QUANTUM CORPORATION Patent applications |
Patent application number | Title | Published |
20150310127 | N-Way Inode Translation - Example apparatus and methods concern storing additional information about inodes to facilitate n-way inode translation between local inode spaces and external inode spaces. Example apparatus and methods also concern publishing information about actions that affect inodes to facilitate n-way inode translation. Additional data is added to local file systems so that a local file system can determine whether an inode for which an action is requested or reported is a native inode or an imported inode. The additional data added to the local file systems through the updated inode data storage and inode action publication also facilitates determining which local inode to act on based on the n-way inode translation mechanism. | 10-29-2015 |
20150286701 | Data Classification Aware Object Storage - Example apparatus and methods process data that is going to be stored in an object store. The object store may have multiple data destinations (e.g., “buckets”). Different buckets have different data storage policies that control, for example, how many copies of the data will be made, whether the data will be stored onsite or offsite, or other storage parameters. Data may be classified by identifying a value for an attribute (e.g., file type, file source) of the data. A storage policy associated with a bucket may then be selected based on the attribute. Once the storage policy has been selected, then the data may be provided to a bucket associated with the storage policy. The number of buckets, data classifications, or storage policies may be updated by adaptive parameterization that considers the amount or type of data observed and stored in the object store. | 10-08-2015 |
20150254299 | Methods and Systems For Vectored Data De-Duplication - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 09-10-2015 |
20150236725 | Dynamically Configuring Erasure Code Redundancy And Distribution - Example apparatus and methods monitor conditions in a tiered storage system. The conditions monitored may include the availability of different numbers and types of devices including an erasure code based object storage system. The conditions monitored may also include the availability and type of devices available to the erasure code based object storage system. A redundancy policy for storing an item using the erasure code based object storage system may be determined based on the conditions. Erasure codes associated with the item may then be stored in the erasure code based object storage system as controlled, at least in part, by the redundancy policy. The redundancy policy for the erasure codes may be updated dynamically in response to changing conditions on the tiered storage system. | 08-20-2015 |
20150236724 | Dynamically Controlling Erasure Code Distribution In An Object Store - Example apparatus and methods monitor conditions in an object storage system. The conditions monitored may include a load balance measure in the system, a capacity balance measure in the system, a fault tolerance measure in the system, or a usage pattern measure in the system. A distribution plan or redistribution plan for storing or moving erasure codes in the object storage system may be determined based on the conditions. The distribution plan or the redistribution plan for the erasure codes may be updated dynamically in response to changing conditions in the object storage system. The distribution or redistribution may depend on a weighted combination of the load balance measure, the capacity balance measure, the fault tolerance measure, or the usage pattern measure so that responding to one sub-optimal condition (e.g., load imbalance) does not create a different sub-optimal condition (e.g., unacceptable fault tolerance). | 08-20-2015 |
20150193353 | Compressed Level Two Block Buffer Metadata Cache - Example apparatus and methods provide metadata for a file system operation from a multi-level data store. The data store may include an in-memory level one (L1) cache, an in-memory level two (L2) cache, and an external metadata store not located in the memory associated with the L1 and L2 caches. The L1 cache stores metadata in a non-compressed format that can directly service a file system operation while the L2 cache stores metadata in a compressed format that cannot directly service an operation. Metadata to support a file system operation may be sought in the L1 cache first, then in the L2 cache, and then finally in the external metadata store. When metadata is provided from the L2 cache, it is decompressed before being provided to the L1 cache. Metadata added to the L2 cache may be compressed after or in parallel with being provided to the L1 cache. | 07-09-2015 |
20150186222 | Methods and Systems For Vectored Data De-Duplication - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 07-02-2015 |
20150178308 | Methods and System For Vectored Data De-Duplication - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 06-25-2015 |
20150127619 | File System Metadata Capture and Restore - Example apparatus and methods create and maintain a functional mirror of file system metadata for an active file system. The functional mirror may be implemented as a set of database tables that allow a journal functionality for information received from the active file system. Example apparatus and methods also restore the file system metadata from the functional mirror. Mirror creation and maintenance can operate in parallel. Mirror maintenance and metadata restore can also operate in parallel. The functional mirror may be created primarily using a systematic, system-wide, multi-threaded crawler approach whose results are updated using an event-driven approach that accounts for changes that may make obsolete information acquired during the crawler approach. The metadata may be restored using a systematic, system-wide, multi-threaded crawler approach acting together with an event-driven approach that restores certain files out of order as they are needed. | 05-07-2015 |
20150039846 | Efficiency Of Virtual Machines That Use De-Duplication As Primary Data Storage - Example apparatus and methods provide two types of storage for a virtual machine running on a hypervisor. The first storage is de-duplication based and the second storage is not de-duplication based. Example apparatus and methods may acquire data from the first storage to instantiate the virtual machine, to instantiate an operating system on the virtual machine, or to instantiate an application on the virtual machine from the first storage. Example apparatus and methods may write a snapshot to the second storage and then support random input/output for the virtual machine, for the operating system, or for the application from the second storage. The snapshot may selectively be collapsed or the second storage may selectively be retired and thus example systems may selectively update the first storage from the second storage. Having dual devices facilitates using de-duplication storage for de-duplication-centric I/O while non-de-duplication storage is used for random I/O. | 02-05-2015 |
20140355153 | ADAPTIVE DISTURBANCE COMPENSATION WITH MULTI-RATE SYNCHRONIZED SAMPLING - An apparatus and method for providing adaptive disturbance compensation with multi-rate synchronized sampling is disclosed herein. The dynamic disturbance occurring in a media drive during read/write operations is attenuated using the adaptive disturbance compensation scheme. A plurality of compensation filters are used, each of the compensation filters configured to attenuate a disturbance caused by a particular source within the media drive. Each of the compensation filters is computed based on a sampling rate relevant to the respective disturbances. | 12-04-2014 |
20140337594 | SYSTEMS AND METHODS FOR COLLAPSING A DERIVATIVE VERSION OF A PRIMARY STORAGE VOLUME - Disclosed are systems, methods, and computer readable media for restoring virtual machines. In a particular embodiment, a non-transitory computer readable medium is provided having instructions stored thereon that, when executed by a computer system, cause the computer system to perform a method for restoring virtual machines. The method comprises generating a snapshot of a storage volume representing a virtual machine in a virtual machine environment and storing the snapshot in the virtual machine environment which tracks changes to the snapshot that occur since the snapshot was generated. Based on the changes, the method provides merging differences between the storage volume and the snapshot. | 11-13-2014 |
20140317369 | SNAPSHOT CREATION FROM BLOCK LISTS - Embodiments disclosed herein provide systems and methods for creating snapshots from a list of changed blocks. In a particular embodiment, a method provides establishing a base state for a data storage volume having a file system, creating a snapshot of the data storage volume, and restoring data items by merging the snapshot and the base state. | 10-23-2014 |
20140300986 | ADAPTIVE CORRECTION OF SYMMETRICAL AND ASYMMETRICAL SATURATION IN MAGNETIC RECORDING DEVICES - In one embodiment, a read channel comprises: a preprocessor for receiving a first signal and producing a second signal from the first signal using current values of a positive coefficient, a zero coefficient, and a negative coefficient; an interpolator for producing a third signal based on the second signal; and a slicer for producing a fourth signal from the third signal by estimating a level for the third signal. The fourth signal is at one of three levels consisting of a positive level, a zero level, and a negative level. For every n first signals received by the preprocessor, the current value of one of the positive coefficient, the zero coefficient, and the negative coefficient is adjusted depending on which of the three levels the fourth signal is at. | 10-09-2014 |
20140280394 | Multi-Threaded Message Passing Journal - Example apparatus and methods protect state in a file system using a message-passing multi-threaded journal. One example apparatus stores, in memory, data and metadata affected by a file system transaction. The apparatus may run a thread that receives the file system transaction from the file system and that produces a set of atomic operations configured to complete the file system transaction. The apparatus may also run a thread that records a set of journal entries associated with the set of atomic operations to protect the file system while the atomic operations complete. The journal entries may be written on a non-volatile computer-readable medium. The apparatus may also run a thread that co-ordinates usage of space on the computer-readable medium. Rather than synchronizing journal activity with locks, the threads running on the example apparatus may synchronize their activity using message passing. | 09-18-2014 |
20140258671 | Heuristic Journal Reservations - Example apparatus and methods reserve space in a journal using an observation based approach instead of a fixed sized approach or a worst case scenario approach. One example method receives a request to allocate space in a journal to support a file system transaction. The example method reserves an amount of space in the journal based on a pre-existing reservation size estimate. Unlike conventional systems, the estimate is not based on a worst-case scenario. The example method observes the actual amount of storage used in the journal by the file system transaction and then selectively automatically adjusts the pre-existing reservation size estimate. The estimate may slowly shrink if no overflows are encountered but may quickly grow if an overflow is detected. | 09-11-2014 |
20140208050 | METADATA STORAGE IN UNUSED PORTIONS OF A VIRTUAL DISK FILE - Embodiments disclosed herein provide systems and method for storing metadata to unused portions of a virtual disk file. In a particular embodiment, a method provides selecting a virtual disk file stored on a data storage volume and identifying unused portions of the virtual disk file. The method further provides writing metadata for the virtual disk file in the unused portions of the virtual disk file. | 07-24-2014 |
20140195735 | Clustered Storage Network - A data storage network is provided. The network includes a client connected to the data storage network; a plurality nodes on the data storage network, wherein each data node has two or more RAID controllers, wherein a first RAID controller of a first node is configured to receive a data storage request from the client and to generate RAID parity data on a data set received from the client, and to store all of the generated RAID parity data on a single node of the plurality of nodes. | 07-10-2014 |
20140192437 | HEAD ROTATOR ASSEMBLY FOR TAPE DRIVE - A head rotator assembly ( | 07-10-2014 |
20140143877 | DATA IDENTIFICATION SYSTEM - Disclosed is a method of operating a data storage system. The method comprises identifying changed segments of a primary storage volume, receiving a data request for a plurality of data items in a secondary storage volume, identifying changed data items of the plurality of data items in the secondary storage volume based on a correspondence between the plurality of data items in the secondary storage volume and the changed segments of the primary storage volume, and transferring the changed data items in response to the data request. | 05-22-2014 |
20140136490 | Methods and Systems For Vectored Data De-Duplication - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 05-15-2014 |
20140122449 | Manipulating The Actual or Effective Window Size In A Data-Dependant Variable-Length Sub-Block Parser - Example systems and methods concern a sub-block parser that is configured with a variable sized window whose size varies as a function of the actual or expected entropy of data to be parsed by the sub-block parser. Example systems and methods also concern a sub-block parser configured to compress a data sequence to be parsed before parsing the data sequence. One example method facilitates either actually changing the window size or effectively changing the window size by manipulating the data before it is parsed. The example method includes selectively reconfiguring a data set to be parsed by a data-dependent parser based, at least in part, on the entropy level of the data set, selectively reconfiguring the data-dependent parser, based, at least in part, on the entropy level of the data set, and parsing the data set. | 05-01-2014 |
20140049855 | HEAD ROTATOR ASSEMBLY FOR TAPE DRIVE - A head rotator assembly ( | 02-20-2014 |
20140016225 | MAGNETIC MEDIA ACCESS HEAD WITH METAL COATING - Embodiments disclosed herein provide magnetic media access heads with metal coatings. In a particular embodiment, a magnetic media head for accessing magnetic media comprises a base substrate configured to support a magnetic head layer. The magnetic head layer is formed on the base substrate and configured to magnetically access the magnetic media. A metallic layer formed over the magnetic head layer and disposed between the magnetic head layer and the magnetic media when the magnetic media is positioned for access by the magnetic head layer. | 01-16-2014 |
20130339401 | Method for Reliable and Efficient Filesystem Metadata Conversion - A method for converting metadata in a hierarchical configuration within a filesystem from a first format to a second format includes reading metadata in the first format within the hierarchical configuration; writing the metadata from the hierarchical configuration into a flat file; and writing the metadata back into the hierarchical configuration, the metadata being in the second format The method can also include increasing the size of each of a first inode and a second inode within a first inode chunk in the filesystem, assigning the first inode to the first inode chunk, and assigning the second inode to a second inode chunk. | 12-19-2013 |
20130339315 | Configurable Data Generator - Embodiments associated with configurable, repeatable, data generation are described. One example method includes manipulating a redundancy parameter that controls data redundancy in binary large objects (BLOBs) to be included in a generated data set. The redundancy parameters may control variations in repeatable variable length sequences included in BLOBs. The example method also includes manipulating a parameter(s) that controls custom designed sequences included in BLOBs. With the redundancy and custom designed sequences described, the example method then generates BLOBs based, at least in part, on the redundancy parameters and the custom-designed sequences. BLOBs may include byte sequences repeated at different frequencies and configurable user-designed sequences. Manipulating the redundancy parameter, manipulating the custom-designed sequences, generating the BLOBs, and providing the BLOBS may be performed by separate processes acting in parallel. | 12-19-2013 |
20130325167 | METHOD FOR MOVER TRANSITION IN AN AUTOMATED MEDIA LIBRARY - A method for mover transition in an open systems based media library ( | 12-05-2013 |
20130311638 | Reducing Metadata Controller Communication Volume - Apparatus, methods, and other embodiments associated with reducing metadata controller communication volume are described. One example apparatus produces tracking data by tracking metadata controller communications and then controls which of two different types of metadata controller communication message types are used for metadata controller communications based, at least in part, on the tracking data. One message type provides actual state and/or location information about a metadata controller. A second message type provides only information about the state and/or location information available at a metadata controller. Selectively using the second message type facilitates reducing metadata controller communication volume. | 11-21-2013 |
20130297898 | Reducing Read Starvation - Apparatus, methods, and other embodiments associated with reducing read starvation that is supported by a multi-purpose buffer managed by a least recently used (LRU) data structure are described. One example method includes changing how certain retired pages are added back into the LRU. The dual-purpose buffer may be used in data de-duplication to support satisfying ingest requests and to support satisfying read requests. The method may also include controlling the LRU to allocate active ingest pages and active read pages from the head of the LRU. The method may also include controlling the LRU to cause the active ingest page and the active read page to re-enter the LRU at the tail of the LRU. Unlike conventional approaches, the method may also include controlling the LRU to cause a retired ingest page to re-enter the LRU at a location other than the tail (e.g., head) of the LRU. | 11-07-2013 |
20130290275 | Object Synthesis - Apparatus, methods, and other embodiments associated with object synthesis are described. One example apparatus includes logic for identifying a block in a data de-duplication repository and for identifying a reference to the block. The apparatus also includes logic for representing a source object using a first named, organized collection of references to blocks in the data de-duplication repository and logic for representing a target object using a second named, organized collection of references. The apparatus is configured to synthesize the target object from the source object. Since synthesis may be complicated by edge cases, the apparatus is configured to account for conditions including a block in the target object needing less than all the data in a source object block, data to be used to synthesize the target object residing in a sparse hole in a data stream, and the target object needing data not present in the source object. | 10-31-2013 |
20130290261 | File System Based Exchange Between Disk-Based Network Attached Storage and Tape - Example apparatus and methods concern a file system based interface between a disk-based network attached storage device and a linear tape open (LTO) linear tape file system tape. One example method may include controlling a device (e.g., backup server) to read a file from the NAS device using a shared file system (e.g., NFS, CIFS) and controlling the device to write the file to the LTO tape device using the LTFS. Since the NAS device and the LTO device may have different information or metadata requirements, and since the shared file system and the LTFS may have different information or metadata requirements, the method may include controlling the device to remove from the file information specific to the NAS and the shared file system. Additionally, the method may include controlling the device to add to the file information specific to the LTFS or the LTO device. | 10-31-2013 |
20130271131 | Varying Blipped Trajectory - Apparatus, methods, and other embodiments associated with magnetic resonance imaging (MRI) blipped trajectories having varying blip amplitudes are described. One example method includes controlling an MRI apparatus to produce a set of blipped trajectories including a first blipped trajectory having a first blip amplitude and a second, different blipped trajectory having a second, different blip amplitude. The blip amplitudes may be based on a relationship between a trajectory and a reference. The relationship may be, for example, a rotation angle. The rotation angle may be a proxy for information including a gradient trajectory speed associated with a blipped trajectory or an amount of unused gradient energy available while producing the blipped trajectory. The blip amplitudes may be selected to produce incoherent sampling during an MRI acquisition that uses the blipped trajectories. In one example, readout directions may be altered between trajectories to reduce regularity in k-space. | 10-17-2013 |
20130179408 | Blocklet Pattern Identification - Apparatus, methods, and other embodiments associated with blocklet pattern identification are described. One example method includes accessing a blocklet produced by a computerized data de-duplication parsing process before providing the blocklet to a duplicate blocklet determiner. The example method also includes hashing a portion of the blocklet to produce a pattern indicating hash and then identifying the blocklet as a pattern blocklet if the pattern indicating hash matches a pre-determined pattern indicating hash. To improve efficiency in a data de-duplication process, the blocklet pattern identifying may be performed independently from a data structure and process used by the duplicate blocklet determiner. If the blocklet is a pattern blocklet, then the method includes selectively controlling the duplicate blocklet determiner to not process the pattern blocklet. The duplicate determination is not needed because a pattern determination has already been made. | 07-11-2013 |
20130179407 | Deduplication Seeding - Apparatus, methods, and other embodiments associated with de- duplication seeding are described. One example method includes re-configuring a data de-duplication repository with a blocklet from a data de-duplication seed corpus. Reconfiguring the repository may include adding a blocklet from the seed corpus to the repository, activating a blocklet identified with the seed corpus in the repository, removing a blocklet from the repository, and de-activating a blocklet in the repository. The example method may also include re-configuring a data de-duplication index associated with the data de-duplication repository with information about the blocklet. Reconfiguring the repository and the index increases the likelihood that a blocklet ingested by a data de-duplication apparatus that relies on the repository and the index will be treated as a duplicate blocklet by the data de-duplication apparatus. | 07-11-2013 |
20130159261 | DE-DUPLICATION REFERENCE TAG RECONCILIATION - Example apparatus and methods concern de-duplication reference tag reconciliation associated with garbage collection and/or reference health checking. One example method may include accessing data associated with members of a set of references to blocks of data stored by a data de-duplication system. The method may process the first data to manipulate a Bloom filter into a state from which membership in the set of references can be assessed. The method may also include accessing a block identifier identified with a member of the set of blocks of data stored by the data de-duplication system and assessing membership in the set of references for the block identifier by querying the Bloom filter with the block identifier. If the block is not referenced, as determined by querying the Bloom filter, then the method may include performing a block reclamation action on the unreferenced block. | 06-20-2013 |
20130151803 | Frequency and migration based re-parsing - Example apparatus and methods associated with frequency and migration based re-parsing are provided. One example data de-duplication apparatus includes a migration logic and a parsing logic. The migration logic may be configured to perform a data transfer according to an access frequency to the data. The parsing logic may be configured to re-parse the data based on the access frequency to the data. In different examples, parsing the data may be performed in response to migrating the data. In one example, parsing the data may be performed during or after the migration. Additional examples illustrate parsing the data to balance performance against reduction in light of access frequency to the data block. | 06-13-2013 |
20130151756 | Data de-duplication and solid state memory device - Example methods and apparatus concern identifying placement and/or erasure data for a flash memory based solid state device that supports de-duplication. One example apparatus include a processor, a memory, a set of logics and an interface to connect the processor, the memory, and the set of logics. The apparatus may include an SSD placement logic configured to determine placement data for a de-duplication data set. The placement data may be based on forensic data acquired for the de-duplication data set. The apparatus may also include a write logic configured to write at least a portion of the de-duplication data set to an SSD as controlled by the placement data. The forensic data may identify, for example, the order in which sub-blocks are accessed, reference counts, access frequency, access groups, and other access information. | 06-13-2013 |
20130151483 | Adaptive experience based De-duplication - Example apparatus and methods associated with adaptive experience based de-duplication are provided. One example data de-duplication apparatus includes a de-duplication logic, an experience logic, and a reconfiguration logic. The de-duplication logic may be configured to perform data de-duplication according to a configurable approach that is a function of a pre-defined constraint. The experience logic may be configured to acquire de-duplication performance experience data. The reconfiguration logic may be configured to selectively reconfigure the configurable approach on the apparatus as a function of the de-duplication performance experience data. In different examples, dynamic reconfiguration may be performed locally and/or in a distributed manner based on local and/or distributed data that is acquired on a per actor (e.g., user, application) basis and/or on a per entity (e.g., computer, data stream) basis. | 06-13-2013 |
20130151482 | De-duplication for a global coherent de-duplication repository - Example methods and apparatus associated with data de-duplication for a global coherent de-duplication repository are provided. In one example a request related to data de-duplication is transmitted to a plurality of nodes associated with the global coherent de-duplication repository. Responses to the request are received from at least a subset of nodes in the plurality of nodes. Affinity scores are assigned to nodes of the subset of nodes based, at least in part, on affinity data from the responses. A node is selected to perform the request related to de-duplication from the subset of nodes of the plurality of nodes based, at least in part, on the affinity score assigned to the nodes. | 06-13-2013 |
20130148227 | Controlling tape layout for de-duplication - Example methods and apparatus concern creating and/or manipulating a tape-specific layout for a tape based de-duplication repository. One example apparatus include a processor, a memory, a set of logics and an interface to connect the processor, the memory, and the set of logics. The apparatus may include a tape layout logic configured to determine the tape-specific layout for a de-duplication data set. The tape-specific layout may be based on forensic data acquired for the de-duplication data set. The apparatus may also include a write logic configured to write the de-duplication data set to a tape according to the tape-specific layout. The forensic data may identify, for example, the order in which sub-blocks are accessed, reference counts, access frequency, access groups, and other access information. | 06-13-2013 |
20130138613 | SYNTHETIC BACKUP DATA SET - Example apparatus and methods concern creating synthetic backups from existing backups. One example method includes accessing first information that is associated with an existing backup(s). The first information may be computer data that describes data stored on a backup media or appliance. The first information may be referred to as metadata. The existing backup may reside on a backup medium (e.g., tape), on a backup appliance (e.g., disk), or elsewhere. The example method includes instantiating second information (e.g., metadata) associated with a synthetic backup to be created. The second information may be stored on a non-transitory computer-readable medium. The example method also includes selectively manipulating the second information to create the synthetic backup. The manipulating may include copying portions of the first information into the second information. In one embodiment, the synthetic backup is only logically created and thus no data is copied from the existing backup. | 05-30-2013 |
20130117517 | DATA ALLOCATION SYSTEM - A data control system facilitates transfer of a virtual disk from a primary storage system to a secondary storage system. The data control system, responsive to an instruction to transfer the virtual disk, wherein the virtual disk comprises a plurality of data blocks, determines whether each of the plurality of data blocks is allocated or unallocated; for each data block of the plurality of data blocks determined to be allocated, the data control system reads the data block from memory in the primary storage system and transfers the data block for storage in the secondary storage system; and for each data block of the plurality of data blocks determined to be unallocated, the data control system refrains from reading the data block from memory in the primary storage system. | 05-09-2013 |
20130097131 | Establishing Parse Scope - Example apparatus, methods, and computers control establishing a shared parse scope between two computers that intend to be involved in a shared de-duplication action. One example method includes, upon determining that a first de-duplication logic and a second de-duplication logic are to participate in a shared de-duplication action for an object, controlling the first de-duplication logic to establish a shared parse scope with the second de-duplication logic. Establishing the shared parse scope may include negotiations between the computers, where the negotiations transfer dialect information. The dialect information may take the form of rules. The method may also include persisting the shared parse scope. | 04-18-2013 |
20130091111 | Controlling Configurable Variable Data Reduction - Example apparatus, methods, and computers control configurable, variable data reduction. One example method includes identifying data reduction controlling attributes in an object to be data reduced by a configurable variable data reducer. The attributes provide information upon which decisions concerning whether and/or how to data reduce the object can be based. The example method also includes controlling a configurable variable data reducer to selectively data reduce the object based, at least in part, on the data reduction controlling attributes. The control exercised can determine whether, where, when, and/or how data reduction will proceed, | 04-11-2013 |
20130091092 | FRONT END INTELLIGENCE FOR MONITORING BACK END STATE - Apparatus, methods, and other embodiments associated with providing front end intelligence for monitoring back end state are described. One example method includes controlling a first entity to request that a second entity perform a multi-state stateful operation (e.g., file create). The method includes receiving notice from the second entity that the stateful operation has attained a first state (e.g., partial file create complete) and, upon receiving the notice, maintaining, at the first entity, information (e.g., sequence number, metadata) associated with the stateful operation. The method also includes, upon receiving notice that the second entity lost state before the stateful operation attained a second state, selectively providing to the second entity a portion of the information maintained at the first entity, and upon receiving notice from the second entity that the stateful operation has attained the second state, terminating maintaining the information associated with the stateful operation. | 04-11-2013 |
20130086121 | PATH LOOKUP IN A HIERARCHICAL FILE SYSTEM - Apparatus and methods are provided herein for path lookup in a hierarchical file system. An inode associated with a requested object is identified. The inode may be organized in an inode table and identified in the table using an inode number. Ancestry information and size constraint information may also be available for the inode. An inode chain associated with the pathway is identified based, at least in part, on ancestry information associated with the inode for the requested object. A size constraint analysis is performed for the requested object. The size altering operation is selectively performed based on the size constraint analysis. | 04-04-2013 |
20130083421 | HEAD ROTATOR ASSEMBLY FOR TAPE DRIVE - A head rotator assembly ( | 04-04-2013 |
20130080406 | MULTI-TIER BANDWIDTH-CENTRIC DEDUPLICATION - Example apparatus and methods concern multi-tier bandwidth-centric deduplication. One example apparatus supports inline bandwidth-centric deduplication with post-processing space-centric deduplication to improve inline bandwidth-centric deduplication and thereby reduce bandwidth requirements. One example method may include determining whether a bandwidth-centric deduplication device can satisfy a deduplication request associated with a data communication and then deciding whether to engage a space-centric deduplication device to co-operate in attempting to satisfy the request. More generally, the method includes controlling a first deduplication device to participate in bandwidth reduction and selectively controlling a second deduplication device to also participate in the bandwidth reduction. | 03-28-2013 |
20130077187 | Adaptive Correction of Symmetrical and Asymmetrical Saturation in Magnetic Recording Devices - In one embodiment, a read channel comprises: a preprocessor for receiving a first signal and producing a second signal from the first signal using current values of a positive coefficient, a zero coefficient, and a negative coefficient; an interpolator for producing a third signal based on the second signal; and a slicer for producing a fourth signal from the third signal by estimating a level for the third signal. The fourth signal is at one of three levels consisting of a positive level, a zero level, and a negative level. For every n first signals received by the preprocessor, the current value of one of the positive coefficient, the zero coefficient, and the negative coefficient is adjusted depending on which of the three levels the fourth signal is at. | 03-28-2013 |
20130073804 | PREVENTING READ WHILE WRITING OCCURRENCES - Example apparatus and methods concern controlling a computer to prevent read while writing occurrences in direct output. One example method includes identifying a non-conformance between a block of data intended to be output using direct output and a desired direct output block. Conventionally, the non-conformance would cause the computer to perform a read operation to provide additional data suitable for conforming the block of data to the desired direct output block. Once the method has identified the non-conformance, the method may prevent the computer from performing the read operation. The method may also control the computer to perform an additional output operation to make the block of data appear to conform to the desired direct output block. The additional output operation will be performed without performing a read operation. In one embodiment, the method is performed in the kernel of an operating system running on the computer. | 03-21-2013 |
20130046832 | MESSAGING POLICY CONTROLLED EMAIL DE-DUPLICATION - Example methods and apparatus associated with a messaging policy controlled email deduplication are provided. In one example a messaging policy is accessed. It is determined whether a received message complies with the policy based on rules of the messaging policy. If a message complies with the messaging policy, the message is displayed. If the message does not comply with the messaging policy, it is determined whether the message is duplicative. If the message is deemed duplicative it is not displayed. Conversely, if the message is not deemed duplicative it is displayed. | 02-21-2013 |
20130003222 | TAPE LIBRARY INITIATED ACTIONS - Example apparatus and methods concern a tape library that can initiate an action. One example method may include controlling a tape library to perform a media scanning operation associated with an extended data life management policy. The extended data life management operation may be associated with an application representation of tape drives, slots, and tapes on the tape library. The method may include determining a result of the media scanning operation and selectively controlling the tape library to either provide status or to issue a command based on the result. In one example, conventional status may be returned when a media scan operation result (e.g., tape scan) indicates the tape is fine while a command may be issued when the result indicates the tape may need to be fixed, copied, or replaced. | 01-03-2013 |
20120331086 | Clustered Storage Network - A data storage network is provided. The network includes a client connected to the data storage network; a plurality nodes on the data storage network, wherein each data node has two or more RAID controllers, wherein a first RAID controller of a first node is configured to receive a data storage request from the client and to generate RAID parity data on a data set received from the client, and to store all of the generated RAID parity data on a single node of the plurality of nodes. | 12-27-2012 |
20120331021 | Synthetic View - One example method presents a synthetic view of data stored by a shared device file system. The synthetic view provides a “fictional” single namespace for data stored by the shared device file system. The method includes accepting a command to access data stored by the shared device file system. The command may be native to a user requesting the access. The command addresses the data stored by the shared device file system using the single namespace provided by the synthetic view. The method includes creating a replacement command(s) for accessing data stored by the shared device file system using one or more actual namespaces different from the single fictional namespace provided by the synthetic view. With the replacement command(s) prepared, the method proceeds to access data stored by the shared device file system using the replacement command(s). | 12-27-2012 |
20120310999 | Adapting A Timer Bounded Arbitration Protocol - Example apparatus, methods, and computers prevent a split brain scenario in a pair of high availability servers by maintaining single writer access to a resource. One example method includes monitoring control of an arbitration (ARB) block by an active file system manager (FSM). An active file system portmapper (FSMPM) simultaneously requests permission from a standby FSM to restart a dead-man timer. The active FSM attempts to maintain control of the ARB block before expiration of the dead-man timer. If the active FSM is unable to maintain control of the ARB block before expiration of the dead-man timer, a hardware reset of an apparatus running the active FSM is forced. Therefore, the active FSMPM and standby FSM negotiate for additional time to maintain control of the ARB block to maintain single writer access and avoid unnecessary hardware resets. | 12-06-2012 |
20120278806 | DATA CONTROL SYSTEM FOR VIRTUAL ENVIRONMENT - Embodiments disclosed herein provide systems, methods, and computer readable media for controlling data in a virtual environment. In a particular embodiment, a method of operating a data control system comprises providing a file system interface to a virtual machine environment, wherein the virtual machine environment comprises a plurality of data volumes. The method further provides receiving a request to import a target data volume into the virtual machine environment and transferring the target data volume into the virtual machine environment. | 11-01-2012 |
20120254264 | Network-Attachable, File-Accessible Storage Drive - Storage drive logic and a standalone tape file structure are described. File transfer logic transfers file data to and from a network according to a first protocol. Media access logic accesses a sequential-access storage medium associated with the drive according to a second protocol. Media management logic translates file-based commands received from the network according to the first protocol into sequential-access device commands according to the second protocol. The device commands control accessing of data by the drive. The storage medium may be a magnetic tape including a data region for storing data in a file format, and a table of contents (TOC) region for storing a table of contents that indexes the locations of files within the data region. | 10-04-2012 |
20120243118 | Methods, Systems and Apparatus for Reducing the Effects of Tape Dimensional Stability - A method, system, apparatus, and computer readable medium storing instructions for recording data tracks and a method and system for reading data tracks. For recording data tracks, virtual boundary of a first data track recorded on the storage medium is determined. The recording element is positioned based on the determined virtual boundary of the first track and a second data track is recorded by the positioned recording element. For reading data tracks, a first virtual boundary of a first data track and a second virtual boundary of the first data track are determined and a reading element is positioned at a center of the first data track based on the determined virtual boundaries. In the system of reading recorded data tracks, a number of forward reading elements and backward reading elements are provided. The forward reading elements have different pitches. | 09-27-2012 |
20120239630 | FILE REPAIR - Example methods, and apparatus concern file repair. One example method includes storing a file in a file store and also parsing the file into a set of constituent data blocks. The method includes selectively storing, in a data store, unique data blocks from the set of constituent data blocks. The method includes maintaining, in a combination of the file store and the data store, a threshold number of copies of data blocks. The method also includes maintaining a data structure that stores data for locating the file in the file store and that stores data for recreating the file from data blocks. The method also includes maintaining a data structure that stores data for locating multiple copies of data found in members of the set of constituent data blocks. Files can be repaired using data blocks parsed from stored files or using data blocks stored as data blocks. | 09-20-2012 |
20120233135 | SAMPLING BASED DATA DE-DUPLICATION - Example apparatus, methods, and computers perform sampling based data de-duplication. One example method controls a data de-duplication computer to compute a sampling sequence for a sub-block of data and to use the sampling sequence to locate a stored sub-block known to the data de-duplication computer. Upon finding a stored sub-block to compare to, the method includes controlling the data de-duplication computer to determine a degree of similarity (e.g., duplicate, very similar, somewhat similar, very dissimilar, completely dissimilar, x % similar) between the sub-block and the stored sub-block and to control whether and how the sub-block is stored and/or transmitted based on the degree of similarity. The degree of similarity can also control whether and how the data de-duplication computer updates a dedupe data structure(s) that stores information for finding groups of similarity sampling sequence related sub-blocks. | 09-13-2012 |
20120226755 | Reducing Messaging in a Client-Server System - A detection that a client-server system, which is operating in a first state mode, has switched from a first use case to a second use case for accessing a property of an object associated with a server. The first state mode during the first use case reduces messaging in the client-server system as compared to using a second state mode. A determination is performed as to whether using the second state mode during the second use case would reduce messaging in the system as compared to using the first state mode. The client-server system is transitioned to the second state mode, if operating in the second state mode would reduce messaging in the client-server system as compared to operating in the first state mode for the second use case. | 09-06-2012 |
20120226741 | CLOUD-BASED DE-DUPLICATION - Example apparatus, methods, and computers support cloud-based de-duplication with transport layer transparency. One example apparatus includes a processor, a memory, and an interface to connect the processor, memory, and a set of logics. The set of logics includes a hardware identification logic for identifying networking hardware used by or available to the apparatus to interact with a cloud-based computing environment and a protocol identification logic for identifying a protocol used by or available to the apparatus to communicate messages for the cloud-based computing environment through the networking hardware. The set of logics also includes a de-duplication preparation logic for preparing a message to carry data to be de-duplicated and metadata concerning the data to be de-duplicated. The message is to be provided to the cloud-based computing environment through the networking hardware according to the protocol. | 09-06-2012 |
20120221819 | DATA ALLOCATION SYSTEM - A method of operating a data control system to copy a volume of data from a primary storage system to a secondary storage system comprises receiving an instruction to copy the volume of data, wherein the volume of data comprises a plurality of data blocks, in response to the instruction, determining if at least a data block of the plurality of data blocks requires copying to the secondary storage system, if the data block requires copying to the secondary storage system, then reading the data block from memory in the primary storage system and transferring the data block for writing to memory in the secondary storage system, and if the data block does not require copying, then transferring a synthetic block for writing to the memory in the secondary storage system. | 08-30-2012 |
20120221807 | DATA CONTROL SYSTEMS FOR VIRTUAL ENVIRONMENTS - A data control system comprises a communication interface, a processing system, and a storage system. The communication interface is configured to receive a request to retrieve data from a primary storage volume that includes a secondary storage volume. The storage system is configured to store the primary storage volume that includes the secondary storage volume. The processing system is configured to identify changed segments of a plurality of segments in the primary storage volume and identify allocated segments of the changed segments. The communication interface is further configured to transfer the allocated segments in response to the request. | 08-30-2012 |
20120197851 | CONSIDERING MULTIPLE LOOKUPS IN BLOOM FILTER DECISION MAKING - Example apparatus, methods, and computers are configured to consider multiple lookups when making decisions concerning whether a probabilistic data structure indicates that an item is or is not present. One example method includes receiving a first response from a probabilistic data structure, where the first response indicates whether a first element is a member of a set of stored elements. The example method also includes receiving a set of second responses from the probabilistic data structure, where the set of second responses indicate whether members of a corresponding set of second elements are members of the set of stored elements. The method then provides a present/absent signal concerning whether the first element is a member of the set of stored elements. The signal is computed as a function of the first response and the set of second responses rather than merely as a function of the first response. | 08-02-2012 |
20120150954 | ADAPTIVE COLLABORATIVE DE-DUPLICATION - Example apparatus, methods, and computers support adaptive, collaborative de-duplication. One example method includes controlling a computer to compute a correlation between a processing state associated with collaborative data deduplication performed by the computer and an environmental state associated with a collaborative data deduplication environment with which the computer interacts. With the correlation in hand, the method then includes controlling the computer to adapt how the computer participates in collaborative data deduplication based, at least in part, on the correlation. The adaptations can include changing what processing is performed on the computer and what data is stored on the computer. | 06-14-2012 |
20120150823 | DE-DUPLICATION INDEXING - Example apparatus, methods, and computers support data de-duplication indexing. One example apparatus includes a processor, a memory, and an interface to connect the processor, memory, and a set of logics. The set of logics includes an establishment logic to instantiate one-to-many de-duplication data structures, a manipulation logic to update the de-dupe data structure(s), a key logic to generate a key from a block of data to be de-duplicated, and a similarity logic to make a similarity determination for the block. The similarity determination identifies the block as a unique block, a duplicate block, or a block that meets a similarity threshold with respect to a stored de-duplicated block accessible through the dedupe data structure. The similarity determination involves comparing the block to be de-duplicated to a stored block available to the apparatus using a byte-by-byte approach, a hash approach, a delta hash approach and/or a sampling sequence approach. | 06-14-2012 |
20120089574 | PRIORITIZING DATA DEDUPLICATION - An example method includes controlling a data de-duplication apparatus to arrange a de-duplication schedule based on the presence or absence of a replication indicator in an item to be de-duplicated. The method also includes selectively controlling the de-duplication schedule based on a replication priority. In one embodiment, the method includes, upon determining that a chunk of data is associated with a replication indicator, controlling the data de-duplication apparatus to schedule the chunk for de-duplication ahead of chunks not associated with a replication indicator. In one embodiment, the method also includes, upon determining that the chunk is associated with a replication priority, controlling the data de-duplication apparatus to schedule the chunk for de-duplication ahead of chunks of data not associated with a replication priority. The schedule location is based, at least in part, on the replication priority. The method also includes controlling de-duplication order based on the schedule. | 04-12-2012 |
20120087031 | ADAPTIVE DISTURBANCE COMPENSATION WITH MULTI-RATE SYNCHRONIZED SAMPLING - An apparatus and method for providing adaptive disturbance compensation with multi-rate synchronized sampling is disclosed herein. The dynamic disturbance occurring in a media drive during read/write operations is attenuated using the adaptive disturbance compensation scheme. A plurality of compensation filters are used, each of the compensation filters configured to attenuate a disturbance caused by a particular source within the media drive. Each of the compensation filters is computed based on a sampling rate relevant to the respective disturbances. | 04-12-2012 |
20120076244 | WAVEFORM INTERPOLATOR ARCHITECTURE FOR ACCURATE TIMING RECOVERY BASED ON UP-SAMPLING TECHNIQUE - In one embodiment, an interpolator-based timing recovery system improves accuracy by calculating additional sampled signals of a digital signal and generating an interpolation based on the additional sampled signals and the digital signal, while employing a parallel architecture to maintain system clock frequency and a pipeline architecture to minimize sampled data memory requirement. | 03-29-2012 |
20120047324 | SEQUENTIAL ACCESS STORAGE AND DATA DE-DUPLICATION - An example method includes determining a configuration of two or more partitions for a sequential access medium. At least one partition stores data de-duplication data structures while at least one other partition stores a repository of unique data blocks associated with the data structures. The method also includes controlling a data de-duplication computer to configure the sequential access medium according to the configuration. The method includes producing an output sequence for writing the data structures and a set of unique data blocks associated with the set of data structures to the sequential access medium as configured with the two or more partitions. One embodiment includes controlling a data de-duplication computer to write the data de-duplication data structures and the set of unique data blocks to the sequential access medium according to the output sequence. | 02-23-2012 |
20120016882 | DELTA CHUNKS AND DELTA HASHES - Example apparatus, methods, and computers control processing delta chunks with delta hashes. One example method includes computing a first hash for a chunk for which a duplicate determination is to be made. The first hash is suitable for making the duplicate chunk determination. The method also includes computing a delta hash for the chunk. The delta hash is suitable for making a delta chunk determination. The method controls a de-duplication logic to process the chunk as a duplicate upon determining that the first hash matches a stored first hash. The method controls the de-duplication logic to process the chunk as a delta chunk upon determining that the first hash does not match a stored first hash and that the delta hash matches a stored delta hash. Processing a chunk as a delta chunk may include storing a reference to a stored chunk and storing delta hash information. | 01-19-2012 |
20120016852 | COLLABORATIVE, DISTRIBUTED, DATA DE-DUPLICATION - Example apparatus, methods, and computers participate in collaborative, distributed, data de-duplication. One example method includes initializing a layered parser in a first node in a collaborative distributed data de-duplication (CDDD) topology with a first set of de-duplication control parameters. After transmitting some information to another node in the CDDD topology, the method includes selectively reconfiguring the layered parser in response to feedback acquired from the second node in the CDDD topology. The feedback concerns the data provided by the layered parser. | 01-19-2012 |
20120016848 | ESTABLISHING PARSE SCOPE - Example apparatus, methods, and computers control establishing a shared parse scope between two computers that intend to be involved in a shared de-duplication action. One example method includes, upon determining that a first de-duplication logic and a second de-duplication logic are to participate in a shared de-duplication action for an object, controlling the first de-duplication logic to establish a shared parse scope with the second de-duplication logic. Establishing the shared parse scope may include negotiations between the computers, where the negotiations transfer dialect information. The dialect information may take the form of rules. The method may also include persisting the shared parse scope. | 01-19-2012 |
20110314222 | Clustered Storage Network - A data storage network is provided. The network includes a client connected to the data storage network; a plurality nodes on the data storage network, wherein each data node has two or more RAID controllers, wherein a first RAID controller of a first node is configured to receive a data storage request from the client and to generate RAID parity data on a data set received from the client, and to store all of the generated RAID parity data on a single node of the plurality of nodes. | 12-22-2011 |
20110307683 | INDEX ENTRY EVICTION - Systems, methods embodied on computer-readable media, and other embodiments associated with index entry eviction are described. One example method includes selecting an index entry for eviction from a bucket of index entries based on a time value, a utility value, and a precedence value. A precedence value may be a value associated with an index entry that is static over time. Additionally, results of a function that compares two precedence values may be static over time. The example method may also include providing an index entry identifier that identifies the index entry. | 12-15-2011 |
20110302341 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 12-08-2011 |
20110289281 | Policy Based Data Retrieval Performance for Deduplicated Data - A method that includes, by one or more computer systems, determining a data retrieval rate policy based on at least one data retrieval rate parameter. The method also includes determining at least one storage subsystem performance parameter. The method further includes determining a fragmentation value based on the data retrieval rate policy and the at least one storage subsystem performance parameter. The method additionally includes determining a storage subsystem fragmentation of a first data object. The storage subsystem fragmentation includes fragmenting the first data object into a plurality of first data object fragments. The method also includes deduplicating the first data object based on the fragmentation value and the storage subsystem fragmentation. | 11-24-2011 |
20110258398 | METHODS AND SYSTEMS FOR VECTORED DATA DE-DUPLICATION - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a vectoring method for data de-duplication wherein a stream of data is divided into “data sets” or blocks. For each block, a code, such as a hash or cyclic redundancy code may be calculated and stored. The first block of the set may be written normally and its address and hash can be stored and noted. Subsequent block hashes may be compared with previously written block hashes. | 10-20-2011 |
20110238635 | Combining Hash-Based Duplication with Sub-Block Differencing to Deduplicate Data - In one embodiment, a method includes accessing data; partitioning the data into sub-blocks; determining whether a first one of the sub-blocks is identical to another one of the sub-blocks or similar to another one of the sub-blocks; if the first one of the sub-blocks is identical to another one of the sub-blocks, applying by the one or more computer systems hash-based deduplication to storage of the first one of the sub-blocks with respect to the other one of the sub-blocks; and, if the first one of the sub-blocks is similar to another one of the sub-blocks, applying by the one or more computer systems sub-block differencing to storage of the first one of the sub-blocks with respect to the other one of the sub-blocks. | 09-29-2011 |
20110228421 | Detecting LTO Servo Patterns on Perpendicular Recorded Media - In one embodiment, a servo processing circuit comprises a correlation filter and a Lagrange interpolator peak detector coupled to the correlation filter. The correlation filter is operable to receive a first signal as input; correlate the first signal with a reference signal; and produce a second signal as output, wherein the second signal indicates a correlation between the first signal and the reference signal. The Lagrange interpolator peak detector is operable to receive the second signal as input; detect one or more peaks in the second signal; and produce a third signal as output, wherein the third signal indicates one or more peak locations of the peaks in the second signal. | 09-22-2011 |
20110225385 | CONTROLLING CONFIGURABLE VARIABLE DATA REDUCTION - Example apparatus, methods, and computers control configurable, variable data reduction. One example method includes identifying data reduction controlling attributes in an object to be data reduced by a configurable variable data reducer. The attributes provide information upon which decisions concerning whether and/or how to data reduce the object can be based. The example method also includes controlling a configurable variable data reducer to selectively data reduce the object based, at least in part, on the data reduction controlling attributes. The control exercised can determine whether, where, when, and/or how data reduction will proceed. | 09-15-2011 |
20110218972 | DATA REDUCTION INDEXING - Example apparatus, methods, data structures, and computers control indexing to facilitate duplicate determinations. One example method includes indexing, in a global index, a unique chunk processed by a data de-duplicator. Indexing the unique chunk in the global index can include updating an expedited data structure associated with the global index. The example method can also include selectively indexing, in a temporal index, a relationship chunk processed by the data de-duplicator. The relationship chunk is a chunk that is related to another chunk processed by the data de-duplicator by sequence, storage location, and/or similarity hash value. Indexing the relationship chunk in the temporal index can also include updating one or more expedited data structures associated with the temporal index. The expedited data structures and indexes can then be consulted to resolve a duplicate determination being made by a data reducer. | 09-08-2011 |
20110213917 | Methods and Systems for Improving Read Performance in Data De-Duplication Storage - The present invention is directed toward methods and systems for data de-duplication. More particularly, in various embodiments, the present invention provides systems and methods for data de-duplication that may utilize a data de-duplication system that retrieves data from a data storage device in an order based on the location of blocks on the data storage device. Some embodiments break a data stream into multiple blocks of data and store the blocks of data on a data storage device of a data de-duplication system, wherein a code representing a redundant block of data is stored in place of the block of data. A location for each block of data may be stored. Additionally, the blocks may be read in an order that is determined based on the location of the blocks. | 09-01-2011 |
20110182391 | Adaptive Filter Using Shifted Reverse Interpolation - In one embodiment, an apparatus comprises an adaptive filter, a timing recovery unit, and a reverse interpolation filter. The adaptive filter has adaptive filter coefficients that are adjusted based on a first error signal at a first sample rate and filters a first signal at the first sample rate to obtain a second signal at the first sample rate. The timing recovery unit interpolates the second signal at the first sample rate to obtain a third signal at a second sample rate; and estimates a partial response signal at the second sample rate corresponding to the third signal. The a reverse interpolation filter interpolates a second error signal at the first sample rate, which is a difference between the third signal and the partial response signal, to obtain the first error signal at the first sample rate for feeding back to the adaptive filter. | 07-28-2011 |
20110154052 | MEDIA-FOLLOWING ENCRYPTION POLICY CONTROL - Example articles of manufacture, methods, and systems facilitate having encryption policy follow an article of manufacture like a tape cartridge. One example article of manufacture includes a media portion (e.g., tape) and a non-media portion (e.g., housing). The media portion is configured to store machine readable information. The article of manufacture could be a tape, a disk, a memory, and other computer readable media. The article of manufacture also includes an encryption policy information indicator. The encryption policy information indicator can be configured to store information that controls an encryption policy associated with the article of manufacture. Therefore, encryption policy can, for example, follow a tape cartridge rather than be resident solely in a controlling application (e.g., tape library). | 06-23-2011 |
20110153972 | FREE SPACE DEFRAGMENTION IN EXTENT BASED FILE SYSTEM - Example apparatus, methods, data structures, and computers defragment unallocated space in a storage associated with an extent based file system. One example method locates a first unallocated area having a desired size and a desired location to receive an extent from a first end of an allocated area in the storage. The example method then swaps the extent from the first end of the allocated area with the first unallocated area. The example method also locates a second unallocated area having a desired size and a desired location to receive an extent from a second opposite end of the allocated area in the storage. The example method then swaps the extent from the second end of the allocated area with the second unallocated area. The example method may continue to swap until no more suitable unallocated regions are available to receive an extent sliced off an allocated area. | 06-23-2011 |
20110149438 | UNIQUE MEDIA IDENTIFIER - An apparatus and method for providing a unique identifier for data storage media is disclosed herein. The servo track of the data storage media is encoded one or more times with media manufacturer's data. The media manufacturer's data includes a variety of information including the unique identifier. The unique identifier differentiates among different media manufacturers, different spools or pancakes from which a given media comes from, and different media within a given spool or pancake. The unique identifier scheme is configured to facilitate standardization among media manufacturers while providing error correction and flexibility for future changes in format. | 06-23-2011 |
20110145324 | REDUCING MESSAGING IN A CLIENT-SERVER SYSTEM - A detection that a client-server system, which is operating in a first state mode, has switched from a first use case to a second use case for accessing a property of an object associated with a server. The first state mode during the first use case reduces messaging in the client-server system as compared to using a second state mode. A determination is performed as to whether using the second state mode during the second use case would reduce messaging in the system as compared to using the first state mode. The client-server system is transitioned to the second state mode, if operating in the second state mode would reduce messaging in the client-server system as compared to operating in the first state mode for the second use case. | 06-16-2011 |
20110113228 | Rules-Based, Mode-Driven Manager for Timer Bounded Arbitration Protocol Based Resource Control - An example apparatus includes a processor, a memory, and an interface that connects the processor, the memory, and a set of components. The set of components includes a first component configured to acquire a mode from members of an HA cluster and a second component configured to enforce mode pairing rules for members of the HA cluster. Once the desired mode pairing has been determined, a third component takes actions configured to either achieve the mode pairing according to rules for members of the HA cluster or to selectively force a hardware reset of one or more members of the HA cluster upon determining that a split brain scenario is possible based, at least in part, on the mode of the members of the HA cluster. The example apparatus therefore implements a rules-based manager for timer bounded arbitration protocol based resource control. | 05-12-2011 |
20110113066 | ADAPTING A TIMER BOUNDED ARBITRATION PROTOCOL - Example apparatus, methods, and computers prevent a split brain scenario in a pair of high availability servers by maintaining single writer access to a resource. One example method includes monitoring control of an arbitration (ARB) block by an active file system manager (FSM). An active file system portmapper (FSMPM) simultaneously requests permission from a standby FSM to restart a dead-man timer. The active FSM attempts to maintain control of the ARB block before expiration of the dead-man timer. If the active FSM is unable to maintain control of the ARB block before expiration of the dead-man timer, a hardware reset of an apparatus running the active FSM is forced. Therefore, the active FSMPM and standby FSM negotiate for additional time to maintain control of the ARB block to maintain single writer access and avoid unnecessary hardware resets. | 05-12-2011 |
20110113017 | Supporting Internal Consistency Checking with Consistency Coded Journal File Entries - Example systems, methods, and apparatus economize generating and processing incremental journal files while maintaining internal consistency. One example method determines whether a sequence number associated with a first inode description in a disaster recovery (DR) journal entry is out of sequence with a second corresponding inode description in a DR metadump. The example method controls a DR journal process to provide a file system inconsistency signal and to suspend application of the DR journal entry to the DR metadump. The suspending and signaling can occur upon determining that a first access time independent verification code computed from the first inode description does not match a second access time independent verification code computed from the second inode description. | 05-12-2011 |
20110107139 | TIMER BOUNDED ARBITRATION PROTOCOL FOR RESOURCE CONTROL - Example apparatus, methods, and computers prevent a split brain scenario in a pair of high availability servers by maintaining single writer access to a resource by controlling the resource according to a timer bounded arbitration protocol that controls self-termination of a writer process. One example method includes monitoring control of an arbitration (ARB) block by an active file system manager (FSM) and selectively causing a selection of a standby metadata controller (MDC) when control of the ARB block does not satisfy the timer bounded ARB protocol. The example method also includes selectively forcing a hardware reset of an apparatus running the active FSM and selectively establishing an FSM on a selected redundant MDC as a replacement FSM. | 05-05-2011 |
20110093664 | DATA DE-DUPLICATION BY PREDICTING THE LOCATIONS OF SUB-BLOCKS WITHIN THE REPOSITORY - A computer-enabled method of storing an input dataset in a storage medium includes storing a copy for each of a plurality of repeatable blocks of data in an input dataset in a storage medium. The process further includes finding a location in the storage medium of the copy of a block of data in the input dataset. Finding the location includes determining a most likely location in the storage medium of the copy of the block of data from one or more blocks of data preceding the block of data based on statistics of past stored data. Finding the location further includes if the determined most likely location contains a block of data that matches with the actual block of data, retrieving the location in the storage medium of the copy of the block of data. The process also includes storing the location of the copy of the block of data. | 04-21-2011 |
20100318698 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 12-16-2010 |
20100312959 | SPATIAL LOCALITY OF FILE SYSTEM BLOCK ALLOCATIONS FOR RELATED ITEMS - Example apparatus, methods, and computers facilitate improving spatial locality of file system block allocations for related items. One example method includes accessing a block allocation request that is configured to control a computer to allocate a block of storage available on a storage device and, upon determining that the block allocation request includes a session key that identifies a session associated with a block reservation pool, controlling the computer to allocate a block of storage from the block reservation pool to satisfy the block allocation request rather than allocating a block of storage from generally available blocks of storage. The block reservation pool includes blocks of storage on the storage device that satisfy a spatial locality relationship determined by a pre-read technique associated with the storage device. | 12-09-2010 |
20100309583 | Methods, Systems and Apparatus for Reducing the Effects of Tape Dimensional Stability - A method, system, apparatus, and computer readable medium storing instructions for recording data tracks and a method and system for reading data tracks. For recording data tracks, virtual boundary of a first data track recorded on the storage medium is determined. The recording element is positioned based on the determined virtual boundary of the first track and a second data track is recorded by the positioned recording element. For reading data tracks, a first virtual boundary of a first data track and a second virtual boundary of the first data track are determined and a reading element is positioned at a center of the first data track based on the determined virtual boundaries. In the system of reading recorded data tracks, a number of forward reading elements and backward reading elements are provided. The forward reading elements have different pitches. | 12-09-2010 |
20100228916 | Apparatus & Method for Virtualizing Data Storage Media, Such as for Use in a Data Storage Library Providing Resource Virtualization - A system and method for use in an automated data storage cartridge library defines cartridges for use with an external host computer (“open” cartridges), and cartridges for use only internal to the library (“closed” cartridges). Cartridges may be “virtualized” by storing data from them on disk or closed cartridges, and then “realized” by writing data to physical cartridges. Virtual cartridges may be logically exported from one library to another. When new cartridges are introduced to the library, they may be designated with one of multiple designations or uses. | 09-09-2010 |
20100028110 | HIGH DENSITY VARIABLE ACCESS STORAGE LIBRARY - A media storage library for storing a plurality of media cartridges is provided. The media storage library includes at least one media transfer mechanism, and a plurality of storage panels for storing media cartridges, including at least a first movable storage panel. The first storage panel is movable from the first position to a second position, and each storage panel of the plurality of movable storage panels includes at least a first access face for the at least one media transfer mechanism to access the media cartridges. An access space is formed between the first movable storage panel and a second storage panel, and the at least one media transfer mechanism is able to access the media cartridges via the access space and the first access face. | 02-04-2010 |
20100014179 | Media library system and method for monitoring changes in inventory of media cartridges - A method for monitoring changes in an inventory of media cartridges in a media library includes the steps of determining with a controller that the inventory of media cartridges in the media library has changed, and asynchronously reporting with the controller the specific change in inventory of media cartridges that has occurred in the media library. The method can also include the step of determining whether the change in inventory included an increase or a decrease in the quantity of media cartridges within the media library, or whether the change in inventory did not include an increase or decrease in the quantity of media cartridges within the media library. Further, the method can also include the step of determining whether the change in inventory of media cartridges is required to be reported. A media library system includes a media library having a plurality of media cartridges, and a controller that determines a change in an inventory of media cartridges in the media library. In certain embodiments, the controller asynchronously and selectively reports a specific change in the inventory of media cartridges in the media library. | 01-21-2010 |
20090313646 | Data Storage Media Accessibility in a Media Library - An apparatus and method for increasing data storage capacity of a media library is disclosed herein. The elevation or vertical clearance of a tray assembly included in the library is configured to permit access of data storage media stored near the floor of the library. | 12-17-2009 |
20090271556 | CONNECTING MULTIPLE PERIPHERAL INTERFACES INTO ONE ATTACHMENT POINT - An interconnect apparatus is provided for connecting at least one peripheral device to a multi-channel interface. The apparatus includes an incoming connector having a first incoming channel connector and at least one second incoming channel connector, wherein the incoming connector is operable to detachably connect to an interface cable, a first outgoing connector having a first outgoing channel connector, at least one second outgoing connector having at least one second outgoing channel connector, and routing logic operable to propagate a first signal between the first incoming channel connector and the first outgoing channel connector, and to propagate at least one second signal between the at least one second incoming channel connector and the at least one second outgoing channel connector; wherein a position of the first outgoing channel connector in the first outgoing connector corresponds to a position of the at least one second outgoing channel connector in the at least one second outgoing connector. | 10-29-2009 |
20090222232 | REEL MOTOR TORQUE CALIBRATION DURING TAPE MOTION - Methods, apparatuses and systems directed to calculation of a reel motor torque constant (“K | 09-03-2009 |
20090213488 | METHODS, SYSTEMS AND APPARATUS FOR REDUCING THE EFFECTS OF TAPE DIMENSIONAL STABILITY - A method, system, apparatus, and computer readable medium storing instructions for recording data tracks and a method and system for reading data tracks. For recording data tracks, virtual boundary of a first data track recorded on the storage medium is determined. The recording element is positioned based on the determined virtual boundary of the first track and a second data track is recorded by the positioned recording element. For reading data tracks, a first virtual boundary of a first data track and a second virtual boundary of the first data track are determined and a reading element is positioned at a center of the first data track based on the determined virtual boundaries. In the system of reading recorded data tracks, a number of forward reading elements and backward reading elements are provided. The forward reading elements have different pitches. | 08-27-2009 |
20090144498 | DATA STORAGE SYSTEM FOR STORING DATA IN DIFFERENT TYPES OF DATA STORAGE MEDIA - A data storage system for storing data includes a data storage medium and a data interface that communicates with the data storage medium. The data interface is configured to place data into a logical data capsule having a defined size, where the data placed into the logical data capsule can occupy less than the defined size of the logical data capsule. In the data storage system, the logical data capsule is moved as a whole between the data storage medium and the data interface. Additionally, when any data in the logical data capsule is read or modified, all of the data in the logical data capsule is read or modified as a whole. | 06-04-2009 |
20090040643 | METHOD AND APPARATUS FOR WRITING TIMING BASED SERVO TRACKS ON MAGNETIC TAPE USING COMPLEMENTARY SERVO WRITER PAIRS - Method and apparatus for writing timing based (servo) tracks on magnetic recording tape using complementary servo writer pairs. A magnetic tape intended to store, for instance, computer data conventionally contains servo tracks in addition to the data tracks. Typically many servo tracks and data tracks are arranged laterally across the width of the tape. The adjacent servo tracks (bands) here are complementary in terms of the orientation of their stripes and are written (recorded) by a complementary arranged servo writer pair. This advantageously reduces the position error signal by a substantial amount, even to nearly zero. In one version the servo writers are straight in configuration and in another version they are curved or chevron shape. These complementary servo writer pairs write adjacent servo bands. This takes advantage of the fact that typical servo technology, for instance in the LTO tape format, uses two servo heads, a top and bottom servo head, and averages the position error signal of the top and bottom servo read heads in the tape drive to determine the position error. By writing the servo tracks as described here, this error as written-in is substantially reduced. This is because the top and bottom servo sensors interpret the complementary aspect as being position error signal error in opposite directions, which thereby cancels out. | 02-12-2009 |
20090006679 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 01-01-2009 |
20090001207 | Continuous micro-groove roller technology - A guide roller mounted in a tape drive for reducing mechanical noise associated with travel of a magnetic tape medium in a tape path is provided. The guide roller includes a cylindrical barrel, which is rotatably coupled to a tape drive. The cylindrical barrel rotates as the magnetic tape medium is guided by the guide roller as it travels through the tape path. A continuous helical groove forms a spiral on the outer surface of the cylindrical barrel along the length of the cylindrical barrel. The continuous helical groove forms contiguous rings of the spiral. | 01-01-2009 |
20090001206 | Tape guider for limiting lateral tape motion - A magnetic tape guiding apparatus located in a position associated with a head element for guiding magnetic tape in a tape drive is provided. A body of the tape guiding apparatus has a first end and a second end and sides. There are at least two protrusions of the tape guiding apparatus associated with one side of the body. A magnetic tape medium passes between the at least two protrusions and the head element such that the at least two protrusions and the head element contact the magnetic tape medium. A first flange is associated with the first end of the body, and a second flange is associated with the second end of the body. Each flange projects beyond the at least two protrusions. Both flanges limit movement of the magnetic tape medium. | 01-01-2009 |
20080316072 | Method for Constructing RLL Codes of Arbitrary Rate - The claimed embodiments provide methods, apparatuses and systems directed to run-length limited (RLL) coding of data. In one implementation, concatenatable RLL codes with run lengths of zeroes not exceeding k are constructed for any rate N/(N+1) where N≦2 | 12-25-2008 |
20080266705 | Servo error detection and compensation utilizing virtual data tracking servo methods - A method for detecting errors in a servo system of a magnetic storage drive includes writing a plurality of data tracks at a pitch, detecting a position of an edge of at least two of the data tracks under control of a servo system (e.g., an optical or magnetic servo system), and determining an error in the servo system based on the detected positions and known pitch of the data tracks. Differences in the track edge positions of the tracks from the positions at which they were written may indicate errors in the optical servo system (e.g., non-linearity errors, as well as other errors such as electrical, temperature, or the like). Determined errors may be stored with a look-up table of positional errors or used to normalize a position algorithm associated with the servo system. | 10-30-2008 |
20080247076 | Tape tension sensor - A tension sensor within a tape drive for measuring tension of a magnetic tape medium is provided. The tension sensor comprises a guide pin connected to a top plate for guiding the magnetic tape medium; at least two flexure structures connected to the top plate and a base such that the at least two flexure structures are in a parallel configuration; and at least one magnetic field density sensor associated with the guide pin for detecting lateral motion of the guide pin. In some embodiments, the guide pin is a tape guiding roller. | 10-09-2008 |
20080239544 | Intelligent tape drive assembly that diagnoses and repairs its own tape drives - A tape drive assembly ( | 10-02-2008 |
20080235561 | Methodology and apparatus for soft-information detection and LDPC decoding on an ISI channel - A system comprising a plurality of channel detectors (CDs) receiving quantized and equalized ISI channel information indicative of an LDPC codeword. The channel information is split for input to the CDs, such that each CD receives channel information indicative of a portion of the LDPC codeword. Each CD outputs at least first soft information for bits of the codeword portion of that CD. The first soft information for the codeword is received by an LDPC decoder, which uses the soft information to produce a user bit sequence and second soft information about the user bit sequence. The system can cause the second soft information to be input to the plurality of CDs, such that iterative processing can occur for the codeword. Other aspects include a system providing clocking of one or more CDs at a frequency selected to balance codeword throughput of the CDs with codeword throughput of an LDPC decoder clocked by a second clock, and methods according to each system. | 09-25-2008 |
20080235559 | Strengthening parity check bit protection for array-like LDPC codes - An LDPC parity check matrix originated using an array code provides more protection against errors for parity bits 1 through 1-p, which can, during decoding, allow faster convergence to a higher LLR value for those bits as well as higher overall reliability of other parity check bits. The present parity check matrix provides an upper triangular sub-matrix (H | 09-25-2008 |
20080198503 | AUTO-SERVO TAPE SYSTEM AND ASSOCIATED RECORDING HEAD - A recording head comprises a first tape-head contact area including a first write element and a first read element, which itself may include an MR sensor element. The first read element is laterally offset as to the first write element, and no portion of the first read element lies in a region laterally overlapped by the first write element. A second tape-head contact area includes a second write element and a second read element, which also may include an MR sensor element. The second read element is laterally offset as to the second write element, and no portion of the second read element lies in a region laterally overlapped by the second write element. The first read and write elements of the first tape-head contact area are aligned with the second write and read elements of the second tape-head contact area so that an end portion of the second write element lies in a region that laterally overlaps only an end portion of the first write element. Data track widths less than one micron are achievable with this head design. | 08-21-2008 |
20080197036 | Protective cartridge case having shock absorbing features - A protective cartridge case for housing a storage cartridge having at least one reel is provided. The protective cartridge case includes a housing for enclosing the storage cartridge therein, the housing including a top portion and a bottom portion having opposing major inner surfaces in a closed position. A first absorbing member is disposed adjacent the inner surface of the top portion and a second absorbing member is disposed adjacent the inner surface of the bottom portion. The protective case further including a first absorbing member disposed adjacent the inner surface of the top portion and a second absorbing member disposed adjacent the inner surface of the bottom portion for absorbing forces on the cartridge during a shock event. Additional absorbing members may be disposed adjacent minor side surfaces of the housing for cushioning minor side surfaces of the cartridge. | 08-21-2008 |
20080197032 | Protective cartridge case having zero-tension latch - A protective cartridge case for housing a storage cartridge is provided. The protective cartridge case includes a housing having a top and bottom portion for enclosing a storage cartridge, the top and bottom portions having major surfaces that oppose each other along a vertical direction, and a latch member for selectively securing the top portion and bottom portion in a closed position. The latch member secures the top and bottom portion in a closed position with substantially zero tension on the latch member in the horizontal direction. | 08-21-2008 |