Patent application number | Description | Published |
20080244154 | Method for Controlling Access to Data of a Tape Data Storage Medium - A method, system, and machine-readable medium for controlling access to data of a tape data storage medium are disclosed. In accordance with one embodiment, a method is provided which comprises conveying data access control metadata from a tape cartridge comprising a tape data storage medium to a host, receiving decrypted metadata from the host, comparing a checksum value determined utilizing the decrypted metadata with checksum data stored within the tape cartridge; and processing a request to access the tape data storage medium received from the host based upon a comparison of the checksum value and checksum data. In the described method embodiment, the data access control metadata comprises encrypted metadata corresponding to a data storage parameter, where data is stored within the tape data storage medium utilizing the data storage parameter and the decrypted metadata is generated by the host utilizing the encrypted metadata. | 10-02-2008 |
20080256422 | Apparatus for Providing Error Correction Capability to Longitudinal Position Data - A method and apparatus for providing error correction capability to longitudinal position data are disclosed. Initially, data are encoded via a set of even LPOS words and a set of odd LPOS words. The encoded data are then decoded by generating a set of syndrome bits for each of the LPOS words. A determination is then made as to whether or not there is an error within one of the LPOS words based on its corresponding syndrome bits. | 10-16-2008 |
20080256423 | Apparatus for Providing Error Correction Capability to Longitudinal Position Data - A method and apparatus for providing error correction capability to longitudinal position data are disclosed. Initially, data are encoded via a set of even LPOS words and a set of odd LPOS words. The encoded data are then decoded by generating a set of syndrome bits for each of the LPOS words. A determination is then made as to whether or not there is an error within one of the LPOS words based on its corresponding syndrome bits. | 10-16-2008 |
20080259484 | READ CHANNEL APPARATUS FOR ASYNCHRONOUS SAMPLING AND SYNCHRONOUS EQUALIZATION - A read channel and method using that read channel are disclosed. The read channel comprises an analog to digital converter which asynchronously samples at a fixed rate an analog signal formed by reading a data track, where that data track was written to a data storage medium at a symbol rate and an interpolator interconnected with the analog to digital converter. The read channel further comprises a fractionally-spaced equalizer, where the interpolator provides an interpolated signal to the fractionally-spaced equalizer at an interpolation rate, where that interpolation rate is greater than the symbol rate. The fractionally-spaced equalizer forms a synchronous equalized signal. The read channel further comprises a gain control module interconnected with the fractionally-spaced equalizer, and a sequence detector interconnected with the gain control module. | 10-23-2008 |
20080273696 | Use of Indirect Data Keys for Encrypted Tape Cartridges - A method, system and program are provided for enabling selective access to multiple users' encrypted data in a single storage cartridge. A unique, derived key is generated for each user's data by performing cryptographic operations on a combination of a common base key and metadata related to the data to be encrypted (e.g. its total block count). The base data key is wrapped with one or more encryption keys to form one or more encryption encapsulated data keys (EEDKs). The base key and the derived key are wrapped to create a session encrypted data key (SEDK), which along with the EEDKs, are conveyed to the tape drive, where the SEDK is decrypted. The EEDKs are then stored in one or more places on the storage cartridge. The base key and the derived key are used to encrypt a predetermined user's data, with the derived key stored on the cartridge with the encrypted data. The encrypted data may be subsequently decrypted by retrieving the EEDK and decrypting it with a decryption key to extract the base data key. The extracted base data key can then be used with other information to calculate the derived key. Once calculated, the derived key is used to decrypt its associated encrypted data. | 11-06-2008 |
20080273697 | Use of Indirect Data Keys for Encrypted Tape Cartridges - A method, system and program are provided for enabling selective access to multiple users' encrypted data in a single storage cartridge. A unique, derived key is generated for each user's data by performing cryptographic operations on a combination of a common base key and metadata related to the data to be encrypted (e.g. its total block count). The base data key is wrapped with one or more encryption keys to form one or more encryption encapsulated data keys (EEDKs). The base key and the derived key are wrapped to create a session encrypted data key (SEDK), which along with the EEDKs, are conveyed to the tape drive, where the SEDK is decrypted. The EEDKs are then stored in one or more places on the storage cartridge. The base key and the derived key are used to encrypt a predetermined user's data, with the derived key stored on the cartridge with the encrypted data. The encrypted data may be subsequently decrypted by retrieving the EEDK and decrypting it with a decryption key to extract the base data key. The extracted base data key can then be used with other information to calculate the derived key. Once calculated, the derived key is used to decrypt its associated encrypted data. | 11-06-2008 |
20090030652 | Monitoring and Reporting Normalized Device System Performance - Apparatus and computer program products are provided to monitor and report performance data of a device such as a data storage drive. A plurality of quantitative values are obtained from feedback and measurement mechanisms in a data storage device of a first model during operation of the storage device. The plurality of quantitative values are normalized. Then, one or more qualitative values are generated from one or more normalized quantitative values and evaluated against corresponding baseline performance values established for the first model. | 01-29-2009 |
20100265612 | LATERAL PARTITIONING FOR A SHINGLED TAPE FORMAT - Various embodiments for writing data in a tape medium having wraps by a tape drive are provided. The tape drive allocates the wraps in a shingled data band between two or more data partitions. A set of contiguous wraps is allocated to one data partition of the two or more data partitions. An additional set of contiguous wraps is allocated to an additional data partition of the two or more data partitions. A minimum buffer is retained between the set and the additional set of contiguous wraps of at least one wrap per direction written within at least one data band shared between the one and the additional data partitions such that the one and the additional data partitions may be written to by the tape drive independently of each other. | 10-21-2010 |
20110178994 | CONTACTLESS IC MEMORY ON REMOVEABLE MEDIA - Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, an index of a plurality of files to be recorded on a storage media of the data storage cartridge is parsed with a table of contents (TOC) profile file to build a table of contents (TOC) specific to an owning application of the plurality of files. The TOC is written to the contactless IC memory. | 07-21-2011 |
20110197100 | NON-VOLATILE REDUNDANT VERIFIABLE INDICATION OF DATA STORAGE STATUS - A non-volatile redundant verifiable indication of data storage status is provided with respect to data storage operations conducted with respect to removable data storage media, and store the indication with an auxiliary non-volatile memory of the data storage media, such that the indication stays with the media. At least one state value indicating the status of the data storage operation is written to one page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the one page of the auxiliary non-volatile memory; and the same state value is written to a second page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the second page of the auxiliary non-volatile memory. The redundancy checks indicate the validity of the state values. | 08-11-2011 |
20110219184 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING HIGH AVAILABILITY METADATA ABOUT DATA - In one embodiment, a method includes receiving metadata corresponding to data on a removable storage device/medium, storing the metadata to a metadata repository that is not on the removable storage device/medium, associating an identifier with the stored metadata (the identifier corresponding to the removable storage medium/device), and storing the identifier to the metadata repository. According to another embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code comprises computer readable program code configured to: receive metadata corresponding to data on a removable storage device/medium, store the metadata to a metadata repository, associate an identifier corresponding to the removable storage device/medium with the stored metadata, and store the identifier to the metadata repository. Other methods, systems, and devices are presented as well. | 09-08-2011 |
20110219199 | VOLUME COHERENCY VERIFICATION FOR SEQUENTIAL-ACCESS STORAGE MEDIA - A method for determining volume coherency is disclosed herein. Upon completing a first write job to a volume partition, the method makes a copy of a volume change reference (VCR) value associated with the volume. The VCR value is configured to change in a non-repeating manner each time content on the volume is modified. Prior to initiating a second write job to the volume partition, the method retrieves the copy and compares the copy to the VCR value. If the copy matches the VCR value, the method determines that a logical object on the partition was not modified between the first and second write jobs. If the copy does not match the VCR value, the method determines that the logical object on the partition was modified between the first and second write jobs. A corresponding system and computer program product are also disclosed herein. | 09-08-2011 |
20120078931 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for associating each instance of the file on the first and second storage tier with a unique program identifier (UPI); logic for receiving a request to access the file or instance thereof from a user in a group of users; logic for searching for a UPI associated with an instance of the file that exists on the first storage tier; and logic for providing the user requesting access to the file with remote access to the instance of the file on the first storage tier. Additional systems, methods, and computer program products are also presented. | 03-29-2012 |
20120079184 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for receiving a request to access the file or instance thereof from a user in a group of users; logic for providing the user requesting access to the file with remote access to an instance of the file on the first storage tier that is not being used by any other user in the group of users; logic for setting an ownership status of the instance of the file on the first storage tier to owned by the user requesting access to the file; and logic for setting an ownership status of an unused instance of the file on the second storage tier from owned by the user requesting access to the file to unowned or owned by a second user which previously owned the instance of the file on the first storage tier. Additional systems, methods, and computer program products are also presented. | 03-29-2012 |
20120079191 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for determining when to migrate an instance of the file associated with a first user and stored on the first storage tier to the second storage tier; logic for searching for an instance of the file or portion thereof on the second storage tier that is not associated with any user; logic for associating the instance of the file or portion thereof on the second storage tier with the first user; and logic for disassociating the instance of the file on the first storage tier from the first user. Additional systems, methods, and computer program products are also presented. | 03-29-2012 |
20120079192 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for determining an ownership status for each instance of the file in the storage system, wherein the ownership status includes owned and unowned; logic for determining a location of each instance of the file in the storage system; logic for determining whether each instance of the file in the first storage tier is being accessed or not being accessed; logic for assigning each instance of the file to one of a plurality of indices using the determined ownership status, location, and whether the instance is being accessed; logic for receiving a request to access the file or instance thereof from a user; logic for selecting an instance of the file based on an assignment of the instance of the file to one of the indices; and logic for providing the user with access to the selected instance of the file or copy thereof. Additional systems, methods, and computer program products are also presented. | 03-29-2012 |
20120079223 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes a first storage tier; an intermediate storage tier; a second storage tier; logic for storing instances of a file in the first storage tier, the intermediate storage tier, and the second storage tier; logic for determining which of a plurality of instances of the file in the first storage tier are to be migrated to the second storage tier; logic for copying one instance of the file from the first storage tier to the intermediate storage tier; and logic for copying the instance of the file from the intermediate storage tier to the second storage tier for creating an instance of the file on the second storage tier for each instance of the file on the first storage tier that is to be migrated to the second storage tier. Additional systems, methods, and computer program products are also presented. | 03-29-2012 |
20120233133 | CONTACTLESS IC MEMORY ON REMOVEABLE MEDIA - Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, an index of a plurality of files to be recorded on a storage media of the data storage cartridge is parsed with a table of contents (TOC) profile file to build a table of contents (TOC) specific to an owning application of the plurality of files. The TOC is written to the contactless IC memory. | 09-13-2012 |
20120239691 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA - According to one embodiment, a method includes storing instances of a file in a first storage tier and a second storage tier of a storage system; associating each instance of the file on the first and second storage tier with a unique program identifier (UPI); receiving a request to access the file or instance thereof from a user in a group of users; searching for a UPI associated with an instance of the file that exists on the first storage tier; and providing the user requesting access to the file with remote access to the instance of the file on the first storage tier. Additional methods are also presented. | 09-20-2012 |
20130021178 | USING VARIABLE LENGTH CODE TABLES TO COMPRESS AN INPUT DATA STREAM TO A COMPRESSED OUTPUT DATA STREAM - Provided are a computer program product, system, method, and data structure for using variable length code tables to compress an input data stream to a compressed output data stream. A determination is made as to whether a number of at least two consecutive data units in the input data stream match the number of consecutive data units in a history buffer of previously received data units in the input data stream. If so, a copy pointer symbol is generated including data indicating a copy pointer symbol referencing previously received data units in the history buffer and indicating the determined number of consecutive data units. A determination is made of a relative displacement count in the history buffer at which the number of matching consecutive data units start. A determination is made from a variable length code table an encoding of the relative displacement count in the history buffer. | 01-24-2013 |
20130021179 | USING VARIABLE LENGTH CODE TABLES TO COMPRESS AN INPUT DATA STREAM TO A COMPRESSED OUTPUT DATA STREAM - Provided are a computer program product, system, method, and data structure for using variable length code tables to compress an input data stream to a compressed output data stream. If a number of consecutive data units in the input data stream match the number of consecutive data units in a history buffer of previously received data units in the input data stream, a copy pointer symbol is generated indicating the copy pointer symbol referencing previously received data units in the history buffer and indicating a location of a start of the consecutive data units in the history buffer. A determination is made from a variable length code table of an encoding of the number. Indication is made in the generated copy pointer symbol the determined encoding of the number and the copy pointer symbol is outputted in the compressed output data stream. | 01-24-2013 |
20130141256 | USING VARIABLE ENCODINGS TO COMPRESS AN INPUT DATA STREAM TO A COMPRESSED OUTPUT DATA STREAM - Provided are a computer program product, system, method, and data structure for compressing an input data stream. A determination is made of consecutive data units in the input data stream that match consecutive data units in a history buffer. A copy pointer symbol indicates a copy pointer symbol referencing previously received data units in the history buffer. A determination is made of a relative displacement count in the history buffer at which the number of matching consecutive data units start. A determination is made of a range of relative displacement counts comprising one of a plurality of ranges of displacement counts including the determined relative displacement count. A determination is made of the encoding scheme associated with the determined range. An encoding of the relative displacement count is determined from the determined encoding scheme. The determined encoding of the relative displacement count is indicated in the copy pointer. | 06-06-2013 |
20130162453 | USING VARIABLE LENGTH ENCODING TO COMPRESS AN INPUT DATA STREAM TO A COMPRESSED OUTPUT DATA STREAM - Provided are a computer program product, system, method, and data structure for using variable length code tables to compress an input data stream to a compressed output data stream. If a number of consecutive data units in the input data stream match the number of consecutive data units in a history buffer of previously received data units in the input data stream, a copy pointer symbol is generated indicating the copy pointer symbol referencing previously received data units in the history buffer and indicating a location of a start of the consecutive data units in the history buffer. A determination is made of an encoding of the number. Indication is made in the generated copy pointer symbol the determined encoding of the number and the copy pointer symbol is outputted in the compressed output data stream. | 06-27-2013 |
20130169453 | GENERATING A CODE ALPHABET OF SYMBOLS TO GENERATE CODEWORDS FOR WORDS USED WITH A PROGRAM - Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet is generated having a first number of symbols that provide variable length codings of the words. The symbols in the first code alphabet are merged into a second number of groups of the symbols in the first code alphabet, where the second number is less than the first number. A second code alphabet is generated having the second number of symbols, wherein a second average codeword length of the codewords produced using the symbols in the second code alphabet is smaller than the codeword length (b) of the words, and wherein the second code alphabet comprises the code alphabet used by the deployed program. | 07-04-2013 |
20130326138 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system according to one embodiment includes logic integrated with and/or executable by a hardware processor, the logic being configured to: determine an ownership status for each of a plurality of instances of a file in a first storage tier and in a second storage tier of the storage system; determine locations of the instances of the file in the storage system; determine whether the instances of the file in the first storage tier are being accessed or not being accessed; and assign each of the instances of the file to one of a plurality of indices using the determined ownership status, location, and whether the instances are being accessed. | 12-05-2013 |
20130326144 | METHODS FOR MANAGING OWNERSHIP OF REDUNDANT DATA AND SYSTEMS THEREOF - A storage system, according to one embodiment, includes a processor and logic integrated with and/or executable by the processor. The logic is configured to: search for an instance of a file or portion thereof on a second storage tier; at least one of: associate the instance of the file or portion thereof on the second storage tier with a first user when the instance of the file or portion thereof is not associated with any user, and replicate the instance of the file or portion thereof on the second storage tier and associate the replicated instance of the file or portion thereof on the second storage tier with the first user; and disassociate an instance of the file on a first storage tier from the first user. | 12-05-2013 |
20130342374 | GENERATING A CODE ALPHABET OF SYMBOLS TO GENERATE CODEWORDS FOR WORDS USED WITH A PROGRAM - Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet has a first number of symbols that provide variable length codings of the words. A second code alphabet is generated having a second number of symbols formed by merging the symbols in the first code alphabet, wherein the second code alphabet comprises the code alphabet used by the deployed program. | 12-26-2013 |
20140142744 | DATA STORAGE DRIVE WITH TARGET OF OPPORTUNITY RECOGNITION - A method according to one embodiment includes receiving a command to mount a tape cartridge in a tape drive, mounting the tape cartridge in the tape drive, and determining that at least one special operation can be performed by the tape drive after mounting of the tape cartridge thereby. A first notification that the tape drive is in a not ready state is sent in response to determining the at least one special operation can be performed. The at least one special operation is performed. A second notification that the tape drive is in a ready state or an error state is sent after performing the at least one special operation. | 05-22-2014 |
20140250129 | MANAGING OWNERSHIP OF REDUNDANT DATA - According to one embodiment, a method includes storing instances of a file in a first storage tier and a second storage tier of a storage system, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier. Each instance of the file on the first and second storage tier is associated with a unique program identifier (UPI). A request to access the file or instance thereof is received from a user in a group of users, and a UPI associated with an instance of the file that exists on the first storage tier is searched for. Remote access to the instance of the file on the first storage tier is provided to the user requesting access to the file. Additional embodiments are also presented. | 09-04-2014 |
20150042495 | USING VARIABLE ENCODINGS TO COMPRESS AN INPUT DATA STREAM TO A COMPRESSED OUTPUT DATA STREAM - Provided are a computer program product, system, method, and data structure for compressing an input data stream. A determination is made of consecutive data units in the input data stream that match consecutive data units in a history buffer. A copy pointer symbol indicates a copy pointer symbol referencing previously received data units in the history buffer. A determination is made of a relative displacement count in the history buffer at which the number of matching consecutive data units start. A determination is made of a range of relative displacement counts comprising one of a plurality of ranges of displacement counts including the determined relative displacement count. A determination is made of the encoding scheme associated with the determined range. An encoding of the relative displacement count is determined from the determined encoding scheme. The determined encoding of the relative displacement count is indicated in the copy pointer. | 02-12-2015 |