Patent application number | Description | Published |
20140059306 | STORAGE MANAGEMENT IN A VIRTUAL ENVIRONMENT - A method, computer program product, and system for managing storage space in a virtualized computing environment. The method includes a computer determining, by one or more computer processors, that a virtual computer system has reached a threshold level of minimum available storage space. The storage space of the computer system is searched for an inactive snapshot file. When the inactive snapshot file is located, the inactive snapshot file is moved to a secondary storage. | 02-27-2014 |
20150363271 | RESTORING DATA IN A HIERARCHICAL STORAGE MANAGEMENT SYSTEM - The present disclosure provides a hierarchical storage management system for storing data. A first controller receives a request to migrate a data item to a first storage tier. The data item is associated with at least an initial object ID. The first controller, in response to the request, generates a new object ID and identifies a first record in a data structure, wherein the initial object ID is identical to an object ID of the first record and to a parent object ID of the first record. The first controller replaces the object ID of the first record with the new object ID, creates in the data structure a new record that is associated with the data item, sets an object ID of the new record and a parent object ID of the new record to the initial object ID, and stores the data item to the first storage tier. | 12-17-2015 |
20160110258 | DATA BLOCK BASED BACKUP - The present invention relates to a data block based backup method for a data management system. The data management system comprises a file system that controls access by a database application to at least one database container file stored the data management system. The data management system further comprises a backup client that is connected to a remote backup server, whereby a first version of the database container file is saved in the backup server and a first inode containing information on data blocks of the first version of the database container file. The method may include creating a change tracking table for at least the database container file and adding an entry in the change tracking table, whereby the entry has an indication of the respective data block in association with an information indicating the type of the access. | 04-21-2016 |
Patent application number | Description | Published |
20140074787 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO BACKUP DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to backup files in the file system. A point-in-time backup is performed of files in the file system as of a point-in-time. A metadata image includes information on files and directories in the file system as of the point-in-time. Files in the point-in-time backup are backed up to a backup storage. A backup database has records on the files backed-up from the file system. Each record in the backup database has a unique identifier for each backed-up file and a location of the backed-up file in the backup storage. An archive instance is generated including a copy of the database records for the files in the point-in-time backup. The metadata image and the archive instance are associated for the point-in-time backup. | 03-13-2014 |
20140074790 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO RESTORE DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to restore files in the file system. A metadata image of the file system for a point-in-time backup as of a point-in-time includes information on files and directories in the file system as of the point-in-time and an archive instance including a copy of database records in the backup database for the files in the point-in-time backup. A restore request is received. A file representation is created of each file to restore in the directory structure of the file system from the metadata image, wherein at least one of the created file representations indicates that the file is stored off-line and has an external identifier used to access information on the file in the database records in the archive instance for the point-in-time backup. | 03-13-2014 |
20140195575 | DATA FILE HANDLING IN A NETWORK ENVIRONMENT AND INDEPENDENT FILE SERVER - According to one embodiment, an independent file server connected to a wide area network (WAN) includes local file storage, a file system comprising information about directory structures, path, and file names of other file systems of other file servers connected to the WAN, and a deduplication module configured to communicate with other deduplication modules of other file servers connected to the WAN, perform data deduplication of data objects stored locally in the local file storage, and create and maintain a deduplication table mapping data chunks of locally stored data objects to identification characteristics and storage location in the local file storage, and construction plans of data files including locations of data chunks within the data files. Other systems, methods, and computer program products are presented according to more embodiments. | 07-10-2014 |
20150074065 | Data Access in a Storage Infrastructure - The present invention relates to a method for data access in a storage infrastructure. The storage infrastructure comprises a host system connected to at least a first storage system and a second storage system. The first storage system receives, from the host system, a write request for storing a data chunk, the write request is indicative of a first identifier of the data chunk. The first storage system calculates a hash value of the received data chunk using a hash function. The first storage system determines a first storage location in the first storage system of the data chunk and sends a write message including the hash value, the first identifier and the first storage location to the de-duplication module. The de-duplication module determines whether the hash value exists in the data structure. | 03-12-2015 |
20160048430 | METHOD OF OPERATING A SHARED NOTHING CLUSTER SYSTEM - Operating a shared nothing cluster system (SNCS) in order to perform a backup of a data element. The SNCS includes at least a first and a second storage node connected via a first network of the SNCS. The first and second storage nodes are configured to store a first set and a second set of blocks, respectively, in which the first and second set of blocks form a single data element. A backup server is connected to the first and second storage nodes, and the backup server includes a backup information table. The first and second storage nodes are configured to act as backup clients in a client-server configuration involving the backup server, upon receiving at the first and the second storage nodes a request to backup the data element. For each node of the first and second storage nodes, the node identifies one or more block sequences of consecutive blocks in a set of blocks of the data element stored in the node. The node sends the identified one or more block sequences to the backup server, and generates backup information. | 02-18-2016 |
20160055065 | DATA PROCESSING APPARATUS AND METHOD - Operating a data processing and storage apparatus to perform continuous backup monitoring for a collection of stored file system objects. In response to changes respective to a number of the file system objects, a set of Data Management Application Program Interface (DMAPI) events is created. For each of the events, accessory file system object information relative to a file system object subject to the change is determined. The events are grouped into an event group and a unique group identifier and an overall group size count are assigned to each of the events included in the event group. The events are sent together with the respective accessory file system object information, the respective group identifier and the respective group size to a number of backup clients registered as applications. The backup clients are to process the events together with the respective accessory file system object information, the respective group identifier and the respective group size into a number of backup requests. | 02-25-2016 |