130006950Abstract: Method for attaching one or more tables online to a range partitioned table, includes: starting a child transaction; obtaining an exclusive lock on a source table; obtaining an intent exclusive lock on a target table; soft invalidating queries on the target table where compiled form of queries are cached for reuse; attaching the source table(s) to the target table as a new partition(s) of the target table; modifying indices and table structure of the target table to reflect the attaching of the new partition; committing the child transaction; and releasing the exclusive lock and the intent exclusive lock, where concurrently running queries over the target table continue to run without considering the partition until the intent exclusive lock and the exclusive lock are released. Queries on the target table only consider existing partitions when the attaching is in progress. The new partition is available once the attach operation is complete.Type: ApplicationFiled: July 1, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lynette D. Adayilamuriyil, Naresh K. Chainani, Raghupathi K. Murthy, Sitaram Vemulapalli, Liping Zhang
-
Publication number: 20130006919Abstract: In various embodiments, a computerized method includes presenting an electronic document to one user out of multiple users that have edit access to the electronic document as part of a collaborative editing of the electronic document. The computerized method may include receiving an input from the user to edit the electronic document, as well as invoking a lock to prevent edit access by the other users responsive to receiving the input from the user to edit the electronic document.Type: ApplicationFiled: September 12, 2012Publication date: January 3, 2013Applicant: Adobe Systems IncorporatedInventors: Robert Shaver, Paul Kleppner
-
Publication number: 20130006943Abstract: Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”.Type: ApplicationFiled: June 30, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
-
Publication number: 20130007073Abstract: A method of memory management can include creating an initial root set of pointers for a program during execution of the program and performing a marking process by iteratively marking referred objects of each pointer of the root set and expanding the root set with filtered, encoded pointers. The method also can include identifying each non-live object for any marked object as red-marked and performing, using a processor, a re-marking process on the root set in which red-marked objects are excluded. Each object of the root set not marked can be designated as including a memory leak.Type: ApplicationFiled: June 29, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Pradeep VARMA
-
Publication number: 20130006932Abstract: An approach is provided in which a standby component receives a database log record that corresponds to a modification to one of a primary database's corresponding physical storage spaces. The standby component determines whether a modified object associated with the database log record corresponds to a standby database, which includes a replication of a subset of the primary database's corresponding physical storage spaces. When the standby component determines that the modified object corresponds to the standby database, the standby component invokes a physical replay that replicates the modification on the standby database.Type: ApplicationFiled: July 1, 2011Publication date: January 3, 2013Applicant: International Business Machines CorporationInventors: Prasadarao Akulavenkatavara, Gary Nanhao Jin, Steven Robert Pearson
-
Publication number: 20120330915Abstract: Methods and systems are provided for identifying data transactions satisfying a streaming query and providing data corresponding to those data transactions to subscribed client devices. One exemplary method involves receiving a subscription request for a streaming query from a client device, monitoring a database for indication of a data transaction corresponding to the streaming query, and in response to identifying the indication of the data transaction corresponding to the streaming query, obtaining data for an entry associated with the data transaction from the database and providing at least a portion of the obtained data to the client device.Type: ApplicationFiled: June 21, 2012Publication date: December 27, 2012Applicant: salesforce.com, inc.Inventor: Vinod Mehra
-
Publication number: 20120330902Abstract: According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query program instructions using correlated order invariant encrypting, the data and query program instructions operating in a customer computer system. The encrypted data and encrypted query program instructions are then transferred to a servicing entity having a test system. The encrypted data and encrypted query program instructions are run on the test system to generate a set of results. The set of results are then used to generate a diagnosis of a problem with the customer computer system. Thus the customer problem can be resolved without the servicing entity having access to the customer's data and query program instructions.Type: ApplicationFiled: August 29, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Pramod S. Gupta
-
Publication number: 20120330916Abstract: A method and system for performing at least one transaction on at least one column of a table in a database system is disclosed. The method includes determining whether a first transaction of the at least one transaction fulfills all of at least one criteria. The method further includes ensuring that the at least one column is in a shared numeric lock if the first transaction fulfills all of the at least one criteria, wherein the shared numeric lock is a lock that allows at least a second transaction fulfilling all of the at least one criteria to access the same column concurrently with the first transaction without releasing the shared numeric lock between transactions, and wherein the shared numeric lock is released only after all of the transactions fulfilling all of the criteria have completed processing. The method further includes processing the first transaction.Type: ApplicationFiled: August 31, 2012Publication date: December 27, 2012Applicant: SAP Global IP GroupInventor: Konduru Israel RAJAKUMAR
-
Publication number: 20120330905Abstract: The present invention relates to a method for producing and managing a large-volume long-term archive which comprises an archive data memory and a management file, and to a corresponding long-term archive. The method according to the invention involves relocating archive data in a container file so that the legal validity of the data is maintained by virtue of qualified signing.Type: ApplicationFiled: March 10, 2011Publication date: December 27, 2012Inventors: Jerry Artishdad, Christian Hett
-
Publication number: 20120330912Abstract: A method for verifying a target attribute of a company profile record for a procurement application. It is ascertained that a database stores the company profile record including the target attribute and a validity attribute associated with the target attribute. The validity attribute has a VALID or INVALID value respectively indicating that the target attribute in the company profile record has a valid or invalid value within the database. It is insured that the database stores a first and second user profile record, that a first user of a requisition transaction corresponds to the first user profile record, that the first user profile record includes the target attribute having a value identical to a value of the target attribute of a first company profile record associated with a first company represented by the first user, and that the validity attribute of the first company profile record has the VALID value.Type: ApplicationFiled: September 10, 2012Publication date: December 27, 2012Applicant: International Business Machines CorporationInventors: Macam S. Dattathreya, William Philip Shaouy, Russell Thomas White, JR.
-
Publication number: 20120323871Abstract: A method and system for indexed field based difference detection and correction. A data feed file is partitioned into a plurality of subsets based on an indexed field of the data feed file. A redundancy check value is calculated for each of the subsets, and the redundancy check value is compared to a database file which corresponds to each subset. If the redundancy check values do not match for a subset and a corresponding database file, a difference is detected between the subset and the corresponding database file and the corresponding database file is replaced by the subset.Type: ApplicationFiled: August 24, 2012Publication date: December 20, 2012Applicant: AT&T INTELLECTUAL PROPERTY II, L.P.Inventor: Arthur L. Zaifman
-
Publication number: 20120323873Abstract: A method for managing access to data in a database system includes receiving requests to update data stored in one or more fields of a record in a database table. The method further identifies lock information of the one or more fields from a look-up table associated with the record. The look-up table associated with the record includes lock information of each field of the record. The method then handles the requests based on the identified lock information of the one or more fields.Type: ApplicationFiled: June 17, 2011Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Harjindersingh G. Mistry, Mayank Prasad, Neeraj S. Sharma
-
Publication number: 20120323865Abstract: A system may configure a safety-tag that indicates whether a private data area is safe to preserve. During operation, the system receives a file with a private data area. Specifically, in one embodiment, the private data area is contained within an Exchangeable Image File (EXIF) MakerNote tag, which allows makers of EXIF writers to record any desired information. Next, the system determines whether the private data area is safe to preserve. If the private data area is safe to preserve, the system configures a safety-tag to indicate that the private data area is safe to preserve. Otherwise, if the private data area is not safe to preserve, the system configures the safety-tag to indicate that the private data is not safe to preserve. Specifically, in one embodiment, the safety-tag is a Digital Negative (DNG) MakerNoteSafety tag.Type: ApplicationFiled: August 3, 2012Publication date: December 20, 2012Inventor: Thomas F. Knoll
-
Publication number: 20120323848Abstract: Embodiments of the invention relate to creating and maintaining consistent data sets in a shared pool of configurable computer resources to support disaster recovery support. Data from an application is stored in local data storage and replicated to another data storage. A consistency point of the data is created in both of the data storage, with the consistency point representing an identical data set at a point-in-time. Based upon the created consistency points, a consistent set of application data may be requested to support a read operation for a migrated application.Type: ApplicationFiled: August 13, 2012Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dean Hildebrand, Aameek Singh, Renu Tewari
-
Publication number: 20120317085Abstract: Systems and methods are provided for cataloging content metadata from a variety of sources and providing metadata to client devices. A processing device receives inconsistent data records representative of a common content element, with different values for a metadata field descriptive of a common attribute of the content element. The processor assign confidence scores metadata fields from each data record, and use these confidence scores to select the metadata that is transmitted to the client device.Type: ApplicationFiled: February 24, 2012Publication date: December 13, 2012Applicant: United Video Properties, Inc.Inventors: Benjamin Green, Alex Helsinger, Michael Papish
-
Publication number: 20120317079Abstract: The invention relates to methods for replicating a primary file system on a primary host to a secondary file system on a secondary host including determining a primary data block to replicate by reading a space map block entry (b, e) of the primary data block, wherein b represents the first snapshot and e the last snapshot to use the primary data block; computing a checksum of a primary data block and sending its number to the secondary host and determining a secondary data block that corresponds and computing its checksum then comparing the primary and secondary data block checksums and replicating the primary data block on the secondary file system when the primary and secondary checksums mismatch for the primary file system. In another aspect of the method if the primary and secondary checksums mismatch the method sends all data blocks from the primary file system allocated after a reliable snapshot on the secondary file system to the secondary host to be written on the secondary file system.Type: ApplicationFiled: June 8, 2011Publication date: December 13, 2012Inventors: Kurt Alan Shoens, Rex Rilen Hamilton
-
Patent number: 8332354Abstract: Technologies are described herein for skipping snapshots during a snapshot replication process in order to maintain an established recovery point objective. A first snapshot is selected after a previously replicated snapshot. A creation time of the first snapshot is retrieved. A difference between a current time and the creation time of the first snapshot is computed. A determination is made as to whether the difference is less than a recovery point objective. If the difference is less than a recovery point objective, then the first snapshot is replicated in the snapshot replicated process. If the difference is not less than a recovery point objective, then the first snapshot is skipped through the snapshot replication process.Type: GrantFiled: December 15, 2009Date of Patent: December 11, 2012Assignee: American Megatrends, Inc.Inventors: Paresh Chatterjee, Raja Jayaraman, Loganathan Ranganathan, Jomy Maliakal
-
Publication number: 20120310887Abstract: A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.Type: ApplicationFiled: June 6, 2011Publication date: December 6, 2012Applicant: MICROSOFT CORPORATIONInventors: Viktoriya Taranov, Daniel Blood, Alexander Hopmann, Siddharth Rajendra Shah, Tarkan Sevilmis, Nikita Voronkov, Ramanathan Somasundaram, Artsiom Kokhan, Bhavesh Doshi
-
Publication number: 20120310894Abstract: Methods and apparatus to restore resources to a device according to an order of the resources requested by a user are described. The restoration may be interrupted in response to a user request to update an order to restore remaining resources yet to restore. The remaining resources may be restored according to the updated order.Type: ApplicationFiled: September 6, 2011Publication date: December 6, 2012Applicant: Apple Inc.Inventors: Gordon J. Freedman, Kenneth B. McNeil, Sean B. Kelly
-
Publication number: 20120310998Abstract: A method for efficiently implementing a remembered set for a region-based garbage collector includes maintaining, for each region in an object heap, a remembered set card list (RSCL). Each card in the RSCL identifies an area in the object heap that includes at least one object that references an object in the region associated with the RSCL. The method further establishes a collection set identifying a subset of regions in the object heap on which to perform partial garbage collection. Prior to performing the partial garbage collection, the method flushes cards from RSCLs associated with the collection set to the card table, globally discards cards that are about to be rebuilt from all RSCLs, and globally cleans the card table. The method then adds cards to the RSCLs for inter-region references discovered while traversing live objects in the collection set. A corresponding computer program product and apparatus are also disclosed.Type: ApplicationFiled: June 4, 2011Publication date: December 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter W. Burka, Jeffrey M. Disher, Daryl J. Maier, Aleksandar Micic, Ryan A. Sciampacone
-
Publication number: 20120310883Abstract: Exemplary method, system, and computer program product embodiments for protecting data segments by a processor device in a computing environment, are provided. In one embodiment, by way of example only, a history table is configured to accompany data segments for consultation during a replication operation. If the history table indicates an ownership conflict, the replication operation is inhibited.Type: ApplicationFiled: June 2, 2011Publication date: December 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shay H. AKIRAV, Elena DROBCHENKO, Itay MAOZ, Gil E. PAZ, Vadim STOTLAND
-
Publication number: 20120310896Abstract: Methods and apparatus to identify at least a first portion and a second portion of resources to restore to a device are described. The first portion of the resources may be restored atomically to the device before the second portion of the resources. The device may not respond to at least one user input during the restoration of the first portion of the resources. If the restoring of the first portion is successful, the second portion of the resources may be restored. The device may respond to the user input during the restoring of the second portion of the resources.Type: ApplicationFiled: September 7, 2011Publication date: December 6, 2012Applicant: APPLE INC.Inventors: Gordon J. Freedman, Kenneth B. McNeil, Edward T. Schmidt, Thomas Alsina
-
Publication number: 20120303581Abstract: Embodiments of the present invention relate to systems, methods, and computer storage media for replicating data in a distributed computing environment utilizing a combination of replication methodologies. A full-object replication may be utilized to replicate a full state of an object from a primary data store to a secondary data store. A checkpoint created after initiating the full-object replication may be parsed to identify changes to the object that have been entered since initiating the full-object replication. This replication process is referred to as a delta-checkpoint replication methodology. Additionally, in an embodiment, a log-based replication methodology may be utilized. The log-based replication may communicate data from a log of the primary data store to the secondary data store. It is also contemplated in an exemplary embodiment that when the log-based replication fails to maintain a throughput threshold, one of the other replication methodologies may be initiated, at least temporarily.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: MICROSOFT CORPORATIONInventors: Bradley Gene Calder, Niranjan Nilakantan, Shashwat Srivastav, Jiesheng Wu, Abdul Rafay Abbasi, Shane Mainali, Padmanabha Chakravarthy Uddaraju
-
Publication number: 20120303525Abstract: A computer and a computer-based method for verifying compliance of transaction data for a chargeback transaction with a set of regulations is provided. The method includes storing transaction data and a plurality of regulation sets wherein each regulation set is associated with a reason code and defines compliance of a chargeback transaction with the associated reason code, and receiving a chargeback message for the chargeback transaction wherein the chargeback message includes an assigned reason code for requesting the chargeback transaction and a transaction identifier for identifying transaction data associated with the chargeback transaction.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Inventor: Sharath Sahadevan
-
Publication number: 20120303587Abstract: Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed towards protected data. The intercepted file output is analyzed to determine whether a predetermined type of version of the protected data has been created. In the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted file output includes a modification to the protected data, the protected data automatically backed up, including by storing at least a portion of the file output as a backup version of the protected data. In the event it is determined that the predetermined type of version of the protected data has not been created, the protected data is not backed up.Type: ApplicationFiled: August 7, 2012Publication date: November 29, 2012Applicant: EMC CORPORATIONInventors: Ajay Pratap Singh Kushwah, Akhil Kaushik, Jian Xing, Mayank Joshi, Pashupati Kumar, Subramanian Periyagaram, Rangarajan Suryanarayanan, Yogita Bijani
-
Publication number: 20120303579Abstract: Systems, Methods, and Computer Program Products are provided for concurrent checkpointing and modifications in a transactional clustered file system (CFS). Shadow data segments, whose contents are identical to an original data segment currently being written by a checkpoint operation, for users that require access for modification to data segments concurrently being written within a checkpoint operation.Type: ApplicationFiled: August 6, 2012Publication date: November 29, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lior ARONOVICH, Yair TOAFF, Gil PAZ, Ron ASHER
-
Publication number: 20120303589Abstract: A method for mobile terminal scene management and backup recovery is disclosed, including: setting different scenes, dividing terminal applications into general local settings, local applications and third party installation applications, presetting status saving formats of each application under different scenes to be used for recovering applications accordingly under the different scenes; the terminal storing the activation hierarchical relationship of the applications and the call relationship between the applications under the different scenes; when a scene is saved, saving global configuration, and each activated application recording the current usage status as a scene record according to the preset status saving format; when a scene is recovered, recovering the global configuration for the selected scene according to the saved global configuration, and then according to the activation hierarchical relationship and the call relationship between the applications under this scene, starting the applicationType: ApplicationFiled: April 21, 2010Publication date: November 29, 2012Applicant: ZTE CORPORATIONInventor: Jinchuan Sha
-
Publication number: 20120296877Abstract: Fine-grained detection of data modification of original data is provided by associating separate guard bits with granules of memory storing original data from which translated data has been obtained. The guard bits indicating whether the original data stored in the associated granule is protected for data coherency. The guard bits are set and cleared by special-purpose instructions. Responsive to attempting access to translated data obtained from the original data, the guard bit(s) associated with the original data is checked to determine whether the guard bit(s) fail to indicate coherency of the original data, and if so, discarding of the translated data is initiated to facilitate maintaining data coherency between the original data and the translated data.Type: ApplicationFiled: May 17, 2011Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guy L. GUTHRIE, Geraint NORTH, William J. STARKE, Derek E. WILLIAMS
-
Publication number: 20120296864Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.Type: ApplicationFiled: May 19, 2011Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
-
Patent number: 8315982Abstract: In a state where the migration source NAS apparatus is continuously operated, a migration processing program confirms the update date and time of files stored in the migration source NAS apparatus, and migrates only the files that were not updated from a specific time to the start date and time of migration processing. Or, the migration processing program migrates the files stored in the migration source NAS apparatus sequentially from the oldest file. The migration performance is calculated based on the capacity and migration time of the migrated files, and the time required for migrating the non-migrated files is calculated based on the size and migration performance of the non-migrated files.Type: GrantFiled: August 18, 2011Date of Patent: November 20, 2012Assignee: Hitachi, Ltd.Inventor: Atsushi Ueoka