Class / Patent application number | Description | Number of patent applications / Date published |
707655000 | Database mirroring | 52 |
20100161560 | METHOD AND APPARATUS FOR SEAMLESS MANAGEMENT FOR DISASTER RECOVERY - A method, apparatus, article of manufacture, and system are presented for establishing redundant computer resources. According to one embodiment, in a system including a plurality of processor devices and a plurality of storage devices, the processor devices, the storage devices and the management server being connected via a network, the method comprises storing device information relating to the processor devices and the storage devices and topology information relating to topology of the network, identifying at least one primary computer resource, selecting at least one secondary computer resource suitable to serve as a redundant resource corresponding to the at least one primary computer resource based on the device information and the topology information, and assigning the at least one secondary computer resource as a redundant resource corresponding to the at least one primary computer resource. | 06-24-2010 |
20100169282 | ACQUISITION AND WRITE VALIDATION OF DATA OF A NETWORKED HOST NODE TO PERFORM SECONDARY STORAGE - Methods and a system to acquire and perform write validation of data generated by one or more networked host nodes to perform secondary storage are disclosed. According to one embodiment, a method to passively acquire and perform write validation of data generated by one or more networked host nodes to perform secondary storage in a SAN-based data storage and recovery network includes generating data to store in primary storage. The method further includes generating metadata describing the data generated to store in primary storage, sending the data and metadata to a primary SAN storage device, acquiring passive access to data traveling a data path between a generating node and the primary SAN storage device, the data mirrored over an access line to a secondary storage server. The method further includes receiving, at the secondary storage server, an exact copy of a data stream that passes a splitter. | 07-01-2010 |
20100174684 | SYSTEM FOR AUTOMATICALLY SHADOWING ENCRYPTED DATA AND FILE DIRECTORY STRUCTURES FOR A PLURALITY OF NETWORK-CONNECTED COMPUTERS USING A NETWORK-ATTACHED MEMORY WITH SINGLE INSTANCE STORAGE - The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed data. The data is encrypted by the monitored computer system using a cryptokey, and the data file is processed using a hash function prior to encryption, so the contents of this file are uniquely identified. Thus, the encrypted file is stored in its encrypted form and the hash index is used to identify the encrypted file. A “data de-duplication” process avoids storing multiple copies of the same files by identifying instances of duplication via the hash index. Files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained. | 07-08-2010 |
20100205153 | Data System Architecture to Analyze Distributed Data Sets - Methods, computer-readable media, and apparatuses support data transfer through electronic and secured channels, in which manual intervention for collecting, collating, or posting reporting results is reduced. Consistent data sets over different data sources may be collected for different accounts. Data entries in a data set may be further audited in order to verify data integrity. A data source may be backed up through a local (distributed) network of administrator machines so that the data may be analyzed at another data site without possibly corrupting the original data. Reports may also be generated using standard business rules across accounts. Moreover, custom reports are supported allowing multiple (as determined by entry criteria) degrees of freedom. | 08-12-2010 |
20100211548 | TENANT MANAGEMENT OF A HOSTED MULTI-TENANT APPLICATION - A hosted multi-tenant application is provided that permits a tenant to self-manage aspects of the operation of the application. A tenant may be permitted to upgrade the multi-tenant application on-demand or according to a schedule, to place the multi-tenant application into a read-only mode of operation, to create a shadow copy of their unshared organization database, to merge changes to a shadow copy into a master version of the unshared organization database, to create and revert to snapshots of an unshared organization database, and to perform other functions. A computing architecture that utilizes site-wide server computers and scale groups may be utilized to implement this functionality. | 08-19-2010 |
20110071984 | Area-Specific Reload of Database - A hierarchical database stores data for the database in a plurality of areas. A disclosed technique allows reorganization of one or more areas of the database without stopping the entire database. The areas to be reorganized are first stopped, then the areas are unloaded, reorganized, and reloaded, before restarting the reorganized areas. In-memory control blocks for the areas are updated to indicate to the database software that the areas have been reorganized, without stopping the entire database. | 03-24-2011 |
20110087636 | MODELING DISTRIBUTION AND FAILOVER DATABASE CONNECTIVITY BEHAVIOR - Aspects of the subject matter described herein relate to database connectivity behavior. In aspects, an entity seeking to access data that is replicated via instances of a database follows a plan. The plan provides information as to which instance(s) the entity is to attempt to access the data from. The plan may include connection data that indicates parameters the entity is to use in connecting to the instance(s). The plan may also indicate one or more other instances from which the entity may attempt to access the data if the client is not able to access the data from initial instance(s). | 04-14-2011 |
20110137868 | STORAGE SWITCH AND STORAGE AREA SIZE CHANGE METHOD - A storage switch includes: a section | 06-09-2011 |
20110145201 | DATABASE MIRRORING - Methods, systems, and computer-readable media of database mirroring are disclosed. A particular method includes initiating a transaction that modifies one or more pages of a first database. Each page includes a structure modification operation (SMO) bit and initiating the transaction includes setting the SMO bit of each of the one or more pages to a first value. One or more first records are created at a transaction log of the first database. The transaction log is useable at a second database to mirror the transaction. Each first record indicates the setting of a SMO bit of a particular page to the first value. The database transaction is performed, and the SMO bit of each of the one or more pages is set to a second value. One or more second records are created at the transaction log, each second record indicating the setting of a SMO bit of a particular page to the second value. The method includes committing the transaction. | 06-16-2011 |
20120059798 | MIRRORING FILE DATA - The present invention extends to methods, systems, and computer program products for mirroring file data. Generally, high availability and disaster recovery (“HADRON”) is achieved within a database management system by detecting which parts of a file have changed and sending the changed parts to secondaries. Adjacent or partially overlapping parts of a file can coalesce to form larger chunks of changed data. Coalescing reduces the overall number of chunks that are tracked. | 03-08-2012 |
20120166395 | CONTROLLING MIRRORING OF TABLES BASED ON ACCESS PREDICTION - A system for managing a plurality of storage devices that are configured to store a database. The system includes an access instruction acquiring unit configured for acquiring an access instruction to access the database. The system also includes a predicting unit configured for predicting a table to be accessed in response to the acquired access instruction. The system further includes a relocation unit configured for mirroring the table predicted by the predicting unit, the mirroring between the plurality of storage devices. | 06-28-2012 |
20120284234 | LIVE MIGRATION OF VIRTUAL MACHINE PERSISTENT DATA USING MIRRORED INPUT-OUTPUT OPERATIONS - Persistent data, such as disks associated with virtual machines, are migrated between and across data stores using mirrored input-output operations (IOs). The migration technique employs a data mover to copy selected regions of the virtual machine disk to a target data store while the virtual machine is executing. If the virtual machine issues a write IO, the write IO is selectively mirrored on the target data store depending on whether or not the write IO is in a region of the virtual machine disk that has already been copied. | 11-08-2012 |
20130013566 | STORAGE GROUP SYNCHRONIZATION IN DATA REPLICATION ENVIRONMENTS - A method for dynamically synchronizing storage groups in a data replication environment is disclosed. In one embodiment, such a method includes detecting the addition of a volume to a storage group of a primary storage system. The method then automatically performs the following in response to detecting the addition of the volume: (1) adds a corresponding volume to a corresponding storage group on a secondary storage system; (2) creates a mirroring relationship between the volume added to the primary storage system and the volume added to the secondary storage system; and (3) adds the mirroring relationship to a mirroring session established between the storage groups on the primary and secondary storage systems. A corresponding system and computer program product are also disclosed. | 01-10-2013 |
20130036096 | MECHANISM FOR FACILITATING DYNAMIC CLONING OF DATA RECORDS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic cloning of data records in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a request for cloning of a data record. The cloning request contains instructions relating to the cloning of the data record. The method may further include examining one or more existing data records associated with the data record, and cloning, at a computing device, the data record into one or more data records based on the information contained within the cloning request and the examination of the one or more existing data records. | 02-07-2013 |
20130232121 | METHOD AND SYSTEM FOR REMOTE STORAGE OF DATA - First and second local file systems remote one from another and having a hierarchical storage structure wherein files are stored within folders within the first local file system and the second local file system. A first file in the first local file system is mirrored to a second file in the second file system. When the first file is modified the second file is updated with the modifications to the first file. When the second file is modified the first file is updated with the modifications to the second file. | 09-05-2013 |
20130246367 | POLICY-BASED MANAGEMENT OF STORAGE FUNCTIONS IN DATA REPLICATION ENVIRONMENTS - A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein. | 09-19-2013 |
20130254166 | SYSTEMS AND METHODS FOR PERFORMING REPLICATION COPY STORAGE OPERATIONS - A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item. Based on the storage policy, when a new client, sub-client, data, media or other item is received, a media agent determines whether there is a replication copy of the item. In the absence of a replication copy, one may be created. The replication copy may be provided by a third party application, or created by the client or a storage management system component. Information regarding the replication copy and its corresponding first secondary copy may be stored in a database. To optimize use of system resources, storage operations relating to the first secondary copy may be performed using the replication copy instead of the first secondary copy. | 09-26-2013 |
20130304705 | MIRROR FILE SYSTEM - A mirror file system (MFS) is a virtual file system that links two or more folders (e.g., on Windows) or directories (e.g., on UNIX) to form a mirroring pair. The folders or directories can reside on a local memory device of a computing system, on a portable memory device, or in a folder or directory shared by a remote system. A graphical user interface (GUI) or user application creates or opens a file in the Active folder, and the MFS software module creates or opens the same file in a Passive folder which is not mounted on the same mount point as the Active folder. The Active folder receives a file operation from the application of the computer directly. Once the file operation is received by the Active folder, it is automatically replicated to the Passive folder. The MFS software module provides update options of sequential, parallel synchronous and asynchronous. | 11-14-2013 |
20140214772 | Coalescing Metadata for Mirroring to a Remote Storage Node in a Cluster Storage System - Described herein are a system and method for remote mirroring/copying data and metadata sets from a local node to a remote node that reduces the number of metadata sets that are mirrored. In some embodiments, the local node may coalesce metadata sets into metadata chains, each metadata chain comprising a grouping of two or more metadata sets. In some instances, a “representative” metadata set of a metadata chain may be selected for sending to the remote node for storing, wherein the other metadata sets of the metadata chain are not sent to the remote node. In these embodiments, the selected metadata set may represent all the metadata sets in the chain and be the only metadata set in the chain that is transmitted and stored to the remote node. As such, the network congestion between the local and remote nodes may be reduced. | 07-31-2014 |
707656000 | Synchronous mirroring | 9 |
20100235326 | METHOD FOR MIRRORING A LOG FILE BY THRESHOLD DRIVEN SYNCHRONIZATION - A method for of accelerating database log hardening using specific per block data protection and damage control is provided. A per write specification is implemented to determine when database log data is mirrored synchronously or asynchronously. Synchronous minoring is performed upon reaching a predetermined threshold, based on one or more parameters such as transaction value, both individual and cumulative, and the quantity of data written since the last synchronous minoring. As data is added to the database log, it is written specifying asynchronous minoring to the primary log file. Once a threshold is met, a write specifying synchronous minoring is performed to both the primary and secondary log files, thereby hardening the log file in both primary and secondary storage subsystem. | 09-16-2010 |
20120041928 | MIRRORING DATA CHANGES IN A DATABASE SYSTEM - A method for mirroring one or more data changes from a first database server to one or more second database servers. The method includes intercepting one or more operations that make one or more changes to one or more data on the first database server. After intercepting these operations, the method merges the operations into one or more chunks, adds one or more log records having the chunks into a database log. The database log includes one or more database log blocks. The method then writes the database log blocks. | 02-16-2012 |
20120059799 | MANAGING OBJECTS FOR A DATA FILE - Managing file objects in a data storage system includes providing a plurality of metadata servers, each metadata server having information for only a subset of file objects in the storage system, each subset for each of the metadata servers being less than a total number of file objects for the system and includes providing at least one metadata location server, where an entity accessing a specific file object of the system determines which of the metadata servers contains data for the specific file object by first accessing the at least one metadata location server. Information for the subset of file objects may include a table having file identifiers and metadata location information. The metadata location information may point to data storage for a metadata object for a file. | 03-08-2012 |
20120330897 | METHOD FOR MIRRORING A LOG FILE BY THRESHOLD DRIVEN SYNCHRONIZATION - A method for of accelerating database log hardening using specific per block data protection and damage control is provided. A per write specification is implemented to determine when database log data is mirrored synchronously or asynchronously. Synchronous mirroring is performed upon reaching a predetermined threshold, based on one or more parameters such as transaction value, both individual and cumulative, and the quantity of data written since the last synchronous mirroring. As data is added to the database log, it is written specifying asynchronous mirroring to the primary log file. Once a threshold is met, a write specifying synchronous mirroring is performed to both the primary and secondary log files, thereby hardening the log file in both primary and secondary storage subsystem. | 12-27-2012 |
20130185264 | MAINTAINING A MIRRORED FILE SYSTEM FOR PERFORMING DEFRAGMENTATION - A computational device maintains logical mirroring of a first file system with a second file system. A first set of input/output (I/O) requests is satisfied from the first file system while the second file system is undergoing defragmentation. A second set of I/O requests is satisfied from the second file system while the first file system is undergoing defragmentation. | 07-18-2013 |
20130238564 | METHOD AND SYSTEM FOR SHARING REMOTE DATA - First and second local file systems remote one from another and having a hierarchical storage structure wherein files are stored within folders within the first local file system. A first file within the first local file system with an embedded link to a second file on the local system is mirrored with a third file within the second local file system. The second file is then mirrored to the second local file system and the third file comprises an embedded link to the mirrored second file on the second file system. | 09-12-2013 |
707657000 | Copy-on-write | 3 |
20100280999 | ENSURING DATA PERSISTENCE AND CONSISTENCY IN ENTERPRISE STORAGE BACKUP SYSTEMS - Ensuring data persistence and consistency in enterprise storage backup systems method and apparatus are disclosed. In one embodiment, a method includes creating a data log structure (e.g., a log file) on a storage device (e.g., a Serial ATA drive, a SCSI drive, a SAS drive, a storage are network, etc.) coupled to an application server to store a backup data generated by a filter module in a continuous backup environment and buffering the backup data generated by the filter module through a memory module that transfers the backup data to the data log structure on the storage device based on an occurrence of an event. The data log structure may be created by configuring a portion of the storage device as a dedicated resource available to the memory module to copy the backup data and the data log structure may be a file on the storage device coupled to the application server having the file system. | 11-04-2010 |
20110099151 | Saving snapshot of a knowledge base without blocking - A consistent snapshot of a large main memory knowledge base is saved to persistent storage without blocking the application for the duration of serializing and writing the knowledge base. Taking the snapshot comprises bringing the knowledge base to a consistent state (in a multithreaded application), using virtual memory facilities to obtain a copy-on-write copy of the knowledge base in memory, and using a separate thread or process to serialize the copy-on-write copy to persistent storage. | 04-28-2011 |
20160154834 | SNAPSHOTS AND THIN-PROVISIONING IN DISTRIBUTED STORAGE OVER SHARED STORAGE DEVICES | 06-02-2016 |
707658000 | Asynchronous mirroring | 7 |
20110252001 | Mirroring High Availability System and Method - Mirroring systems and techniques are provided that create a copy of a first computer system for backup, failover, or other purposes. More specifically, embodiments provide techniques and systems for creating and using a backup of a complete operational computer system, which may be kept up to date in real-time or near-real-time. The backup may be used to restore a failed system, or made accessible separately, such as by way of a virtual machine or restoration to new hardware. | 10-13-2011 |
20120150811 | Flash-copying within asynchronous mirroring environment - A first command is sent from a primary host system to a primary storage controller device, specifying that a first primary volume is to be flash-copied to a second primary volume. Flash-copying provides for completion of copying the first primary volume to the second primary volume to be signaled prior to data on the first primary volume being physically copied to the second primary volume. A first state of the first primary volume and the second primary volume is verified by the primary storage controller device to determine whether the first state permits flash-copying of the first primary volume to the second primary volume. A first query is sent from the primary storage controller device to a secondary host system, requesting whether a first secondary volume can be flash-copied to a second secondary volume. The first and second secondary volumes asynchronously mirror the first and second primary volumes, respectively. | 06-14-2012 |
20120191659 | REMOTE COPYING SYSTEM WITH CONSISTENCY GUARANTEED BETWEEN A PAIR - When plural copy groups including pairs exist, remote copying for pairs belonging to copy groups is suspended selectively on a copy group-to-copy group basis, instead of suspending remote copying in all the copy groups at once. A computer system has a host computer, plural first storage systems comprising plural first logical disks, and plural second storage systems comprising plural second logical disks. A first logical disk and a second logical disk paired with the first logical disk, and each pair belongs to either a first copy group or a second copy group. To selectively suspend remote copying on a copy group-to-copy group basis, one of the copy groups is specified first and then pairs belonging to this copy group are designated. The first storage systems comprising first logical disks of the designated pairs suspend remote copy processing for the designated pairs. | 07-26-2012 |
20130138614 | TWO-PHASE DATA LOCKING TRANSACTION PROCESSING WITH DISTRIBUTED PARTITIONS AND MIRRORING - A data transaction processing system may include: an active node and a standby node, each having multiple data partitions managed by a data engine; a deadlock manager that determines whether a deadlock has occurred in connection with a requested data transaction; and a transaction agent for managing the transaction and communications with the data engines. The transaction agent in the active node may not commit a transaction until all portions of the transaction have been successfully completed in both the active and standby nodes. | 05-30-2013 |
20130198142 | MIRRORING FILE DATA - High availability and disaster recovery can be achieved within a database management system by detecting which parts of a file have changed and sending the changed parts to secondary servers, without sending the entire file that has experienced the changes. A log cracker reads data from a transaction log that stores records from a database and a separately maintained file system. The log cracker sends mirror commands with some of the transaction log data to the file system to initiate mirroring of the data from the file system to secondary servers. The log data is then subsequently sent to the secondary servers as well, to enable identification of changed data without having to transfer the entire file that has been changed. | 08-01-2013 |
20130304706 | SYSTEMS AND METHODS FOR DISTRIBUTED STORAGE - Techniques for distributed storage using a plurality of computing devices connected to a network can include storing an electronic file in a local storage layer of one of the computing devices. The stored electronic file can be asymmetrically transmitted, in portions, over the network to other computing devices to store the file across the other computing devices in a distributed storage layer. The electronic file can be asynchronously transmitted over the network to a cloud storage layer such that the electronic file is mirrored in the cloud storage layer. The local storage layer of each computing device can store, for each electronic file stored in the distributed storage layer, metadata having pointers to locations of the portions the electronic files stored in the local storage layer and distributed storage layer. The electronic files stored in the distributed storage layer can be displayed as stored in a single logical drive. | 11-14-2013 |
20150370648 | REDUNDANT SYSTEM AND REDUNDANCY METHOD - A redundant system includes a primary system including a first node and a second node, and a secondary system including a third node and a fourth node. When the secondary system in place of the primary system operates, the fourth node executes first takeover processing or second takeover processing, the first takeover processing taking over the primary system on the basis of data update information acquired from either a second inter-system transfer path or a second intra-system transfer path, and the second takeover processing taking over the primary system on the basis of both the data update information acquired from the second inter-system transfer path and the data update information acquired from the second intra-system transfer path. | 12-24-2015 |
707659000 | Mirroring configuration and management | 14 |
20100325091 | Data Mirroring Method - A system includes a first storage unit connected to a secondary storage unit such that data written to the first storage unit is replicated on the secondary storage unit. The first storage unit in at least one embodiment includes the capability to intercept input/output instructions for routing to a buffer and/or directly to the secondary storage unit. A method for operation of a first storage unit includes intercepting a data operation from a requesting client, determining whether the data operation modifies data. When no modification of data is required, the method retrieves the requested data from the first storage unit and transmits the requested data to the requesting client. When a modification of data is required, the method performs the data operation in the first storage unit, stores the data operation in a buffer, transmits the data operation from the buffer to the second storage unit, receives a confirmation from the second storage unit is done, and deletes the data operation in the buffer. | 12-23-2010 |
20110231369 | STORAGE CONTROLLER FOR MIRRORING DATA WRITTEN TO CACHE MEMORY AREA - A first controller has a first CM area having a plurality of first sub-areas, and a second controller has a second CM area having a plurality of second sub-areas. The first controller stores first data in any of the first sub-areas, and in addition, stores a mirror of the first data (first mirror data) in any of the second sub-areas. The first controller manages a pair (an association relationship) of the storage-destination first sub-area of the first data and the storage-destination second sub-area of the first mirror data. Similarly, the second controller stores second data in any of the second sub-areas, and in addition, stores a mirror of the second data (second mirror data) in any of the first sub-areas. The second controller manages a pair (an association relationship) of the storage-destination second sub-area of the second data and the storage-destination first sub-area of the second mirror data. | 09-22-2011 |
20110295812 | TECHNIQUES FOR PRODUCING A CONSISTENT COPY OF SOURCE DATA AT A TARGET LOCATION - Described area system and computer program product for producing a point in time copy of source data. A set of records corresponding to a time ordered series of recorded file operations as applied to said source data is received. The set of records includes one or more consistency point markers, each consistency point marker indicating a point in time at which said source data is in a consistent state when a portion of said recorded file operations occurring up to said point in time is applied to said source data. The recorded file operations corresponding to said set of records are applied to said copy of the source data until a marker record corresponding to a consistency point marker is determined. Also described is a target system for producing a point in time copy of source data including a data storage device including said copy of source data and a replication service. | 12-01-2011 |
20120109896 | DATA SIGNAL MIRRORING - Methods, devices, and systems for data signal mirroring are described. One or more methods include receiving a particular data pattern on a number of data inputs/outputs of a memory component, and responsive to determining that a mirrored version of the particular data pattern is received by the memory component, configuring the number of data inputs/outputs to be mirrored. | 05-03-2012 |
20120254124 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DISASTER RECOVERY USING ASYNCHRONOUS MIRRORING - In one embodiment, a computer program product for handling a point-in-time copy (PITC) command includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code is configured to: receive a PITC command at a local site, create a data representation that represents updates to make to the at least one target volume of the local target storage location, wherein the updates correspond to changes made to at least one source volume of the local source storage location since execution of an earlier PITC command, create a source data sidefile entry for the at least one source volume, create a target data sidefile entry for the at least one target volume, execute the PITC command at the local site, and create a PITC sidefile entry for the PITC command, the PITC sidefile entry including a timestamp that indicates when the PITC command was executed. | 10-04-2012 |
20120310892 | SYSTEM AND METHOD FOR VIRTUAL CLUSTER FILE SERVER - A system for object-based data storage includes a plurality of object-based storage nodes having respective data storage devices, at least one file presentation node, a virtual cluster file server (VFS), and a scalable interconnect to couple the virtual cluster file server to the storage nodes, and to the at least one file presentation node. The VFS mirrors a same data object for a data file across the plurality of data storage devices. | 12-06-2012 |
20120330898 | AUTOMATIC DISCOVERY OF CACHE MIRROR PARTNERS IN AN N-NODE CLUSTER - Partner mirroring is provided with tray loss protection in an N node storage cluster architecture. A master proxy receives and records broadcasts of nodes in a cluster and selects mirror partners in a round robin fashion, so that even numbered nodes are mirrored with other even numbered nodes and odd numbered nodes are mirrored with other odd numbered nodes. In an N node storage cluster architecture which includes a cluster of dual controllers, tray loss protection is provided using such an odd numbered and even numbered mirror pairing process. | 12-27-2012 |
20130080394 | Data Mirroring Method - A system includes a first storage unit connected to a secondary storage unit such that data written to the first storage unit is replicated on the secondary storage unit. The first storage unit in at least one embodiment includes the capability to intercept input/output instructions for routing to a buffer and/or directly to the secondary storage unit. A method for operation of a first storage unit includes intercepting a data operation from a requesting client, determining whether the data operation modifies data. When no modification of data is required, the method retrieves the requested data from the first storage unit and transmits the requested data to the requesting client. When a modification of data is required, the method performs the data operation in the first storage unit, stores the data operation in a buffer, transmits the data operation from the buffer to the second storage unit, receives a confirmation from the second storage unit is done, and deletes the data operation in the buffer. | 03-28-2013 |
20130103646 | EFFICIENT USE OF MIRRORED STORAGE CLOUDS - For distributing data requests between data centers, a cost reduction module selects a data center from a plurality of data centers to fulfill a data operation request corresponding to mirrored data stored at the plurality of data centers. The selection is based on data center cooling efficiency factors comprising a data storage device efficiency percentage. A response module sends the data operation request to the selected data center. | 04-25-2013 |
20130166512 | METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE - This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database management application. The database management application is configured to maintain the database. The method further includes determining that a code modification has occurred to the database management application. The method further includes checking the code modification for the presence of an authorization key, and in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized. Further, the method includes quarantining the modified code in a secure storage location, and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application. | 06-27-2013 |
20130179404 | METHOD AND APPARATUS FOR SEAMLESS MANAGEMENT FOR DISASTER RECOVERY - A method, apparatus, article of manufacture, and system are presented for establishing redundant computer resources. According to one embodiment, in a system including a plurality of processor devices and a plurality of storage devices, the processor devices, the storage devices and the management server being connected via a network, the method comprises storing device information relating to the processor devices and the storage devices and topology information relating to topology of the network, identifying at least one primary computer resource, selecting at least one secondary computer resource suitable to serve as a redundant resource corresponding to the at least one primary computer resource based on the device information and the topology information, and assigning the at least one secondary computer resource as a redundant resource corresponding to the at least one primary computer resource. | 07-11-2013 |
20130262393 | Database backup without particularly specifying server - A backup policy specifies one or more given databases to be backed up. Servers dynamically host databases including the given databases. A given server from which each given database or a replica thereof is to be backed up is selected or chosen, by evaluating a predetermined backup strategy specified by the backup policy against a current state of the servers and the databases. The predetermined backup strategy governs how a given server is to be chosen from which each given database or a replica thereof is to be backed up. The backup policy does not particularly specify from which of the servers the given databases or replicas thereof are to be backed up. Each given database or a replica thereof is backed up from the given server selected or chosen for the given database. | 10-03-2013 |
20130282664 | APPARATUS AND METHOD FOR MONITORING AND AUDITING ACTIVITY OF A LEGACY ENVIRONMENT - An apparatus and a method for monitoring and auditing activity of a legacy environment. The apparatus includes an analyzer and a mirror manager. The analyzer is operative to analyze intercepted packets conveyed by entities in a network and to generate analyzed data based on information associated with at least some of the packets. The analyzed data is indicative of sessions. The mirror manager is responsive to the analyzed data for generating data representative of mirror sessions, each mirror session corresponding to a session. | 10-24-2013 |
20140330787 | NAMESPACE MIRRORING IN AN EXPANDABLE STORAGE VOLUME - Technology for maintaining a backup of namespace metadata of an expandable storage volume is disclosed. In various embodiments, the expandable storage volume backs up metadata of a namespace constituent volume of the expandable storage volume into a namespace mirror volume. The namespace constituent volume is responsible for storing the metadata for data objects stored in multiple data constituent volumes of the expandable storage volume. In response to a signal indicating that the namespace constituent volume is unavailable, the namespace mirror volume replaces the role of the namespace constituent volume. The new namespace constituent volume continues to provide metadata for a data object of the data objects in response to an operation request for the data object. | 11-06-2014 |
707660000 | Mirroring optimization | 3 |
20100185587 | DATA MOVEMENT WITH REDUCED SERVICE OUTAGE - A data movement system is described herein that allows an administrator to cause data to be moved from one server to another with little or no service outage and in an amount of time that is proportional to the overall size of the data being moved rather than the way the data is organized. The system uses virtual hard drive technology to encapsulate the file system of a share within a single file of a host file system to allow snapshots taken at the volume level to avoid data unrelated to the share and to allow block level copy operations. The system also uses a motion process that includes steadily converging snapshots to copy data without interrupting access to the source location. The system provides tombstone notifications to clients that attempt to access the data at the source location after the data has moved. | 07-22-2010 |
20120109897 | SYSTEM AND METHOD FOR OPTIMIZING MIRROR CREATION - Embodiments of the present invention are directed to a method and system for optimizing mirror creation. The method includes receiving, within an electronic system, a request for creating a mirror of a portion of a volume and accessing a data structure comprising information about a plurality of regions of the volume. The method further includes determining a plurality of regions comprising non-zeros of the volume based on the data structure and copying only the plurality of regions comprising non-zeros to create the mirror. | 05-03-2012 |
20140289205 | DATA TRANSFER APPARATUS, SYSTEM, AND METHOD - An apparatus includes a memory, and a processor coupled to the memory. The processor is configured to determine a transfer purpose of data to be transferred from a first storage device to a second storage device via a network, and select transfer target data from data in the first storage device based on the determined transfer purpose of the data. | 09-25-2014 |