Concurrency Control And Recovery (epo) Patents (Class 707/E17.007)
  • Publication number: 20120130945
    Abstract: Techniques to cross-synchronize data are described. An apparatus may comprise a cross-synchronization component to synchronize multiple data items for different application programs between multiple client devices synchronized using multiple synchronization circuits. The cross-synchronization component may determine whether changes to the multiple data items made at a first client device are propagated to a second client device using consistency information maintained by a consistency group item for a consistency group including the data items. Other embodiments are described and claimed.
    Type: Application
    Filed: January 31, 2012
    Publication date: May 24, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Ricard Roma i Dalfó, Rolando Jimenez Salgado, Satish Thatte, Anton Kirillov, Maarten Mullender
  • Publication number: 20120130951
    Abstract: The present invention is directed to non-programmatic access to enterprise messaging administration. A method of operating a data processing system, wherein the data processing system includes a file system, a messaging system and a monitoring component, in accordance with an embodiment includes: monitoring the file system, detecting a change in the file system, and amending a structure of the messaging system, according to the detected change in the file system.
    Type: Application
    Filed: February 1, 2012
    Publication date: May 24, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: GARETH E. JONES, SAKET RUNGTA
  • Publication number: 20120130960
    Abstract: An apparatus (10) comprises a mobile device (1) that communicates with a web server (2) over a mobile network (3). The capabilities of the mobile device (1) can be described by device attributes in a device database. An aggregation engine (5) is provided to compile an aggregated device database from a number of source device databases. Both the source device databases and the aggregated database are stored in a device attribute store (4). When a user of the mobile device (1) attempts to access a web resource hosted on the web server (2), the web server (2) looks up the values of device attributes in the aggregated device database before returning data to the mobile device (1) that is appropriate for its capabilities. The aggregated database includes information regarding the value of each device attribute and also information regarding the probability that this value is correct.
    Type: Application
    Filed: February 18, 2010
    Publication date: May 24, 2012
    Inventor: Paul Shelton Nerger
  • Publication number: 20120130957
    Abstract: Methods and arrangements for prioritizing customer service restoration, in the event of service failure or compromise such that any adverse effect of the service disruption on the customer is minimized, the perceived drop in quality of service, if any, is minimized and timely and efficient resource reallocation for service restoration is achieved. Input data relating to customer service protocols is assimilated. A service restoration order is implemented responsive to a service disruption and based on the assimilated input data. This implementing includes determining bufferable and non-bufferable services, postponing restoration of the bufferable services, and determining an order of priority of the non-bufferable services.
    Type: Application
    Filed: November 23, 2010
    Publication date: May 24, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Om Dadaji Deshmukh, Sameep Mehta, Vinayaka D. Pandit
  • Publication number: 20120131069
    Abstract: A method for consolidating objects to a grid of a virtual machine may include allocating, by a virtual machine operating on a processing device, each new object into an allocate space of a new memory area for newly created objects in a virtual machine memory of the virtual machine. The new memory area may include the allocate space and a survivor space. The method may also include performing a garbage collection process in response to the allocate space becoming substantially full of objects and copying at least some objects in the allocate space into either the survivor space or a tenured space in the virtual machine memory in response to the garbage collection process. The method may also include transferring a selected object from the tenured space to the grid of the virtual machine in response to a predetermined criterion.
    Type: Application
    Filed: November 18, 2010
    Publication date: May 24, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Snehal S. Antani, Kulvir S. Bhogal, Nitin Gaur
  • Publication number: 20120130953
    Abstract: A communication device includes a database. The database is configured to store data records to be synchronized with a host device and to store, for each record, a corresponding device synchronization parameter (DSP) and a corresponding host synchronization parameter (HSP). The DSP indicates a version number assigned to a current version, of the respective data record, as stored in the database of the device. The HSP indicates a version number assigned to a current version, of the same record, as stored in the host device.
    Type: Application
    Filed: January 30, 2012
    Publication date: May 24, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Hugh Hind, Craig A. Dunk
  • Publication number: 20120124002
    Abstract: Techniques are disclosed for backing up and/or restoring data. In one embodiment, a request is received to back up at least a first unit of data stored in a database. Upon determining that the first unit of data is at least partially derived from a second unit of data stored in the database, a backup may be generated that includes less than all of the first unit of data. Subsequently, the first unit of data may be fully restored from the backup.
    Type: Application
    Filed: November 17, 2010
    Publication date: May 17, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric L. Barsness, David L. Darrington, John M. Santosuosso
  • Publication number: 20120124106
    Abstract: Provided are techniques for a garbage-collected interned string table. Reference objects that each reference strings in the interned string table are created. The reference objects and the strings referenced by the reference objects in the interned string table are marked with a current generation. Garbage collection is performed by: advancing the current generation to a next generation; in response to the reference objects in a previous generation from the current generation advancing to an acquired references state, promoting the reference objects and the strings referenced by the reference objects in the previous generation to the current generation; and deleting the strings that are marked with the previous generation in the interned string table.
    Type: Application
    Filed: November 12, 2010
    Publication date: May 17, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joseph H. Allen, Moshe M. E. Matsa, Eric D. Perkins
  • Publication number: 20120124006
    Abstract: A method for transmitting records of changes to data from a production location to a storage location is provided. The method stores in a log, records of changes to data stored at a production location. Those records are transmitted and a transmitted records checkpoint is generated that is transmitted at the end of the transmitted records. A records checkpoint confirmation is received and the plurality of transmitted records are purged from the log.
    Type: Application
    Filed: January 23, 2012
    Publication date: May 17, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Giedrius Zizys, Kestutis Patiejunas
  • Publication number: 20120124021
    Abstract: Managing a log-full condition of a transaction log in a transaction processing system, where the transaction log has a plurality of log records each associated with a particular transaction. When a log-full condition is detected, the active transaction having the oldest log entry of all active transactions is identified and logging for all transactions except for the identified transaction is temporarily suspended. A dynamic transaction backout of the identified transaction is initiated, with the writing of a backout record for the identified transaction to the log being delayed. Confirmation that the backout has completed is awaited before trimming the log. Then the delayed backout record for the identified transaction is written to the log, and normal logging is resumed.
    Type: Application
    Filed: January 22, 2012
    Publication date: May 17, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ian James Mitchell, Andrew Wright
  • Publication number: 20120117035
    Abstract: A file system that includes multiple logical devices can be subdivided into multiple containers. The containers each include respective non-overlapping sets of the logical devices. An amount of memory allocated to a container is dynamic. A set of the containers can be selected for a file system consistency check. The file system consistency check is performed on only the set of the containers instead of on the entire file system.
    Type: Application
    Filed: November 9, 2010
    Publication date: May 10, 2012
    Applicant: SYMANTEC CORPORATION
    Inventors: Dilip Madhusudan Ranade, Kedar Shrikrishna Patwardhan
  • Publication number: 20120117025
    Abstract: A file system watcher in the presence of different file systems to allow synchronization of replicated files distributed among different file systems without compromising the features of each file system is described. To synchronize the distributed replications, a platform independent synchronization manager creates a file system watcher for each file system associated with a replication of the file. The file system watcher monitors each object for events affecting the object or the object's constituent files, such as creation, deletion, change and rename. Notifications are sent to the synchronization manager, which consolidates the modifications and updates a locally stored replication, if necessary. The synchronization manager then sends a notification of an update to other synchronization managers for replications of the distributed file or folder.
    Type: Application
    Filed: December 2, 2011
    Publication date: May 10, 2012
    Applicant: Microsoft Corporation
    Inventors: Akash Sagar, Richard Chung, Jim Murphy
  • Publication number: 20120117033
    Abstract: Some embodiments provide methods and apparatuses for performing a near-instantaneous restore of a database. During operation, the system intercepts a database management system restore request to restore a database from a backup file to a data file, wherein the backup file comprises a first number (e.g., N1) of data pages. Next, in response to intercepting the database management system restore request, the system sends information to the database management system indicating that the backup file comprises a second number (e.g., N2) of data pages, wherein the second number of data pages is less than the first number of data pages (e.g., N2<N1). Once the database management system has copied the fewer number of data pages from the backup file to the data file, the database management system may indicate that the restore is complete, and continue processing database requests as if the database management system was back online.
    Type: Application
    Filed: December 21, 2010
    Publication date: May 10, 2012
    Applicant: BBS TECHNOLOGIES, INC.
    Inventors: Chandrashekhar Madhukar Vaidya, Russel Bruce McDonald, Brett Derek Hawton
  • Publication number: 20120117027
    Abstract: Embodiments of the present invention provide a hardware accelerator that assists a host database system in processing its queries. The hardware accelerator comprises special purpose processing elements that are capable of receiving database query/operation tasks in the form of machine code database instructions, execute them in hardware without software, and return the query/operation result back to the host system.
    Type: Application
    Filed: June 29, 2011
    Publication date: May 10, 2012
    Applicant: TERADATA US, INC.
    Inventors: James Shau, Jeremy L. Branscome, Krishnan Meiyappan, Hung Viet Tran, Alan Lee Beck, Robert Hou, Michael Paul Corwin, Joseph Irawan Chamdani
  • Publication number: 20120117034
    Abstract: Disclosed herein is a context-aware apparatus and method. The context-aware apparatus includes a microblog monitoring unit, a web information collection unit, a microblog information collection unit, and a context-aware information creation unit. The microblog monitoring unit monitors the written information of one or more microblogs, and extracts at least one keyword corresponding to a set topic from the written information. The web information collection unit collects web information corresponding to the keyword from webpages. The microblog information collection unit collects microblog information corresponding to the written information including the keyword from the microblogs. The context-aware information creation unit creates context-aware information using the web information and the microblog information.
    Type: Application
    Filed: November 4, 2011
    Publication date: May 10, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Chi-Yoon JEONG, Beom-Hwan Chang
  • Publication number: 20120117032
    Abstract: An information processing device including: a storage device in which a plurality of files are stored in a file group in which a plurality of files are associated with one another and in a file group format in which the association is regulated, and which is able to delete a stored file; and a control unit that is able to restore a file that is deleted from files that are stored in the storage device, wherein in a case when a file that is stored in the storage device is deleted, the control unit restores a deleted file and restores the restored file to a file structure according to a file group format by arranging a file that matches a file group format in a structure of a file group format based on a restored file.
    Type: Application
    Filed: November 1, 2011
    Publication date: May 10, 2012
    Applicant: SONY CORPORATION
    Inventor: Tomonori Masumura
  • Publication number: 20120117031
    Abstract: Disclosed are an apparatus, a system, and a method for recovering meta data using fragmentary information. The system for recovering meta data includes: a data server storing recovery information for recovering at least one data file and meta data related to each of the data file; and a meta data server storing the meta data related to the data files and receiving the recovery information from the data server when the meta data are lost to recover the lost meta data. By this configuration, the exemplary embodiment of the present invention stably can the lost meta data of the meta data server by using the recovery the meta data and prevent the phenomenon that the meta data collides with each other on the same directory hierarchical structure.
    Type: Application
    Filed: July 27, 2011
    Publication date: May 10, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Myung Hoon CHA, Hong Yeon KIM, Young Kyun KIM, Han NAMGOONG
  • Publication number: 20120109897
    Abstract: Embodiments of the present invention are directed to a method and system for optimizing mirror creation. The method includes receiving, within an electronic system, a request for creating a mirror of a portion of a volume and accessing a data structure comprising information about a plurality of regions of the volume. The method further includes determining a plurality of regions comprising non-zeros of the volume based on the data structure and copying only the plurality of regions comprising non-zeros to create the mirror.
    Type: Application
    Filed: October 27, 2010
    Publication date: May 3, 2012
    Applicant: SYMANTEC CORPORATION
    Inventors: Viswesvaran Janakiraman, Chris Chih-Chen Lin, Mohankumar R. Tiruvayapadi
  • Publication number: 20120109895
    Abstract: The subject disclosure relates to a database recovery technique that implements various aspects of transaction logging to optimize database recovery performance. Transactions are logged logically with no reference to physical location, which enables logging to be performed via multiple independent log streams in parallel. A set of log streams can further be adjusted to conform to a local configuration of a mirror or secondary node in order to increase mirroring flexibility. Additionally, individual transactions or groups of transactions are recorded using a single log record, which contains timestamp information to enable database recovery without reference to physical checkpoint files. Further, techniques are provided herein for processing transactions without Write Ahead Logging or hardening of undo information.
    Type: Application
    Filed: October 28, 2010
    Publication date: May 3, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Mike Zwilling, Per-Ake Larson, Cristian Diaconu
  • Publication number: 20120109891
    Abstract: A data synchronization system includes a receiver and a transmitter. The receiver includes a remote storage circuit, first remote controller, and second remote controller. The transmitter includes a local storage circuit and a local controller. In response to local volume information corresponding to the local storage circuit, the controller establishes a main communication link and a redundant communication link respectively connected to the first remote and the second remote controllers. When the first remote controller operates normally, the data synchronization takes place between the receiver and the transmitter via the main communication link. When the first remote controller operates abnormally, the second remote controller takes the operation of the first remote controller for controlling the receiver, so that the data synchronization takes place between the receiver and the transmitter via the redundant communication link.
    Type: Application
    Filed: July 12, 2011
    Publication date: May 3, 2012
    Applicant: QSAN Technology, Inc.
    Inventor: Chung-Cheng CHENG
  • Publication number: 20120109914
    Abstract: Illustrated is a system and method to receive an instruction to access a set of identified data structures, where each identified data structure is associated with a version data structure that includes annotations of particular dependencies amongst at least two members of the set of identical data structures. The system and method further comprising determining, based upon the dependencies, that a version mismatch exists between the at least two members of the set of identified data structures, the dependencies used to identify a most recent version and a locally cached version of the at least two members. The system and method further comprising delaying execution of the instruction until the version mismatch between the at least two members of the set of identified data structures is resolved through an upgrade of a version of one of the at least two members of the set of identified data structures.
    Type: Application
    Filed: October 27, 2010
    Publication date: May 3, 2012
    Inventor: Antonio LAIN
  • Publication number: 20120109918
    Abstract: To achieve a multi-transaction processing system which assumes real-time update having practical throughput being a requirement, in multi-transaction processing in which consistency should be maintained. An update access-counter technology is applied which assumes a time when a counter is returned to an initial value depending on the up-down counting of the counter identified by a process ID of a process that is a starting point of multi-transaction processing being the completion of one multi-transaction processing, thus solving the problem.
    Type: Application
    Filed: January 11, 2012
    Publication date: May 3, 2012
    Inventor: Shuhei Nishiyama
  • Publication number: 20120109894
    Abstract: Computer program product to back up deduplicated data to data storage media, the deduplicated data comprising a plurality of data blocks referenced for deduplication. In one embodiment, the existence of multiple references to each of the data blocks is determined; and at least two copies of at least each data block having multiple references thereto is stored, each to a separate data storage media. In another embodiment, the references to each of the data blocks is determined; the total of multiple references is compared to a percentage threshold; and multiple copies are stored for all the data blocks where the percentage threshold is exceeded.
    Type: Application
    Filed: January 3, 2012
    Publication date: May 3, 2012
    Inventor: GREGORY TAD KISHI
  • Publication number: 20120109899
    Abstract: A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a containment relationship identifying a direct relationship between a first object of the first Namespace and a second object of the first Namespace. Moreover, the system includes a junction relationship linking the second object of the first Namespace to a first object of the second Namespace. In one embodiment, the system is configured to facilitate the recovery of information based on the descriptions of the Namespaces that is maintained.
    Type: Application
    Filed: December 9, 2011
    Publication date: May 3, 2012
    Applicant: Microsoft Corporation
    Inventors: Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Vijay Chandhok, Dharshan Rangegowda, Vinay Badami, Yezdi Z. Lashkari, Robert M. Fries, Seetharaman Karikrishnan
  • Publication number: 20120109920
    Abstract: According to some embodiments, a primary business object BOA is established along with a plurality of secondary business objects that depend from the primary business object BOA in a hierarchy. The primary business object BOA may place a lock on a secondary business object BOB and facilitate an update of data associated with the secondary business object BOB. The secondary business object BOB may then detect when a database commit has been executed, responsive to that detection, the secondary business object BOB may remove the lock associated with the secondary business object BOB.
    Type: Application
    Filed: November 3, 2010
    Publication date: May 3, 2012
    Inventors: Robert Forster, Sirvathsan Govindarajan
  • Publication number: 20120109896
    Abstract: Methods, devices, and systems for data signal mirroring are described. One or more methods include receiving a particular data pattern on a number of data inputs/outputs of a memory component, and responsive to determining that a mirrored version of the particular data pattern is received by the memory component, configuring the number of data inputs/outputs to be mirrored.
    Type: Application
    Filed: March 11, 2011
    Publication date: May 3, 2012
    Applicant: MICRON TECHNOLOGY, INC.
    Inventors: Michael M. Abraham, Peter Feeley
  • Publication number: 20120101997
    Abstract: The present invention relates to a system and method of data restoration, for instance, after the occurrence of a user error. In particular, snapshot database can be maintained that stores a copy of database data. The snapshot database does not have to store a complete copy of all data on a source database, but rather shares data that is common to both but not necessarily identical. If an error occurs on the primary database then the database can be reverted back to a point in time prior to the error by replacing source database files with snapshot files. Additionally, an undo component can be employed in conjunction with the snapshot to approach an error to a finer grained point in time. In brief, the present invention can restore a database much faster and simpler, while utilizing less space and resources than conventional data restoration technologies.
    Type: Application
    Filed: December 28, 2011
    Publication date: April 26, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Michael J. Zwilling, Gregory A. Smith, Rajeev B. Rajan, Jakub Kulesza, Peter Byrne, Shashikant Brijmohan Khandelwal, Mark S. Wistrom
  • Publication number: 20120102000
    Abstract: Each file is assigned in advance with a WWUID which is newly assigned to a file upon the creation or update of the file and is inherited from a file to a copied file when the file is copied. In a backup apparatus, a file name reception unit receives the file name of a backup target file. A WWUID reception unit receives a WWUID corresponding to the file name. A WWUID search unit searches for the same WWUID in backup management information of a previous day stored in a backup destination. Only if the search is failed, a file operation instruction unit instructs the storing of the backup target file into the backup destination. Then, an Rcnt update instruction unit instructs the updating of the number of references made to the WWUID within the backup destination. A second management information update instruction unit then instructs the updating of backup management information of the current day.
    Type: Application
    Filed: September 22, 2011
    Publication date: April 26, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Eiji TOSAKA
  • Publication number: 20120101994
    Abstract: Techniques for provisioning databases for users on a wide area network such as the Internet include a first party managing one or more database systems. Second parties subscribe to database services supported by the managed database systems. The first party provides, over a network, to database applications of the second parties, access to database services to which the second parties are subscribed. The database systems may use database appliances hosting both database process(es), and non-database process(es) tailored to the needs of the database process(es). A user is therefore able to obtain database resources from an Internet Database Service Provider (IDSP) without incurring the full costs of database administrator(s), dedicated database equipment facilit(ies), or even dedicated database device(s), depending on usage. Meanwhile, the IDSP incurs minimum staffing loads because of self-service tools. Costing model and automatic billing are also described.
    Type: Application
    Filed: December 28, 2011
    Publication date: April 26, 2012
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Jean-Louis Baffier, Marc Dangeard, Thierry Gruet, Olaf Ziegler, Dean Tan, Christina Sechrest, Pascal Sero, Kevin Walsh
  • Publication number: 20120102001
    Abstract: A database archive, and a system and method for generating database archives is disclosed. A processor may store in a database archive an index that includes record entries that each references one or more record fields of a database, and may store the record fields independently of the database archive.
    Type: Application
    Filed: December 8, 2011
    Publication date: April 26, 2012
    Applicant: Rainstor Limited
    Inventor: Tom Benjamin Longshaw
  • Publication number: 20120101998
    Abstract: A machine manager controls the deployment and management of machines (physical and virtual) for an online service. Multi-tier server groups are arranged in farms that each may include different configurations. For example, their may be content farms, federated services farms and SQL farms that are arranged to perform operations for the online service. When the multiple farms are upgraded, new farms are deployed and the associated content databases from the old farms are moved to the newly deployed farms. During the upgrade of the farms, requests may continue to be processed by the farms. The farms may be automatically load balanced during an upgrade. As content becomes available on the new farm, requests for the content may be automatically redirected to the new farm.
    Type: Application
    Filed: October 20, 2010
    Publication date: April 26, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Jason M. Cahill, Alexander Hopmann, Eric Fox, Zach Rosenfield, Marc Keith Windle, Erick Raymundo Lerma, Ricardo Prates de Oliveira, Doron Bar-Caspi, Kshamta Jerath, Arshish Kapadia, Tarkan Sevilmis, Tittu Jose
  • Publication number: 20120102004
    Abstract: A digital file may be stored on a storage device and deleted upon reading of the file. In one example, at least a portion of the stored file may be read, such as by a processor. In response to the reading of the stored file, at least part of the at least a portion of the stored file that has been read may be deleted. In further examples, the at least part of the at least a portion of the stored file may be deleted progressively while the stored file is being read, after a triggering event, or after a delay in time. According to another example, a user may provide an indication representative of the at least part of the at least a portion of the stored file that is to be deleted after the at least a portion of the stored file is read.
    Type: Application
    Filed: October 22, 2010
    Publication date: April 26, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexander C. Johnson, Badari Pulavarty
  • Publication number: 20120095960
    Abstract: A computing device receives a request to perform a Lightweight Directory Access Protocol (“LDAP”) database operation and propagates the request to perform the LDAP database operation to a peer server to test the LDAP database operation at the peer server. The computing device executes an action on a distributed LDAP database based on a result of testing the LDAP database operation at the peer server.
    Type: Application
    Filed: December 23, 2011
    Publication date: April 19, 2012
    Inventor: Peter A. Rowley
  • Publication number: 20120095974
    Abstract: Systems and methods for verifying data in a distributed database using different automated check operations at different times during the database read and update cycles. Various functions may be performed including executing a first check during update operations of the database. A second check may also be executed during the update operation of the database, and be implemented as an execution thread of an update daemon. A third check may be executed at a time interval between update functions of the update daemon. A fourth check may be executed during a time that the database is not being updated. Integrity of data in the database may be verified by a computer processor based on the first, second, third, and fourth checks.
    Type: Application
    Filed: October 18, 2010
    Publication date: April 19, 2012
    Applicant: VeriSign, Inc.
    Inventors: Michael Bentkofsky, Patrick Quaid, Bradley McMillen
  • Publication number: 20120095967
    Abstract: A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information.
    Type: Application
    Filed: October 18, 2010
    Publication date: April 19, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Prashant Parikh, Don Kleinschnitz
  • Publication number: 20120089573
    Abstract: Methods and computer readable media for restoring a database. In a method, a backup of a subset of a database is created, where the subset includes a filegroup and database metadata describing the filegroup. The database is then restored using the database subset. In a computer-readable medium, a first data field contains data representing a database subset having at least one of a plurality of filegroups. A second data field contains data representing database metadata that describes the filegroup. In another method, archived database metadata and an archived filegroup that is one of a plurality of filegroups is accessed, and the filegroup is brought online using the database metadata.
    Type: Application
    Filed: December 19, 2011
    Publication date: April 12, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Steven R. Schmidt, Gregory Smith
  • Publication number: 20120089576
    Abstract: A backup and restore system may present recovered backup data as local resources and in a read and write manner so that the recovered backup data may be accessed using an application that created the data. In some embodiments, the recovered data may be read only data, but a differencing virtual hard disk (VHD), Common Internet File System protocol, or differencing driver may be used to present a read/write version of the data. Additionally, the data may be presented using iSCSI or other technologies to present the data as local data, even though the data may be remotely located. The backup and restore system may additionally use VHD differencing technologies to create multiple backups.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 12, 2012
    Applicant: Microsoft Corporation
    Inventors: Amit Singla, Sai Peyyeti, Seshagiri K V, Pankaj Khanzode, Harsh Mittal
  • Publication number: 20120089575
    Abstract: Embodiments of archival storage system are disclosed. The archival storage system includes one or more removable disk drives that provide random access and are readily expandable. One or more application servers can store archival data to the one or more removable disk drives. Further, the archival storage system provides an audit trail that stores information about actions taken on the archival data. The audit trail data providing a list of the actions and information about the actions that can be used to determine changes to the archival data.
    Type: Application
    Filed: December 20, 2011
    Publication date: April 12, 2012
    Applicant: Imation Corp.
    Inventor: Randy Kerns
  • Patent number: 8156164
    Abstract: A method for avoiding directory conflicts across a file system having multiple nodes with one node representing a token manager. For each directory, at least one metanode responsible for directory updates. The method involving obtaining a name-based lock on a filename. Querying the token manager for a lock token. If a new token is obtained, sending a Remote Procedure Call (RPC) to the metanode to obtain matching directory entries, and caching the result of the RPC so that subsequent operations on that filename can be satisfied without additional messages sent to the metanode. Updating a cached directory block in memory by creating a new directory entry in the block or deleting an existing directory entry from the block. Information regarding the updating is sent to the metanode on one of: periodic schedule, a subsequent synchronization event, or when the name-based lock token is revoked.
    Type: Grant
    Filed: July 11, 2007
    Date of Patent: April 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Owen T. Anderson, Frank B. Schmuck
  • Publication number: 20120084263
    Abstract: An encrypted file storage solution consists of a cluster of processing nodes, external data storage, and a software agent (the “File System Watcher”), which is installed on the application servers. Cluster sizes of one node up to many hundreds of nodes are possible. There are also remote “Key Servers” which provide various services to one or more clusters. The preceding describes a preferred embodiment, though in some cases it may be desirable to “collapse” some of the functionality into a smaller number of hardware devices, typically trading off cost versus security and fault-tolerance.
    Type: Application
    Filed: December 12, 2011
    Publication date: April 5, 2012
    Applicant: NEXSAN TECHNOLOGIES CANADA INC.
    Inventor: Thomas F. GOSNELL
  • Publication number: 20120084259
    Abstract: A client device may be managed in the event of, for example, device loss or mislocation. In such a case, a user can effectively cause a restriction command to be generated, where the restriction command is wirelessly transmitted to the client device. The restriction command can be specified to either lock user data on the client device or erase user data on the client device.
    Type: Application
    Filed: December 12, 2011
    Publication date: April 5, 2012
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Bharat Welingkar, Srikiran Prasad
  • Publication number: 20120084258
    Abstract: A computer implemented method includes monitoring blocks of data on a storage device that are changing as the computer operates. On detecting a computer shut down event, a copy of changes to the monitored blocks are saved. Upon startup of the computer, a backup of the changed blocks of data is performed.
    Type: Application
    Filed: October 4, 2010
    Publication date: April 5, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Pratap Karonde, Prashant Parikh
  • Publication number: 20120084265
    Abstract: A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a containment relationship identifying a direct relationship between a first object of the first Namespace and a second object of the first Namespace. Moreover, the system includes a junction relationship linking the second object of the first Namespace to a first object of the second Namespace. In one embodiment, the system is configured to facilitate the recovery of information based on the descriptions of the Namespaces that is maintained.
    Type: Application
    Filed: December 8, 2011
    Publication date: April 5, 2012
    Applicant: Microsoft Corporation
    Inventors: Brian M. Wahlert, Mike Jazayeri, Catharine van Ingen, Brian T. Berkowitz, Nikhil Vijay Chandhok, Dharshan Rangegowda, Seetharaman Harikrishnan, Vinay Badami, Yezdi Z. Lashkari, Robert M. Fries
  • Publication number: 20120084262
    Abstract: Software, firmware, and systems are described herein that permit an organization to dock previously-utilized, limited-feature data management modules with a full-featured data management system. By docking limited-feature data management modules to a full-featured data management system, metadata and data from the various limited-feature data management modules can be integrated and utilized more efficiently and effectively. Moreover, additional data management features can be provided to users after a more seamless transition.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 5, 2012
    Inventors: Rama Naga Bheemeswara Reddy Dwarampudi, Rajiv Kottomtharayil, Rahul S. Pawar, Parag Gokhale
  • Publication number: 20120078864
    Abstract: The present invention discloses an electronic data integrity protection device and method and a data monitoring system, wherein the device includes: a data reception unit configured to receive electronic data; a signal reception unit configured to receive an external signal; a signal processing unit configured to process the external signal in accordance with a predetermined integrity protection strategy, to output a corresponding instruction, wherein the integrity protection strategy specifies at least an integrity protection mode associated with the external signal; and an integrity protection operation unit configured to perform, in response to the instruction, integrity protection operation on the electronic data so as to generate integrity protection information.
    Type: Application
    Filed: September 27, 2011
    Publication date: March 29, 2012
    Applicant: Sony Corporation
    Inventors: Ji LI, Izuru Kitamura
  • Publication number: 20120078857
    Abstract: The present invention extends to methods, systems, and computer program products for exploring and selecting data cleansing service providers. Embodiments of the invention permit a user to explore different data cleansing service providers and compare quality results from the different data cleansing service providers. Sample data is mapped to a specified data domain. A list of service providers, for cleansing data for the selected data domain, is provided to a user. The user selects a subset of service providers. The sample data is submitted to the subset of service providers, which return results including allegedly cleansed data. The results are profiled and a comparison of the subset of service providers is presented to the user. The user selects a service provider to use when cleansing further data.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Applicant: Microsoft Corporation
    Inventors: Neta Haiby, Elad Ziklik, Efim Hudis, Gad Peleg
  • Publication number: 20120078855
    Abstract: A system and method for performing a granular restore operation of a database from a differential backup of the database. A bitmask is created during a differential backup and stored with the differential backup file. When a user requests a granular restore operation, views of how the database existed at different points of time may be presented to the user. The objects the user wishes to restore may be selected from one of the views. Next, the bitmask may be read to determine if the objects should be retrieved from the differential backup file or a full backup file. Finally, the objects may be restored to the database from the proper file.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Inventors: Louis Beatty, Deepak Saraf
  • Publication number: 20120078846
    Abstract: Systems and methods of managing virtual storage resources are disclosed. An exemplary method includes analyzing parameters of a plurality of backup jobs over time to model backup lifecycle. The method also includes estimating size of available storage capacity over time based on the modeled backup lifecycle. The method also includes identifying storage options using the available storage capacity on an ongoing basis for future backup jobs.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 29, 2012
    Inventors: Stephen Gold, Jeffrey S. Tiffan, Sri Harshan Kapanipathi
  • Publication number: 20120078842
    Abstract: Mechanisms to support object-oriented version control operations are provided. A user manipulates and views a project from an object viewpoint and within an object module. The user performs version control operations using object handles. The object handles are resolved to specific file references and the specific file references are used to process legacy version control commands utilizing a legacy version control system in a manner that is transparent to the user.
    Type: Application
    Filed: September 30, 2011
    Publication date: March 29, 2012
    Inventors: Zack Grossbart, Lee Edward Lowry, Volker Gunnar Scheuber-Heinz, Rajesh Vasudevan, Brent Thurgood, William Street, Karin Stella Lundberg
  • Publication number: 20120078849
    Abstract: An “operate with missing region” feature of this disclosure allows the cluster to continue servicing reads for available regions even when some regions are missing. In particular, upon a given node failure condition, the cluster is placed in an effective read-only mode for all regions. The node failure condition typically is one where there has been a failure of an authoritative region copy and no backup copy is then available. As used herein, “read-only” means that no client write or update requests will succeed while the cluster is in this state. In particular, those requests should fail with an error message (or the like) that indicates failure because of the read-only status. Preferably, such requests are then re-tried. In this mode, all regions are only allowed to perform read operations. During the read-only state, the cluster continues to operate with missing regions, and missing regions are entered on the region map.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 29, 2012
    Applicant: HITACHI DATA SYSTEMS CORPORATION
    Inventors: Alan G. Bryant, Kevin S. Grimaldi, Trek Palmer, David B. Pinkney