Entries |
Document | Title | Date |
20100088282 | INFORMATION PROCESSING APPARATUS, AND OPERATION METHOD OF STORAGE SYSTEM - A server apparatus performs data I/O processing on a P-VOL in response to a request from a client apparatus and includes a file system which receives data write and read requests in units of files from the client apparatus. The server apparatus stores, into a D-VOL, differential data generated by updating the P-VOL, and manages a snapshot management table wherein a block address of the D-VOL storing the acquired differential data is registered. When a remaining capacity of a storage area of the D-VOL becomes equal to or less than a predetermined threshold value, the server apparatus enables a block of the D-VOL which had stored therein the differential data on a certain predetermined file, to be used as a storage area for newly acquired differential data. | 04-08-2010 |
20100114832 | Forensic snapshot - Systems, methods, and other embodiments associated with forensic snapshots are described. One example method includes creating a snapshot of an operational data. The example method may also include creating a hash tree by hashing lowest level data blocks of the snapshot to produce lowest level hashes. Creating a hash tree may also include repeatedly growing the hash tree bottom up by selectively hashing lower level hashes into higher level hashes until a root node is produced. The example method may also include providing a forensic data associated with the hash tree, where the forensic data is used to verify the integrity of the snapshot. | 05-06-2010 |
20100174682 | Methods, Systems and Computer Program Products for Monitoring Changes to Objects on a Computer System Using Information Models and Baselines - Methods for monitoring changes in objects on a computer system include receiving a request to generate a baseline snapshot of a plurality of objects having associated object types. The object types include at least one object having an object type not managed by a file system of the computer system. Current information is obtained, responsive to the request to generate a baseline snapshot, from a plurality of data collectors to determine at least one attribute of each of the objects to define the baseline snapshot. A request for a baseline report for the objects is received. Updated information is obtained, responsive to the request for a baseline report, from the plurality of data collectors to update the at least one attribute of each of the objects. The baseline snapshot is compared to the obtained updated information to determine if any of the objects have changed. Receiving the request to generate the baseline snapshot may be preceded by generating a baseline definition query that identifies object types to be included in the generated baseline snapshot and their associated attributes and the received request to generate the baseline report includes an identification of the baseline definition query. | 07-08-2010 |
20100191707 | TECHNIQUES FOR FACILITATING COPY CREATION - Various techniques are disclosed for creating a snapshot of application data. A snapshot is taken by pausing parts of the application over time. Modifications are paused to a first part of data and the first part is copied into a snapshot. After the first part has finished copying, modifications are paused to remaining data, and the remaining data is copied. The application is unpaused. A snapshot can be taken by unpausing parts of the application over time. Modifications to data in an application are paused. A first part of data is copied, and after the first part has finished copying, modifications to the first part are unpaused. The final part of data is copied, and after the final part has finished copying, modifications to the final part are unpaused. Techniques for creating a snapshot of data residing in multiple locations are described. | 07-29-2010 |
20100211547 | File sharing system, file server, and method for managing files - In the HSM function, when supporting the file system snapshot function, a differential data volume is required for both a high-speed volume and a low-speed volume. Accordingly, when supporting the snapshot function by using a file system provided by the HSM function, a large amount of differential data volume is required. When the manager gives an instruction to acquire a snapshot, a snapshot management program executes snapshot acquisition processing to acquire a snapshot. In this processing, a snapshot reference relation building processing part copies a file storage location management table, and relates the file storage location management table to the acquired snapshot. Then, the snapshot reference relation building processing part checks a file that is migrated to a file system which does not have a differential data volume. Finally, the snapshot reference relation building processing part creates a link of the migrated file to the snapshot which is acquired previous time. | 08-19-2010 |
20100241614 | DEVICE AND METHOD FOR ENABLING LONG-LIVED SNAPSHOTS - Decreasing disk costs make it possible to take frequent snapshots of past storage system states and retain them for a long duration. Existing snapshot approaches offer no satisfactory solution to long-lived snapshots. Split snapshots are an approach that is promising because it does not disrupt the current state storage system in either the short or the long run. An unsolved problem has been how to maintain an efficient access method for long-lived split snapshots without imposing undesirable overhead on the storage system. Skippy is a new approach that inexpensively indexes long-lived snapshots in parallel with snapshot creation. An embodiment of Skippy uses append-only index data structures to optimize writes while simultaneously providing low-latency snapshot lookup. Performance evaluations of Skippy indicate that this new approach is effective and efficient. It provides close-to-optimal access to long-lived snapshots while incurring a minimal impact on the current-state storage system. | 09-23-2010 |
20100250496 | NAS SYSTEM AND REMOTE COPY METHOD - A system including: one or more file systems for storing data; a snapshot producing section for producing snapshots for the file systems based on a pre-scheduled snapshot acquisition time; a remote copy section for remote copying difference data for the snapshots based on pre-scheduled remote copy start times; and a scheduling section for re-scheduling the time of one or more of an Nth snapshot acquisition time, an Nth remote copy start time, and an (N+1)th remote copy start time, in such a manner that remote copying starting at the Nth remote copy start time finishes by the (N+1)th remote copy start time. | 09-30-2010 |
20100268689 | PROVIDING INFORMATION RELATING TO USAGE OF A SIMULATED SNAPSHOT - At least one simulated snapshot is created for a parent volume stored on a storage subsystem. A processor updates the at least one simulated snapshot in response to modification operations to the parent volume, wherein the at least one simulated snapshot stores metadata but not any prior version of data that is modified in response to the modification operations to the parent volume. The processor provides information relating to usage of the at least one simulated snapshot based on accessing the metadata of the at least one simulated snapshot. | 10-21-2010 |
20100274764 | ACCESSING SNAPSHOTS OF A TIME BASED FILE SYSTEM - A file system driver stored in a computational device receives a request to provide access to a snapshot of a rewritable file system at a selected point in time, wherein a plurality of tokens corresponding to a plurality of data units are stored in the rewritable file system, and wherein an ordering relationship is maintained among the plurality of tokens. The file system driver determines a token corresponding to the selected point in time based on the ordering relationship. A virtual subdirectory name is generated corresponding to the determined token. A virtual subdirectory is created with the generated virtual subdirectory name, wherein the virtual subdirectory is a subdirectory of a root directory. The snapshot is accessed via the subdirectory. | 10-28-2010 |
20100280996 | TRANSACTIONAL VIRTUAL DISK WITH DIFFERENTIAL SNAPSHOTS - Some embodiments provide a system that provides a virtual disk in a computer system. During operation, the system stores data for the virtual disk in a virtual disk file on the computer system. Next, the system loads a differential location data structure corresponding to a snapshot of the virtual disk into memory on the computer system and processes input/output (I/O) operations to the virtual disk using the differential location data structure and the virtual disk file. Finally, the system periodically generates a new snapshot of the virtual disk by transactionally committing changes made to the differential location data structure by the I/O operations to the virtual disk file. | 11-04-2010 |
20110004585 | SYSTEM AND METHOD FOR BACKING UP A COMPUTER SYSTEM - A backup computer storage system that protects and/or recovers data on a primary computer storage system is disclosed. The backup computer system may be used to backup databases, files, and/or applications. The backup system may be used to backup an image of the primary computer system. The backup system may also be used to backup one or more databases. The backup system may replicate an image of data that is on a primary computer system. The backup system may also be used to restore data from the backup system to the primary computer system. The backup system may restore data to a database while non-affected portions of the database are available and can be used. The backup system may record all transactions in real time without overwriting any previously stored backup data. The backup system may maintain historical and/or chronological information related to the backed up data. | 01-06-2011 |
20110060722 | CENTRALIZED MANAGEMENT MODE BACKUP DISASTER RECOVERY SYSTEM - The present invention provides a centralized management mode backup disaster recovery system, which comprises: a control console ( | 03-10-2011 |
20110071983 | SERVER IMAGE MIGRATION - A system includes a first site having a first server and a first storage system, a second site including a second server and a second storage system, and a third site coupled to the first and second sites, the third site having gold images. A method of migrating a virtual server image comprises storing a first gold image at the first site; storing a second gold image at the second site; creating a first snapshot volume at the first site based on the first gold image; sending the first gold image ID, update data of the first gold image, and address information for the update data, from the first site to the second site; creating a second snapshot volume at the second site based on the second gold image corresponding to the first gold image ID; allocating storage for storing the update data at the second site with reference to the address information; and storing the update data in the allocated storage. | 03-24-2011 |
20110078119 | VIRTUAL DISK DRIVE SYSTEM AND METHOD - A disk drive system and method capable of dynamically allocating data is provided. The disk drive system may include a RAID subsystem having a pool of storage, for example a page pool of storage that maintains a free list of RAIDs, or a matrix of disk storage blocks that maintain a null list of RAIDs, and a disk manager having at least one disk storage system controller. The RAID subsystem and disk manager dynamically allocate data across the pool of storage and a plurality of disk drives based on RAID-to-disk mapping. The RAID subsystem and disk manager determine whether additional disk drives are required, and a notification is sent if the additional disk drives are required. Dynamic data allocation and data progression allow a user to acquire a disk drive later in time when it is needed. Dynamic data allocation also allows efficient data storage of snapshots/point-in-time copies of virtual volume pool of storage, instant data replay and data instant fusion for data backup, recovery etc., remote data storage, and data progression, etc. | 03-31-2011 |
20110082836 | STORAGE REPLICATION SYSTEMS AND METHODS - Systems and methods for information storage replication are presented. In one embodiment, a namespace conversion process is performed. Node information regarding a file systems operation change is received. A changed node to pathname object conversion process is performed. An unchanged node to pathname object conversion process is performed. In one exemplary implementation, the changed node to pathname object conversion process and the unchanged node to pathname object conversion process utilize data structures that return the object indications and parent node indications. An object indication is inserted in a pathname. | 04-07-2011 |
20110087635 | SYSTEMS AND METHODS FOR A SNAPSHOT OF DATA - In one embodiment, a user or client device is connected to a distributed file system comprised of one or more physical nodes. The data on each of the physical nodes store metadata about files and directories within the file system. Some of the embodiments permit a user to take a snapshot of data stored on the file system. The snapshot may include a single file, a single directory, a plurality of files within a directory, a plurality of directories, a path on the file system that includes nested files and subdirectories, or more than one path on the file system that each includes nested files and directories. In an embodiment, a snapshot tracking data structure is maintained for efficient creation and deletion of the snapshot. | 04-14-2011 |
20110093437 | METHOD AND SYSTEM FOR GENERATING A SPACE-EFFICIENT SNAPSHOT OR SNAPCLONE OF LOGICAL DISKS - A method and system for generating a snapshot of one or more logical disks storing file-system data associated with a file system are disclosed. In one embodiment, the file system is quiesced upon a receipt of a command to generate the snapshot of the logical disks, where the snapshot is a copy of the logical disks at a point in time. Then, a disk usage of the logical disks at the point in time is determined. Further, a sharing bitmap associated with the snapshot is generated based on the disk usage, where the sharing bitmap is configured to indicate sharing of the file-system data with the logical disks and a predecessor snapshot immediately preceding the snapshot. Moreover, the file system is unquiesced. | 04-21-2011 |
20110137867 | Storage system and control method for the same - When updating the data in each generation's logical units, the snapshot processing unit writes the update data in accordance with the update as forward differential data | 06-09-2011 |
20110161298 | SYSTEM AND METHOD FOR OPPORTUNISTIC RE-IMAGING USING CANNIBALISTIC STORAGE TECHNIQUES ON SPARSE STORAGE DEVICES - In some embodiments, the invention involves a system and method for instant re-imaging of a computing device using a sparse storage partition of dynamically variable size to hold re-imaging data. An embodiment uses a solid state storage device to hold the binary image, or re-imaging personality. An embodiment uses copy on write methodology to maintain the re-imaging personality. An embodiment allows the primary, or active, personality to cannibalize storage used for a re-imaging personality when additional storage is required. The state of a computing device may be switched to allow or prohibit re-imaging, or to prohibit cannibalization of storage. Other embodiments are described and claimed. | 06-30-2011 |
20110161299 | SYSTEMS AND METHODS FOR PERFORMING DATA MANAGEMENT OPERATIONS USING SNAPSHOTS - A system and method for using a snapshot as a data source is described. In some cases, the system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions. | 06-30-2011 |
20110161300 | DUAL ACCESS TO CONCURRENT DATA IN A DATABASE MANAGEMENT SYSTEM - Various embodiments include one or more of systems, methods, software, and data structures that allow dual access to concurrent data in a database management system including uncommitted updated data. Some embodiments include a dual snapshot of data in a multi-version concurrency control style database, but the embodiments described herein are equally applicable to virtually any other type of database and database management system. | 06-30-2011 |
20110173160 | SNAPSHOT INDEXING - Managing backup data comprises accessing a snapshot of a data set, wherein the data set includes at least one object and the snapshot includes a replica of the data set, and adding to an index associated with the snapshot, with respect to each of one or more objects included in the snapshot, index data indicating at least where the object is located within the snapshot. | 07-14-2011 |
20110178988 | COMPUTER SYSTEM AND ITS DATA CONTROL METHOD - Provided are a computer system and its data control method that enable safe backup of data and reduction in the capacity of data to be backed up. A control processor refers to a differential and, if a differential bit is “0,” encrypts data of an online VOL with an encryption circuit by using key information, and transfers the encrypted data to a second storage system. If the differential bit is “1,” the control processor performs redundancy elimination processing to journal data, thereafter compresses the journal data with a compression circuit, encrypts the compressed journal data with an encryption circuit according to the key information, and transfers the journal data that was encrypted after compression to the second storage system. | 07-21-2011 |
20110178989 | REMEDYING METHOD FOR PROBLEMS IN VIRTUAL SERVER SYSTEM AND SYSTEM THEREOF - According to the invention, a managing server, using a snapshot-appended information table which stores management information for identifying snapshots of a virtual server, a setting change table which stores setting change information on the virtual server, and a policy table which stores policies to be met by the virtual server, acquires the setting change information from the setting change table, selects the setting change information items from the acquired setting change information matching policies stored in the policy table, acquires management information on the snapshots of the virtual server from the snapshot-appended information table, identifies a snapshot of the virtual server with reference to the acquired management information, changes the identified snapshot of the virtual server based on the selected setting change information items, and rolls back the virtual server according to the changed snapshot. | 07-21-2011 |
20110196841 | DATA STORAGE WITH SNAPSHOT-TO-SNAPSHOT RECOVERY - Embodiments of the present invention provide methods, apparatuses, systems, and computer software products for data storage. A first copy of a logical volume is created. A second copy of the logical volume is created based on the first copy of the logical volume, such that the first and second copies are represented by respective first and second sets of pointers to physical storage locations in which data used by the copies is stored. Responsively to a corruption of at least part of the data that is used by the first copy. The first copy is restored from the second copy by replacing the first set with the pointers in the second set. | 08-11-2011 |
20110202503 | BLOCK-BASED DIFFERENCING ALGORITHM - A system and method for a block based differencing algorithm which includes the ability to limit memory requirements regardless of source file sizes by splitting the source file into optimally sized blocks. The invention allows the blocks to be processed in any order allowing in-place operation. Further, the present invention allows a second stage compressor to match the compressor blocks to those used by the differencing algorithm to optimize compressor and decompressor performance. | 08-18-2011 |
20110218968 | System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 09-08-2011 |
20110246426 | METHOD AND APPARATUS FOR INFORMATION RECOVERY USING SNAPSHOT DATABASE - The present invention provides a method for information recovery using a snapshot database, comprising the steps of: collecting first user log information for users of one or more user terminals; sorting effective information from the first user log information; storing the sorted effective information into the format of a snapshot database in accordance with period information; receiving recovery request information for the effective information from the user terminals; comparing and analyzing the second user log information and the effective information at the point of time where said recovery request information is received in accordance with said recovery request information; and recovering the second user log information to said effective information in accordance with the result of the analysis. | 10-06-2011 |
20110282841 | COMPUTING SYSTEM AND DATA MANAGEMENT METHOD - Proposed are a computing system and a data management method for improving the usage efficiency of logical volumes without lowering the response performance In a computing system that includes a first storage apparatus in which first and second storage volumes are configured, a file storage apparatus for controlling the first logical volume, a second storage apparatus, and an archive apparatus for controlling the second storage apparatus, the first storage apparatus acquires a snapshot of the first logical volume at regular or irregular intervals and stores differential data in the second logical volume, specifies a file for which the consumption amount of the second logical volume exceeds a predetermined threshold, causes the first storage apparatus to acquire a snapshot of the specified file, and if a read request to read the file is supplied, generates the file on the basis of data stored in the first and second logical volumes. | 11-17-2011 |
20110282842 | DATA PROTECTION IN A DATA STORAGE SYSTEM - Systems and methods herein provide for protecting data using snapshots and images of those snapshots to quickly recreate data upon request. For example, a storage controller of a data storage system allocates a period of time between creating snapshots of data in a first storage volume of the data storage system. The controller then logs received write requests to the first storage volume and generates snapshot of data in the first storage volume based on the allocated period of time. Thereafter, the controller may receive a request to recreate data. The controller locates the snapshot in the first storage volume based on that request to recreate the data. In doing so, the controller generates a snapshot image in a second storage volume. The controller then retrieves logged write requests and applies them to the snapshot image to recreate the data in the second storage volume. | 11-17-2011 |
20110282843 | METHOD AND SYSTEM FOR DATA BACKUP AND REPLICATION - A work flow is initiated and identified by a scenario identifier. A file system driver is notified to record operations on data associated with the work flow identified by the scenario identifier as raw journals without recording data content associated with the operations. The recorded operations are consolidated with previous operations as each operation is recorded in the raw journals. A system snapshot is initiated to be taken. The file system driver is notified of a point in time the system snapshot is taken. Data content associated with the consolidated recorded operations is retrieved from the system snapshot. A first packet is created from selected recorded operations and sent synchronously. A second packet including rest of the recorded operations along with associated data content are sent asynchronously with the point in time of the system snapshot. | 11-17-2011 |
20110307450 | TENANT SEPARATION WITHIN A DATABASE INSTANCE - A system includes a database instance, a data storage system, and a database management system. The data storage system stores a first data partition and a second data partition. The first data partition includes a first plurality of database pages storing tenant-independent data and a first converter associated with the first partition. The second data partition includes a second plurality of database pages storing tenant-independent data and a second converter associated with the second partition. | 12-15-2011 |
20120005164 | CLUSTER CONFIGURATION SYSTEMS AND METHODS - Systems and methods for cluster maintenance are presented. In one embodiment a cluster configuration method includes: maintaining configuration information associated with a first node and a second node, including cluster configuration version information; evaluating the first node as a potential configuration update node for the second node, including evaluating an indication of potential partial snapshot update availability based upon the configuration information associated with the first node and configuration information associated with the second node; performing an update type selection, including continued analysis of partial snapshot update availability; and performing an update for the second node in accordance with results of the update type selection. Evaluating the first node as a potential configuration update node can include comparing an available configuration version indication associated with the first node to the available cluster configuration version indication associated with the second node. | 01-05-2012 |
20120011100 | SNAPSHOT ACQUISITION PROCESSING TECHNIQUE - This method includes, in response to receipt of a snapshot request from a first node that receives an instruction to obtain a snapshot, identifying transactions in progress; transmitting data representing states of the identified transactions in progress to the first node; after the identifying, carrying out a first processing to prevent the transactions in progress from normally completing; receiving a list of first transactions whose results are reflected to snapshot data or a list of second transactions whose results are not reflected to the snapshot data; and executing copy-on-write on a basis of a specific time after removing the first transactions from among transactions to be processed in the first processing and confirming that the respective first transactions are normally completed or cancelled. | 01-12-2012 |
20120016842 | DATA PROCESSING APPARATUS, DATA PROCESSING METHOD, DATA PROCESSING PROGRAM, AND STORAGE APPARATUS - In a data processing apparatus, a snapshotting unit creates a second snapshot in a first storage space while a first snapshot of the first storage space exists in a second storage space. A storage unit stores first progress data indicating progress of physical copy to the first storage space for a current second snapshot, and second progress data indicating progress of physical copy to the first storage space for a preceding second snapshot. | 01-19-2012 |
20120047111 | METHOD AND SYSTEM FOR PARITY-PAGE DISTRIBUTION AMONG NODES OF A MULTI-NODE DATA-STORAGE SYSTEM - One embodiment of the present invention is directed to a multi-node data-storage system comprising a number C of component-data-storage-system nodes that store data pages of a data object in a mirror and in 0, 1, or more parity-encoded snapshots, the mirror comprising 2 or more replicates including a 0 | 02-23-2012 |
20120066183 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 03-15-2012 |
20120078848 | METHODS FOR DYNAMIC CONSISTENCY GROUP FORMATION AND SYSTEMS USING THE SAME - A method for dynamic consistency group formation, in one embodiment, includes creating a snapshot of first data stored on a source storage system with respect to data content and data structure, copying the snapshot to a target storage system, detecting one or more write operations affecting data on the source storage system while copying the first data, detecting one or more collisions affecting the first data on the source storage system, wherein a collision occurs whenever the write operations affect the first data prior to the first data being written, setting a consistency group interval which represents an interval duration between successive snapshot create-and-copy events, and altering the consistency group interval to minimize collisions affecting data on at least one of the storage systems. Other methods, systems, and computer program products for dynamic consistency group formation are also described. | 03-29-2012 |
20120095967 | PORTABLE INFRASTRUCTURE OBJECT FOR CAPTURING MACHINE IMAGES - A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information. | 04-19-2012 |
20120101996 | APPARATUS AND METHOD FOR SNAPSHOT IMAGE SEGMENTATION - Provided are an apparatus to restore data, and a snapshot image segmentation apparatus and method that create a plurality of snapshot images, store the snapshot images in a storage, and load the stored snapshot images to a memory according to snapshot image loading priority. The snapshot image segmentation apparatus may includes a number-of-snapshot images deciding unit configured to decide the number of snapshot images, a segmentation unit configured to segment an entire image including data stored in a memory into one or more snapshot images, based on the number of snapshot images, and a loading priority deciding unit configured to decide snapshot image loading priority of the segmented snapshot images, based on data loading priority of the data stored in the memory. | 04-26-2012 |
20120101997 | DATABASE DATA RECOVERY SYSTEM AND METHOD - The present invention relates to a system and method of data restoration, for instance, after the occurrence of a user error. In particular, snapshot database can be maintained that stores a copy of database data. The snapshot database does not have to store a complete copy of all data on a source database, but rather shares data that is common to both but not necessarily identical. If an error occurs on the primary database then the database can be reverted back to a point in time prior to the error by replacing source database files with snapshot files. Additionally, an undo component can be employed in conjunction with the snapshot to approach an error to a finer grained point in time. In brief, the present invention can restore a database much faster and simpler, while utilizing less space and resources than conventional data restoration technologies. | 04-26-2012 |
20120136834 | REDUCING DATA DUPLICATION IN CLOUD STORAGE - Data duplication may be reduced in cloud storage. First snapshots of one or more remote volumes may be received via a network. The first snapshots may be copies of the one or more remote volumes at a first instant in time. Responsive to and/or based on the first snapshots, unique clusters and duplicate clusters may be identified among the valid clusters of the remote volumes. The unique clusters and single instances of the duplicate clusters may be stored in a backup file, such that the backup file is devoid of duplicate clusters. Second snapshots of the one or more remote volumes may be received via the network. The second snapshots may be copies of the one or more remote volumes at a second instant in time, wherein the second instant in time is after the first instant in time. Responsive to the second snapshots, the clusters in the backup file that are no longer valid may be utilized to store the valid clusters in the one or more remote volumes not yet stored in the backup file. | 05-31-2012 |
20120143826 | CREATING AND UTILIZING NETWORK RESTORE POINTS - The creation and utilization of network restore points is provided by a schema associated with a structured data set that can be conveniently backed up by periodically taking snapshots of the structured data to establish a series of restore points that can be used in the event that the primary structured data becomes lost or corrupted. In general, the snapshots are only taken after the structured data set has undergone a change in content, although they may be taken at other times as well. The snapshot may be taken by a network restore point engine that can be accessed by a user over the Internet. In addition, the snapshot may be stored on an Internet-based storage medium or it may be pushed to or pulled by the client so that the snapshot resides on a client-resident storage medium. | 06-07-2012 |
20120150807 | TECHNIQUE FOR INCREASING THE NUMBER OF PERSISTENT CONSISTENCY POINT IMAGES IN A FILE SYSTEM - An on-disk storage arrangement increases the number of persistent consistency point images (PCPIs) that may be maintained for a volume of a storage system. The on-disk storage arrangement comprises a novel volume information (volinfo) block representing a root of the volume; the volinfo block is stored at predefined locations on disk and comprises various system wide configuration data. The volinfo block further comprises a data structure configured to provide a level of indirection that increases the number of PCPIs maintainable by a file system executing on the storage system. To that end, the data structure may be organized as an array of pointers, wherein each pointer references a block containing a snapshot root, thereby enabling efficient access to each PCPI maintained by the file system. | 06-14-2012 |
20120158661 | CONTEXT-SPECIFIC ROLLBACK - Some embodiments of the invention provide components and/or techniques that may assist in choosing a snapshot to which to roll back to address a system malfunction. For example, some embodiments of the invention may record various metrics describing the system's performance, reliability and/or functionality at the points at which various snapshots are taken, along any of numerous dimensions. When a user later indicates a desire to restore the system to a previous point, these metrics may be analyzed to choose a snapshot to which to roll back. | 06-21-2012 |
20120158662 | BACKUP AND RESTORE OF DATA FROM ANY CLUSTER NODE - Implementing point in time back-up. A method that may be practiced in a distributed computing environment. The distributed computing environment includes a number of computing system nodes. The method includes at a first node in the computing environment, taking a snapshot of a cluster volume. The cluster volume stores data items (e.g. files/blocks). Taking a snapshot includes marking a point in time for data items in the volume. The method further includes receiving a notification that a different node in the computing environment than the first node, has determined to change a data item in the cluster volume at a point after the marked point in time from an old version of the data item to a new version of the data item. The method further includes at the first node, saving the old version of the data item prior to modification. | 06-21-2012 |
20120158663 | NAS SYSTEM AND REMOTE COPY METHOD - The present invention relates to a system that includes one or more logical volumes for storing data; a snapshot producing section for producing snapshots for the logical volumes based on a pre-scheduled snapshot acquisition time; a remote copy section for remote copying difference data for the snapshots based on pre-scheduled remote copy start times; and a scheduling section for re-scheduling the time of one or more of an Nth snapshot acquisition time, an Nth remote copy start time, and an (N+1)th remote copy start time, in such a manner that remote copying starting at the Nth remote copy start time finishes by the (N+1)th remote copy start time. | 06-21-2012 |
20120209813 | FILE CLONING ACROSS DIFFERENT FILESETS - After a clone file is created from a file, a write request targeting the clone file can be handled. It is determined that the write request indicates the clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. It is then determined that the data block at a current location cannot be modified. The write request is implemented with respect to the data block at a different location. It is indicated that the data block at the different location can be modified for subsequent write requests that indicate the clone file | 08-16-2012 |
20120254121 | SYSTEM AND METHOD FOR GENERATING A THREE-DIMENSIONAL IMAGE - A method for generating three-dimensional image data including accessing, using one or more processors, a first set of data from a database, the first set of data relating to an electronic bill of materials of a product, generating, using one or more processors, a second set of data based on the first set of data that relates to a three-dimensional image of the product, enriching, using one or more processors, the second set of data with a third set of data, the third set of data relating to image information added to the three-dimensional image of the product, and storing, using one or more processors, the enriched second set of data in the database. | 10-04-2012 |
20120254122 | NEAR CONTINUOUS SPACE-EFFICIENT DATA PROTECTION - A method for providing rolling continuous data protection of source data is disclosed. In one embodiment, such a method includes enabling a user to select source data and establish a first interval when point-in-time copies of the source data are generated. The method further enables the user to specify a first number of point-in-time copies to retain at the first interval. The method further enables the user to specify a second number of point-in-time copies to retain at a second interval, wherein the second interval is a (n≧2) multiple of the first interval. The method further enables the user to specify a third number of point-in-time copies to retain at a third interval, wherein the third interval is a (n≧2) multiple of the second interval. A corresponding apparatus and computer program product are also disclosed. | 10-04-2012 |
20120254123 | METHODS AND SYSTEMS FOR SNAPSHOT RECONSTITUTION - A method, computer readable medium, and a system for reconstituting a virtual snapshot of files in a file virtualization system includes forming at a file virtualization device a virtual snapshot that includes a plurality of physical snapshots associated with one or more file storage devices participating in the virtual snapshot, receiving a request for performing an operation on one or more physical snapshots in the plurality of physical snapshots, providing the one or more physical snapshots in response to the request for performing the operation when the one or more physical snapshots exists in the virtual snapshot, and reconstituting the virtual snapshot by including the one or more physical snapshots to form a reconstituted virtual snapshot in response to the request for performing the operation when the one or more physical snapshots do not exist in the virtual snapshot. | 10-04-2012 |
20120259815 | Reusing Snapshots in a Network Data Management Protocol Backup Operation - Mechanisms, in a data processing system, are provided for performing a data management operation. These mechanisms identify one or more defined groups of data elements that are a target of the data management operation. One or more previously generated snapshot files associated with the one or more defined groups are identified and a determination is made as to whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. The data management operation is performed based on the determination of whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. | 10-11-2012 |
20120259816 | CHECKPOINTS FOR A FILE SYSTEM - Aspects of the subject matter described herein relate to checkpoints for a file system. In aspects, updates to the file system are organized into checkpoint buckets. When a checkpoint is desired, subsequent updates are directed to another checkpoint bucket. After global tables have been updated for updates in the current checkpoint bucket, a logical copy of the global tables is created. This logical copy is stored as part of the checkpoint data. To assist in recovery, a checkpoint manager may wait until all updates of the current checkpoint bucket have been written to storage before writing final checkpoint data to storage. This final checkpoint data may refer to the logical copy of the global tables and include a validation code to verify that the checkpoint data is correct. | 10-11-2012 |
20120271799 | Apparatus and Method for Hardware-Based File System - A hardware-based file system includes multiple linked sub-modules that perform functions ancillary to client data handling. Each sub-module is associated with a metadata cache. A doubly-rooted structure is used to store each file system object at successive checkpoints. Metadata is stored within an object and/or as a separate object. Provisions are made for allocating sparse objects. A delayed write feature is used for writing certain objects into non-volatile storage. Checkpoints can be retained as read-only versions of the file system. Modifications to the file system are accomplished without affecting the contents of retained checkpoints. The file system can be reverted to a retained checkpoint. Multiple file servers can be interconnected as a cluster, and each file server stores requests from another file server. Interconnections between file servers can be dynamically modified. A distributed locking mechanism is used to control access to file system objects stored by the file servers. | 10-25-2012 |
20120278286 | BACKUP METHOD AND STORAGE MEDIUM HAVING BACKUP PROGRAM STORED THEREIN - A backup method for a backup system including an information processing apparatus and two or more information processing devices connected via a network includes, when the information processing device is designated as a first device among a plurality of the information processing devices, transmitting a first backup image of the first device to the information processing apparatus and transmitting the first backup image to a second device, and when the information processing device is the second device, extracting a difference image, which is a difference between the first backup image transmitted from the first device and a second backup image of the second device and transmitting the difference image to the information processing apparatus. | 11-01-2012 |
20120284233 | METHOD AND APPARATUS OF DATA PROTECTION - A contents management system comprises a plurality of subsystems which include: a storage subsystem to store a plurality of objects; a contents gateway server configured to create snapshots of the objects and store the snapshots in a first snapshot layer; a system management control unit configured to determine whether the number of snapshots in the first snapshot layer exceeds a corresponding limit for the first snapshot layer and, if yes, to migrate the snapshots from the first snapshot layer to a second snapshot layer provided by another subsystem of the contents management system, and delete the migrated snapshots from the first snapshot layer; and a contents management server configured to track location changes of the snapshots of the objects during migration of the snapshots and to re-index an index data of the snapshots of the objects based on the tracked location changes. | 11-08-2012 |
20120303585 | PROPAGATING A SNAPSHOT ATTRIBUTE IN A DISTRIBUTED FILE SYSTEM - A storage system includes a distributed file system. An attribute of a particular entity in the file system relates to a snapshot. In response to an operation in the storage system, it is determined whether the snapshot attribute is to be propagated to another entity of the file system. | 11-29-2012 |
20120303586 | SYSTEM AND METHOD FOR DATA INTEGRATION OF ENGINEERING TOOLS - Exemplary embodiments of the present disclosure relates to a system and method for data integration using at least two independent engineering tools including their private database, where all data in the first tool being of interest for the second tool are identified, specified and stored in an electronic data container. Each data item stored in the electronic data container is provided with a link to the original data and with a copy of the stored data items. The electronic data container that includes the data items can be accessed by the target tool or a separate application to obtain a read-only view of the engineering data of the source tool for further use in the target engineering tool and navigation through the data for the engineer as well as for a data import. | 11-29-2012 |
20120323853 | VIRTUAL MACHINE SNAPSHOTTING AND ANALYSIS - Described are techniques for capturing and analyzing snapshots of virtual machines. One or more computers may automatically obtain snapshots of virtual machines as they are executing to form a pool of virtual machine snapshots. The virtual machine snapshots are then read to obtain a set of features properties of the virtual machine snapshots, including information about a running guest operating system, software installed on the virtual machine, metadata about the virtual machine itself, and others. The features or properties are analyzed, in one embodiment using a machine learning algorithm, to automatically compute and store information about the virtual machines. | 12-20-2012 |
20130006942 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 01-03-2013 |
20130031058 | MANAGING DATA ACCESS REQUESTS AFTER PERSISTENT SNAPSHOTS - A client node on which a file system is mounted can be configured to efficiently handle content access requests after a snapshot is created. The client node can maintain generation numbers at a data block, a file, and a fileset level to determine whether a data block is part of a snapshot generation and consequently whether the data block is writable in a current generation. Data block mappings and write access permissions associated with the data blocks need not be revoked at the client node prior to creating the snapshot. Cached data block mappings can be accessed to identify data blocks for servicing a read request. The data block can be updated in place if the data block is not part of the snapshot generation. The write request can be serviced at a new data block if the data block is part of the snapshot generation. | 01-31-2013 |
20130054533 | VERIFYING A DATA RECOVERY COMPONENT USING A MANAGED INTERFACE - The subject disclosure is directed towards verifying a data recovery component of a volume snapshot service using a managed interface. The managed interface enables interoperability between the data recovery component and one or more complementary data recovery components by converting compatible instructions for the data recovery component and a complementary data recovery component into native data recovery operations for the volume snapshot service and vice versa. Via the managed interface, the complementary data recovery component emulates the native data recovery operations. Using status information associated with such an emulation, the data recovery component is verifiable. | 02-28-2013 |
20130054534 | STORAGE SYSTEM AND METHOD IMPLEMENTING ONLINE VOLUME AND SNAPSHOT WITH PERFORMANCE/FAILURE INDEPENDENCE AND HIGH CAPACITY EFFICIENCY - A storage system for storage of data written from a computer, and when a write request of data to a first logical volume is received, the data on request is stored into the first logical volume. When a first-generation snapshot creation request is received, the data stored in the first logical volume at the time of receiving the first-generation snapshot creation request is written into a pool region as data corresponding to a first-generation snapshot, and when a second-generation snapshot creation request is received, any portion of the data updated after the first-generation snapshot creation request is received but before the second-generation snapshot creation request is issued is read from the first logical volume for writing into the pool region. Such a storage system favorably implements snapshot backup with no dependency with a positive volume in terms of performance and failure, and with high capacity efficiency. | 02-28-2013 |
20130080393 | System and Method for Storing Stream Data in Distributed Relational Tables with Data Provenance - A system, a method and a computer readable medium for storing data elements and related data provenance information. The data elements may be represented in a hyper-table having rows and columns which may be indexed. The data-values of the corresponding data-elements in the hyper-cells may be retrieved based on the indices. Snapshots of the indices may be generated at pre-determined time periods. Checkpoints of the hyper-table may be generated at time periods that are based on transactions on the hyper-table. The hyper-table is capable of being queried as the hyper-table existed at certain time-periods, and data-values of the data-elements may be retrieved as the data-elements existed at such time-periods. | 03-28-2013 |
20130085997 | INFORMATION SEARCH SYSTEM, SEARCH SERVER AND PROGRAM - In order for a conventional information search system to realize online updating of search indices, there would have to be provided two systems of physical storages for storing copies of indices, namely one for searching and another for updating. By means of a snapshot function provided by an OS, duplicates of original indices are created. A search engine is attached to those duplicates and is used as such, while an index update process is applied to the original index data. | 04-04-2013 |
20130085998 | LATENCY-AWARE LIVE MIGRATION FOR MULTITENANT DATABASE PLATFORMS - Methods and systems for database migration from a multitenant database include taking a snapshot of an original database to be migrated with a hot backup process, such that the database is still capable of answering queries during the hot backup process; maintaining a query log of all queries to the tenant database after the hot backup process begins; initializing a new database at a target server using the snapshot; replaying the query log synchronize the new database with the original database; and answering new queries with the new database and not the original database. | 04-04-2013 |
20130097120 | Policy-Based Checkpointing Fault Tolerance Across Remote Virtual Machines - Embodiments include a checkpointing fault tolerance network architecture enables a first computer system to be remotely located from a second computer system. An intermediary computer system is situated between the first computer system and the second computer system to manage the transmission of checkpoint information from the first computer system to the second computer system in an efficient manner. The intermediary computer system responds to requests from the second computer system for updated data corresponding to memory pages selected by the second computer system, or memory pages identified through application of policy information defined by the second computer system. | 04-18-2013 |
20130110784 | MANAGING BACKUPS OF DATA OBJECTS IN CONTAINERS | 05-02-2013 |
20130132349 | TENANT SEPARATION WITHIN A DATABASE INSTANCE - A method for a database instance associated with a database management system includes receiving a command to perform a copy or a move on a first tenant partition from a first database instance to a second database instance destination partition. The method shuts down the first tenant partition, packs tenant-dependent data into tenant-dependent tables, acquires a data definition lock that prevents changes to metadata describing the first tenant partition, obtains tenant-specific metadata of a catalog of the first database instance, packs the first database instance catalog tenant-specific metadata into the first tenant partition, locks write transactions on tenant-specific data in the first tenant partition, creates a tenant-specific snapshot of the first tenant partition, stores the tenant-specific snapshot in a storage device external to the first database instance, performs the received command, and releases both the write transaction lock and the data definition lock. | 05-23-2013 |
20130159256 | Snapshot of Distributed Enterprise Business Data Stored in Various Cloud Services - A system and method for generating a snapshot of data associated with one or more cloud-based applications are disclosed. Application programming interfaces (APIs) and connections associated with one or more applications registered and on a server computer and used by a company are retrieved from a table by a lookup. All data associated with the one or more applications based on the APIs and connections are also retrieved. The data associated with the one or more applications is then mapped to a client-specific representation and data format. The data associated with the one or more applications is converted to the client-specific representation and data format. | 06-20-2013 |
20130159257 | Systems, Method, and Computer Program Products Providing Sparse Snapshots - A method performed in a computer-based storage system includes creating a copy of an active file system at a first point in time, where the active file system includes user data, metadata describing a structure of the active file system and the user data, and a first data structure describing storage locations of the user data and the metadata, in which creating a copy of the active file system includes selectively omitting a portion of the user data and a portion of the metadata from the copy. | 06-20-2013 |
20130166511 | DETERMINING AN OVERALL ASSESSMENT OF A LIKELIHOOD OF A BACKUP SET RESULTING IN A SUCCESSFUL RESTORE - A point-in-time backup image is selected from a plurality of backup images of an image on a source computer system to be applied to the target computer system. A first assessment value is associated with an extent to which critical files and recovery metadata are included in the selected backup based on an include list of critical files and recovery metadata to include in the backup. A second assessment value comprises a backup status of the critical files and the recovery metadata. A third assessment value is indicative of an extent to which the selected backup satisfies requirements of a retention policy. A fourth assessment value is indicative of an extent to which computational resources and device drivers in the target computer system are compatible. An overall assessment value for the selected backup image is determined based on the determined first, second, third, and fourth assessment values. | 06-27-2013 |
20130185263 | SELF LEARNING BACKUP AND RECOVERY MANAGEMENT SYSTEM - A system and method provide for a reception of data at a computer processor. The data relates to a dataset in a computer system. The computer processor calculates a weight for the dataset as a function of the data, and the processor executes an action on the dataset as a function of the weight. In an embodiment, the action is a backup of data on the computer system, and through recalculation of the weight over a period of time, the backup schedule, backup media, and other parameters are altered based on the changing weight for a dataset. | 07-18-2013 |
20130191345 | VOLUME AND PARTIAL VOLUME MERGE TO SYNCHRONIZE TO NON-HOMOGENEOUS DRIVE LAYOUTS - A method and system for merging files of multiple volumes in a data store to a single merged volume. The method includes creating one or more snapshots of one or more volumes of a data store of a first system. Files in the one or more snapshots are merged into a merged volume. The merged volume is mounted and stored in a second system. | 07-25-2013 |
20130191346 | SIMULATION CONTROL TECHNIQUES - Simulation control techniques include shutting down peer processes and user code modules, storing an image of a simulation as a checkpoint after the peer processes and user code modules are shutdown, and re-starting user code modules and peer processes after storing an image of the simulation. The resulting checkpoint and processes can be used for restoring from a checkpoint or restarting a new simulation environments having peer processes such as debuggers coupled to the simulation. | 07-25-2013 |
20130191347 | DATA TRANSFER AND RECOVERY - A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and one or more remote storage servers. In the event of a failure of the primary server, an updated primary image may be used to provide an up-to-date version of the primary system at a backup or other system. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure. | 07-25-2013 |
20130198139 | DURABILITY IMPLEMENTATION PLAN IN AN IN-MEMORY DATABASE SYSTEM - A database durability implementation records only committed transactions in a log file. A pair of log files and a pair of snapshot files are maintained. When a snapshot of the database is completed, the ‘current’ log becomes the ‘prior’ log and the other log becomes the ‘current’ log. After the next snapshot is completed, the prior log and prior snapshot may be deleted. Transactions that are not committed are not recorded in the current log, thereby avoiding the need to undo aborted transactions. If a given change is reflected in a completed snapshot, it does not appear in either of the logs; if the change is not yet reflected in a completed snapshot, it is guaranteed to be stored in one of the logs. During recovery, the system assesses both snapshots. The most recent of the completed snapshots is used, and the corresponding log(s) is (are) applied. | 08-01-2013 |
20130198140 | METHOD OF AND SYSTEM FOR ENHANCED DATA STORAGE - A method of and system for enhanced storage allows more data to be backed up than would otherwise be possible. Instead of storing uncompressed base images and incremental images, differentials of non-current base images are compressed and stored. Furthermore, incremental images that are older than the current base image are removed. By only saving differential base images that are compressed, aside from the newest base image, and deleting older incremental images, a significant amount of space is saved. A removable drive is used as temporary storage in the process of generating a compressed differential base for previous base images. Additionally, a process ensures that previous base images are differentials of the most recent base image and not each other. | 08-01-2013 |
20130204843 | ADAPTIVE QUIESCE FOR EFFICIENT CROSS-HOST CONSISTENT CDP CHECKPONTS - A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative. | 08-08-2013 |
20130238562 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS - A data storage environment can include one or more virtual clients instantiated on a host proxy computing device. The virtual clients may have only indirect access to a storage device, and may access the storage device via the proxy computing device. For example, the proxy computing device receives storage operation requests from one of the virtual clients, such as a request to create, mount or revert a snapshot of virtual client data. The proxy computing device generally acts as an intermediary between the virtual clients and the storage device to carry out the snapshots or other storage operations. The proxy computing device may further receive a notification upon completion of the storage operations, and transmits relevant data to the requesting virtual client regarding the storage operation. | 09-12-2013 |
20130262390 | MIGRATION OF EXISTING COMPUTING SYSTEMS TO CLOUD COMPUTING SITES OR VIRTUAL MACHINES - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 10-03-2013 |
20130268493 | Hybrid Backup and Restore of Very Large File System Using Metadata Image Backup and Traditional Backup - A mechanism performs a metadata image backup of a hierarchical storage management (HSM) file system. Concurrent with performing the metadata image backup of the HSM file system, the mechanism identifies a set of resident files that are not yet stored off-line in the HSM file system. The mechanism identifies immutable files within the set of resident files to form an optimized set of resident files and passes the optimized set of resident files to a traditional backup system. The traditional backup system backs up file data for the set of resident files. Responsive to detecting an inability to restore a migrated managed state of a file, the mechanism unsets an immutable bit of the file attribute, restores file data for the file using the traditional backup system, and sets the immutable bit attribute of the file. | 10-10-2013 |
20130282662 | INTEGRATED SNAPSHOT INTERFACE FOR A DATA STORAGE SYSTEM - A data storage system includes a generic snapshot interface, allowing for integration with a wide variety of snapshot-capable storage devices. The generic interface can be a programming interface (e.g., an application programming interface [API]). Using the snapshot interface, storage device vendors can integrate their particular snapshot technology with the data storage system. For instance, the data storage system can access a shared library of functions (e.g., a dynamically linked library [DLL]) provided by the vendor (or another by appropriate entity) and that complies with the specifications of the common programming interface. And by invoking the appropriate functions in the library, the data storage system implements the snapshot operation on the storage device. | 10-24-2013 |
20130290262 | INFORMATION PROCESSING DEVICE, COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR GENERATING SNAPSHOT, AND METHOD THEREFORE - An information processing device includes a storage unit which stores information, and a processor which performs processes including generating a first snapshot of the information, and storing first pointer information indicating a storage position of the information associated with the first snapshot in the storage unit, monitoring completion of a writing process on the information when the first snapshot is generated during the writing process, generating a second snapshot of the information when the completion of the writing process is detected, and storing, in the storage unit, second pointer information indicating a storage position of the information associated with the second snapshot; and replacing the first pointer information stored in the storage unit with the second pointer information. | 10-31-2013 |
20130290263 | FILE SYSTEM - A digitally signed file system in which data, metadata and files are objects, each object having a globally unique and content-derived fingerprint and wherein object references are mapped by the fingerprints; the file system has a root object comprising a mapping of all object fingerprints in the file system, such that a change to the file system results in a change in the root object, and tracking changes in the root object provides a history of file system activity. | 10-31-2013 |
20130325811 | FILE SYSTEM QUIESCING - Techniques are disclosed for quiescing a file system. One technique comprises freezing a file system, flushing a memory associated with the file system, and thawing the file system. One technique comprises receiving a request targeted to a file system and intercepting the request. | 12-05-2013 |
20130339301 | EFFICIENT SNAPSHOT READ OF A DATABASE IN A DISTRIBUTED STORAGE SYSTEM - A computer system issues a batch read operation to a tablet in a first replication group in a distributed database and obtains a most recent version of data items in the tablet that have a timestamp no great than a snapshot timestamp T. For each data item in the one tablet, the computer system determines whether the data item has a move-in timestamp less than or equal to the snapshot timestamp T, which is less than a move-out timestamp, and whether the data item has a creation timestamp less than the snapshot timestamp T, which is less than or equal to a deletion timestamp. If the determination is true, the computer system determines whether the move-out timestamp has an actual associated value and, if so, the computer system determines a second tablet in a second replication group in the database that includes the data item and issues the snapshot read operation to the second table in the second replication group to obtain a most-recent version of the data item that has a timestamp no greater than the snapshot timestamp T; otherwise, the computer system issues the snapshot read to the one tablet to obtain a most recent version of the data item that has a timestamp no greater than the snapshot timestamp T. | 12-19-2013 |
20130339302 | SYSTEM AND METHOD FOR INTELLIGENT DATABASE BACKUP - Systems and methods are provided for backing up database storage. A protection policy for database storage is activated at a remote host, wherein the database storage is not physically accessible by the computing device, such that the out-of-band storage is not in communication with the remote host through the computing device. A backup request is transmitted to the remote host comprising data indicative of a volume on the database storage to back up according to the protection policy. A response to the backup request is received comprising staging disk requirements including a required size for a staging disk. A staging disk is determined based on the response. The staging disk is presented to the remote host so that the remote host can perform a backup of the volume to the staging disk using a database backup tool provided by a vendor of the database storage. | 12-19-2013 |
20130339303 | SYSTEM AND METHOD FOR INCREMENTALLY BACKING UP OUT-OF-BAND DATA - Systems and methods are provided for backing up out-of-band storage. A protection policy is activated for out-of-band storage at a remote host, wherein the out-of-band storage is not physically accessible by the computing device, such that the out-of-band storage is not in communication with the remote host through the computing device. A backup request is transmitted to the remote host comprising data indicative of a volume on the out-of-band storage to back up according to the protection policy. A response to the backup request is received comprising staging disk requirements for the volume, the staging disk requirements comprising a required size for a staging disk to back up the volume. A staging disk is determined based on the response. The staging disk is presented to the remote host. A backup result is received comprising data indicative of whether a backup of the volume to the staging disk succeeded. | 12-19-2013 |
20140006354 | EXECUTING A CLOUD COMMAND FOR A DISTRIBUTED FILESYSTEM | 01-02-2014 |
20140025637 | De-Duplication Based Backup Of File Systems - File system backups are performed by copying information describing changes in the file system since a previous point in time. To restore data, a virtual restored file system (VRFS) structure is created corresponding to a snapshot of data copied from the file system that is stored in the backup file system. A client can read the data stored in the backup file system pointed at by the VRFS structure as well as write to the backup file system. Multiple clients can share blocks of data stored on the backup file system via the same VRFS structure or via multiple VRFS structures. If a client writes to a data block pointed at by a VRFS, a copy of the data block is made to which the client makes changes so that the data in the original data blocks is saved for other clients. | 01-23-2014 |
20140074790 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO RESTORE DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to restore files in the file system. A metadata image of the file system for a point-in-time backup as of a point-in-time includes information on files and directories in the file system as of the point-in-time and an archive instance including a copy of database records in the backup database for the files in the point-in-time backup. A restore request is received. A file representation is created of each file to restore in the directory structure of the file system from the metadata image, wherein at least one of the created file representations indicates that the file is stored off-line and has an external identifier used to access information on the file in the database records in the archive instance for the point-in-time backup. | 03-13-2014 |
20140089264 | SNAPSHOTS FOR A NON-VOLATILE DEVICE - Apparatuses, systems, and methods are disclosed for snapshots of a non-volatile device. A method includes writing data in a sequential log structure for a non-volatile device. A method includes marking a point, in a sequential log structure, for a snapshot of data. A method includes preserving a logical-to-physical mapping for a snapshot based on a marked point and a temporal order for data in a sequential log structure. | 03-27-2014 |
20140101107 | STORAGE APPARATUS COMPRISING SNAPSHOT FUNCTION, AND STORAGE CONTROL METHOD - Storage apparatus, in response to write command specifying write destination with regards to multiple virtual areas, allocates a free real area of multiple real areas based on storage devices to a write-destination virtual area, of the multiple virtual areas, to which the write destination belongs, and writes write-target data conforming to the write command to the allocated real area. The storage apparatus, where a first write command has been received subsequent to a snapshot acquisition time point, erases an allocation of a first real area to a first virtual area to which the write destination specified in the first write command belongs, allocates the first real area to a free second virtual area to which a real area has not been allocated, allocates a free second real area to the first virtual area, writes write-target data conforming to the first write command to the second real area. | 04-10-2014 |
20140101108 | CREATING VALIDATED DATABASE SNAPSHOTS FOR PROVISIONING VIRTUAL DATABASES - Virtual databases are provisioned using point-in-time copies of a source database. Transaction logs received from the source database are applied to a point-in-time copy of the source database to create recovery milestones comprising database blocks that can be used to provision virtual databases. The recovery milestones are created in advance of receiving a request to provision a virtual database. Each recovery milestone is validated to determine that a consistent database snapshot can be created using the recovery milestone. If a problem is identified that prevents creation of a consistent database snapshot, the problem is fixed before creating the next recovery milestone. In response to receiving a request to provision a virtual database corresponding to a point in time, a recovery milestone is identified and transaction logs applied to the recovery milestone to create a database snapshot corresponding to the requested point in time. | 04-10-2014 |
20140108353 | CLOUD PLATFORM FOR MANAGING DESIGN DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a first source file, the first source file including one or more first computer-aided design models; converting the first source file into a first plurality of files; generating a first snapshot, the first snapshot including the first source file, the first plurality of files, and a first version; receiving a second source file, the second source file having the first format that is readable by the first application, the second source file including one or more second models, the second source file being an updated version of the first source file; converting the second source file into a second plurality of files; generating a second snapshot; and associating the second snapshot with the first snapshot, where the second snapshot being a more recent version than the first snapshot. | 04-17-2014 |
20140156602 | FILE CLONING ACROSS DIFFERENT FILESETS - A method includes determining, by a processor, that a write request indicates a clone file that was cloned from a file in a first fileset. The clone file is of a second fileset and a clustered file system comprises the first fileset and the second fileset. A data block of the clone file affected by the write request is determined. The method includes determining that the data block at a current location cannot be modified. In response to a determination that the data block at the current location cannot be modified, the method includes implementing the write request with respect to the data block at a different location and indicating that the data block at the different location can be modified for subsequent write requests that indicate the clone file. | 06-05-2014 |
20140172803 | MAIN-MEMORY DATABASE CHECKPOINTING - The present invention extends to methods, systems, and computer program products for main-memory database checkpointing. Embodiments of the invention use a transaction log as an interface between online threads and a checkpoint subsystem. Using the transaction log as an interface reduces synchronization overhead between threads and the checkpoint subsystem. Transactions can be assigned to files and storage space can be reserved in a lock free manner to reduce overhead of checkpointing online transactions. Meta-data independent data files and delta files can be collapsed and merged to reduce storage overhead. Checkpoints can be updated incrementally such that changes made since the last checkpoint (and not all data) are flushed to disk. Checkpoint I/O is sequential, helping ensure higher performance of physical I/O layers. During recovery checkpoint files can be loaded into memory in parallel for multiple devices. | 06-19-2014 |
20140172804 | Timeline Index for Managing Temporal Data - Embodiments described herein generally relate to creating a timeline index for executing queries on temporal data. A computer-implemented method is described. The method includes creating a first list of tuples that are invalidated in a temporal table and sorting the first list of the invalidated tuples. The method can further include creating a second list of tuples that are activated in the temporal table and combining the first list and the second list into a third list that includes the activated tuples and the invalidated tuples, wherein the third list contains ROW_IDs of both the activated tuples and the invalidated tuples. | 06-19-2014 |
20140207738 | RECOVERY FOR LONG RUNNING MULTITHREADED PROCESSES - In response to receiving a checkpoint request from a first task for a process executing in parallel with at least a second task for the process, checkpoint data from the first task is stored to establish a restart point for the first task, wherein the checkpoint data records a current state of the first task, and the checkpoint data from the first task is merged with previously received checkpoint data for the at least second task to create a checkpoint file. In response to restarting the process, the first task and the at least second task are restarted using the checkpoint data in the checkpoint file. | 07-24-2014 |
20140214770 | CHECKPOINT GENERATION - A technique includes generating a checkpoint for an application that is executing on a plurality of nodes of a distributed computing system. Forming the checkpoint includes selectively regulating communication of data from the plurality of nodes to a storage subsystem based at least in part on a replication of the data among the nodes. | 07-31-2014 |
20140214771 | STORAGE DEVICE AND METHOD FOR CONTROLLING THE SAME - The present invention provides the function of dynamically switching the allocation of snapshot data in a pool according to the use status of the pool. More specifically, the present invention provides the function of dynamically switching a storage mode to be applied to the pool from a storage mode in which the snapshot data is aggregated in a specific pool volume to a storage mode in which the snapshot data is distributed to plural pool volumes, or from the storage mode in which the snapshot data is distributed to the plural pool volumes to the storage mode in which the snapshot data is aggregated in the specific pool volume, according to the use status of the pool. | 07-31-2014 |
20140244588 | CLOUD PLATFORM FOR MANAGING DESIGN DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a first source file, the first source file including one or more first computer-aided design models; converting the first source file into a first plurality of files; generating a first snapshot, the first snapshot including the first source file, the first plurality of files, and a first version; receiving a second source file, the second source file having the first format that is readable by the first application, the second source file including one or more second models, the second source file being an updated version of the first source file; converting the second source file into a second plurality of files; generating a second snapshot; and associating the second snapshot with the first snapshot, where the second snapshot being a more recent version than the first snapshot. | 08-28-2014 |
20140250081 | CREATING VALIDATED DATABASE SNAPSHOTS FOR PROVISIONING VIRTUAL DATABASES - Virtual databases are provisioned using point-in-time copies of a source database. Transaction logs received from the source database are applied to a point-in-time copy of the source database to create recovery milestones comprising database blocks that can be used to provision virtual databases. The recovery milestones are created in advance of receiving a request to provision a virtual database. Each recovery milestone is validated to determine that a consistent database snapshot can be created using the recovery milestone. If a problem is identified that prevents creation of a consistent database snapshot, the problem is fixed before creating the next recovery milestone. In response to receiving a request to provision a virtual database corresponding to a point in time, a recovery milestone is identified and transaction logs applied to the recovery milestone to create a database snapshot corresponding to the requested point in time. | 09-04-2014 |
20140258238 | METHOD TO EMBED SNAPSHOT MANAGEMENT INTO VIRTUAL MACHINE INSTANCES - A snapshot agent executing on a virtual desktop allows a user to both create snapshots of the VM image hosting the virtual desktop and to revert that VM instance to such snapshots. In addition to a snapshot agent that executes within a given VM instance, another embodiment provides a user with network access to a portal snapshot management interface, e.g., via a web application. The web application can present the list of VM instances, and snapshots for each such VM instance, owned by an authenticated user. The user can then interact with the web application to create a new snapshot for (or revert to) an existing snapshot for the owned VM instances. | 09-11-2014 |
20140258239 | LOCATING PREVIOUS VERSIONS OF AN OBJECT IN A STORAGE CLUSTER - Technology for accessing previous versions of data objects within a storage cluster including multiple storage volumes under a common namespace is disclosed herein. In some embodiments, the network storage cluster having multiple cooperative storage nodes receives a namespace identifier for a previous version of a data object. The namespace identifier includes a namespace path containing a volume junction and a time indicator indicating a point in time when the previous version of the data object existed. The network storage cluster identifies a storage volume within the network storage cluster using the volume junction. The volume junction points to a root directory of a file system of the storage volume. The network storage cluster locates, based on the namespace path, the previous version of the data object within a snapshot copy of the storage volume, wherein the snapshot copy is identified by the time indicator. | 09-11-2014 |
20140279919 | HIERARCHICAL SYSTEM MANAGER ROLLBACK - Data state rollover is performed based on data state snapshots and deltas. A series of snapshots is taken of the current data state, an original data state, and data states in between. Deltas are then generated between two sequential snapshots. This results in numerous deltas which represent the difference between consecutive snapshots. Once the deltas are acquired, the deltas may be stored along with the snapshot of the present data state. As such, previous data states may be rolled back to by determining the number of deltas to apply to the current data state to achieve the desired previous data state. In cases where the rollback or rollover fails, deltas may be played against the current data state to a point where the last known trusted and working data point existed. | 09-18-2014 |
20140279920 | LOG RECORD MANAGEMENT - A database system may maintain a plurality of log records at a distributed storage system. Each of the plurality of log records may be associated with a respective change to a data page. The plurality of log records may be transformed (e.g., cropped, prune, reduce, fused, deleted, merged, added, etc.). | 09-18-2014 |
20140317059 | INSTANT DATA CENTER RECOVERY - Facility for providing backup and restore of all data center components including physical machines, virtual machines, routers, networks, sub-networks, switches, firewall, directory lookup, DNS, DHCP and internet access. Virtual or physical machines are associated to data center components and a software defined network, storage, and compute infrastructure is provided. | 10-23-2014 |
20140330786 | COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR REVISION CONTROL OF INTEGRATED CIRCUIT LAYOUT RECIPE FILES - Computer-implemented methods and systems for providing revision control of integrated circuit device layout recipe files are provided. In an exemplary embodiment, a computer-implemented method for providing revision control of integrated circuit device layout recipe files includes storing recipe configuration files and recipe library files. Further, the method provides a user access to the recipe configuration files and recipe library files. The method includes creating with a computer a version snapshot of a selected recipe configuration file as revised by the user and of the other recipe configuration files and recipe library files as existing when the selected recipe configuration file is opened by the user. Further, the method includes providing the user access to all version snapshots for optical proximity correction (OPC) simulation. | 11-06-2014 |
20140372381 | METHODS AND APPARATUS FOR DATA RESTORE AND RECOVERY FROM A REMOTE DATA STORE - Methods, apparatus, and computer-accessible storage media for restoring data from a snapshot to a data volume. The blocks in the volume may be treated as an implicit tree structure, for example a binary tree; each local block corresponds to a block on the snapshot. A local block on the volume may be marked, for example fingerprinted with metadata, to indicate that the local block has not been restored. Initially, the local block at the root node is marked. To restore a local block, the restore process may generate a list indicating all local blocks on a path from the root node of the tree to the target node that have not been restored. The marks in the local blocks are used in generating the list. For each block indicated in the list, children of the block are fingerprinted, and the block is restored from the snapshot. | 12-18-2014 |
20150019493 | SYSTEMS AND METHODS FOR PROVIDING AN EVENTUALLY-CONSISTENT SNAPSHOT OF NODES IN A STORAGE NETWORK - Systems and methods which provide for obtaining snapshots of one or more nodes, while having minimal impact on performance and throughput of the storage network are provided. Embodiments may involve a method of obtaining snapshots of individual node data within a clustered storage network having a plurality of nodes without requiring quiescing of every node. The snapshots may be obtained in a rolling fashion, e.g., moving across the individual nodes of a cluster either sequentially or non-sequentially. In other embodiments snapshots may be obtained in an asynchronous manner. The obtained snapshots then collectively define an eventually consistent view of the entire system. Such a view may be utilized to provide for mirroring functionality, e.g. to provide for DR and/or HA capabilities. | 01-15-2015 |
20150019494 | SPECULATIVE RECOVERY USING STORAGE SNAPSHOT IN A CLUSTERED DATABASE - A method for recovery in a database is provided in the illustrative embodiments. A failure is detected in a first computing node, the first computing node serving the database in a cluster of computing nodes. A snapshot is created of data of the database. A subset of log entries is applied to the snapshot, the applying modifying the snapshot to result in a modified snapshot. An access of the first computing node to the data of the database is preserved. Responsive to receiving a signal of activity from the first computing node during the applying and after a grace period has elapsed, the applying is aborted such that the first computing node can continue serving the database in the cluster. | 01-15-2015 |
20150019495 | CUSTOMIZABLE STORAGE SYSTEM FOR VIRTUAL DATABASES - A database storage system provides replication capability that allows data from a source database and application specific data from a source application to be replicated respectively to a target database storage system and a target application, thereby creating a virtual database and a virtual application. The database storage system generates a plurality of snapshots of the virtual database at a corresponding plurality of time points and a plurality of snapshots of the virtual application at the corresponding plurality of time points. The database storage system associates the plurality of snapshots of the virtual database with the plurality of snapshots of the virtual application at the corresponding plurality of time points so as to generate a historical time-sequence of concurrent modifications to both the virtual database and the virtual application at the one or more development environments, thereby allowing concurrent read/write and rollback, of data and applications. | 01-15-2015 |
20150019496 | VIRTUAL DATABASE REWIND - A database storage system allows users to modify the state of a virtual database. The database storage system provides a respective virtual database (VDB) at a respective destination, the respective VDB having a first timeflow stored in a respective container. A user can send a request to rewind a VDB. The request identifies timeflow of the VDB and a state of the VDB associated with a timeflow. The database storage system modifies the virtual database to refer to database blocks associated with a snapshot of the VDB associated with the identified timeflow. The database storage system maintains a new timeflow for the modified VDB. The database storage system also allows the virtual database to be refreshed to a state of a source database. The source database can be a database stored in an external system or a virtual database stored within the database storage system. | 01-15-2015 |
20150032699 | STORAGE CONTROLLER, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN CONTROLLING PROGRAM, AND METHOD FOR CONTROLLING - A storage controller that generates multiple versions of a snapshot of a storing device and that includes a first calculator that counts a first number of segments updated in a first snapshot that is to be deleted among the multiple versions of the snapshot but not updated in a second snapshot of a successive version to the first snapshot, a second calculator that counts a second number of segments updated in the second snapshot, and a determining processor that determines, when the first number is the second number or more, that the second snapshot and the first snapshot are a merging source and a merging destination in merging processing, respectively, and determines, when the first number is less than the second number, that the first snapshot and the second snapshot are the merging source and the merging destination, respectively, the merging source being merged into the merging destination. | 01-29-2015 |
20150039564 | Reusing Snapshots in a Network Data Management Protocol Backup Operation - Mechanisms, in a data processing system, are provided for performing a data management operation. These mechanisms identify one or more defined groups of data elements that are a target of the data management operation. One or more previously generated snapshot files associated with the one or more defined groups are identified and a determination is made as to whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. The data management operation is performed based on the determination of whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. | 02-05-2015 |
20150052108 | METHOD, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM FOR OBTAINING SNAPSHOTS OF DATA - A method includes requesting a source database system including a source database table to record a transaction log including a plurality of transaction log entries that are representative of transactions including modifications of the source database table and to create a snapshot of the source database table during the recording of the transaction log. For each of a plurality of snapshot entries in the snapshot, one or more validity time intervals during which the snapshot entry is valid are determined on the basis of the transaction log. The snapshot entry is valid as long as it matches a corresponding entry in the source database table. A point in time at which a number of valid ones among the plurality of snapshot entries is maximum is determined. The calculated point in time is returned as an approximate value of a point in time at which the snapshot was created. | 02-19-2015 |
20150058295 | Data Persistence Processing Method and Apparatus, and Database System - A data persistence processing method is disclosed, where the method includes: adding the dirty page identifier to a checkpoint queue each time when a dirty page is generated in a database system memory; determining an active group and a current group in the checkpoint queue, and successively dumping, to a disk, the dirty pages corresponding to the active group on a preset checkpoint occurrence occasion, where the dirty pages are currently prepare to be dumped to the disk, and a group inserted with a dirty page that is newly added is the current group; and determining a next active group if last dumping is completed, and successively dumping, to the disk, the dirty pages corresponding to the next active group on the checkpoint occurrence occasion. The method improves the dumping efficiency of the dirty pages. | 02-26-2015 |
20150066859 | MEMORY FIRST LIVE SNAPSHOT - The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine including a memory and an original disk file. The method further includes copying, by a hypervisor, data from the memory to a storage device to form a memory snapshot. The method further includes pausing the virtual machine and creating a new disk file at a reference point-in-time. The original disk file is a backing file of the new disk file. The method further includes resuming the virtual machine. The virtual machine is to perform disk operations using the new disk file after the reference point-in-time. The method further includes copying the original disk file to a disk snapshot file. The method further includes providing the live snapshot including the disk snapshot file and the memory snapshot. | 03-05-2015 |
20150066860 | METHOD AND APPARATUS FOR UTILIZING VIRTUAL MACHINE INSTANCE INFORMATION FROM A DATABASE FOR SOFTWARE DEFINED CLOUD RECOVERY - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 03-05-2015 |
20150074059 | Undoing an Action in a Media Player - A method for automatically undoing an action in a music player application is provided. A method includes storing a first state in a media application. The first state may include at least one of: a list of one or more media items listed in a first order, and a first time position in a first media item of the one or more media items. An action changing the first state to a second state may be received. Next, a request to undo the action changing the first state to the second state may be received, and the first state may be restored based on the stored first state. The method may also include presenting a list of one or more prior actions and each prior action may change the media application to a corresponding state different from a preceding state. | 03-12-2015 |
20150074060 | FILE MANAGER INTEGRATION WITH VIRTUALIZATION IN AN INFORMATION MANAGEMENT SYSTEM WITH AN ENHANCED STORAGE MANAGER, INCLUDING USER CONTROL AND STORAGE MANAGEMENT OF VIRTUAL MACHINES - A storage manager that interoperates with a file manager application that integrates with virtualization substantially enables end-user control and storage management of virtual machines (VMs). The storage manager may manage information management operations relative to virtual machines based on and/or in response to messages and/or instructions received from the file manager application. The storage manager may further report results to the file manager application for presentation to the user. The file manager application, which may operate as a plug-in for a legacy file manager executing on a user's client computing device, may comprise: displaying the VMs associated with the user, including their respective properties; enabling viewing/browsing of information about storage management operations for a VM such as backups and/or archiving, including files associated with the VM and searching and filtering criteria; control features that enable the user to control existing VMs, such as shut down, restart/activate/power-on, suspend, and/or re-configure, and also perform storage management of a VM and/or its associated files, such as create snapshot, back up, archive, restore VM from secondary storage, restore and overwrite VM, restore file(s)/folder(s) to user's client computing device, restore file(s)/folder(s) to a production VM in primary storage, etc.; control features that enable the user to provision additional VMs, such as create a new VM, create a clone VM, configure a VM, etc. | 03-12-2015 |
20150106338 | FREQUENT DATA SET CAPTURES FOR VOLUME FORENSICS - Techniques, including systems and methods, take frequent captures of data sets for the purpose of forensic analysis. The data set captures are taken at the block level in various embodiments. Data set captures are used to instantiate forensic storage volumes that are attached to computing instances. The computing instances can access data in the forensic storage volumes at a state corresponding to a specified capture time. A user can select different capture times to re-instantiate the forensic storage volume to see how the forensic storage volume changed between captures. | 04-16-2015 |
20150112941 | BACKUP MANAGEMENT SYSTEM AND METHOD THEREOF - A backup management system includes a backup manager and a number of agents. Each of the agents is in communication with the backup manager and with each other through a network. Each of the agents includes at least one virtual machine (VM). Any agent of the number of agents can send a backup request to the backup manager when the agent needs to back up the at least one VM. The backup manager can instruct the agent how to back up the at least one VM to another agent of the number of agents. | 04-23-2015 |
20150112942 | ELECTRONIC BACKUP OF APPLICATIONS - Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes receiving, while a current view of an application is displayed in a user interface, a first user input requesting that a history view associated with the current view of the application be displayed, retrieve data associated with the history view, determining a presentation format for the data, and displaying the history view in response to the first user input in accordance with the presentation format, the history view including data associated with at least a first visual representation of an earlier version of the current view of the application. | 04-23-2015 |
20150112943 | METHOD AND SYSTEM FOR BACKUP AND RECOVERY - For data backup and recovery based on linked file repositories with each of the linked file repositories representing an individual file system capable of storing at least one version of a file and being connected to at least one server system, each of the linked file repositories are placed in a certain position for storing a certain version of the file. Each position of each of the linked file repositories is continuously numbered. A number of the versions of the file are determined by the position of the one of the linked file repositories. | 04-23-2015 |
20150120669 | TECHNIQUES FOR CREATING A BOOTABLE IMAGE IN A CLOUD-BASED COMPUTING ENVIRONMENT - Various embodiments are generally directed to an apparatus, method and other techniques for receiving a request to generate a bootable image in a cloud-based computing environment, creating a block storage volume in the cloud-based computing environment in response to receiving the request, the block storage volume having one or more partitions. Further, an apparatus, method and so forth may include installing software comprising one or more files in a file system on the block storage volume in the cloud-based computing environment, creating a snapshot of the file system including the software in the cloud-based computing environment, and creating a bootable image from the snapshot of the file system in the cloud-based computing environment. | 04-30-2015 |
20150120670 | METHODS AND APPARATUS FOR STORING AND TRANSMITTING HISTORICAL CONFIGURATION DATA ASSOCIATED WITH INFORMATION TECHNOLOGY ASSETS - Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets are disclosed. The system reads and stores a first version of data with a timestamp. The system then performs a local update by reading a second version of data with a timestamp, replacing the first set of data and timestamp, and storing the changes between the first and second versions of data. The system also may receive update requests from a remote location for the latest version of data. The changes between versions of data are sent to the remote location, where the changes between versions of data are stored and are usable to create the requested latest version of data and/or prior versions of data. | 04-30-2015 |
20150127614 | POINT IN TIME SNAPSHOTS USING COPY ON PREDICTED WRITE - Systems and methods of writing to a storage system comprise analyzing a plurality of snapshots of data blocks of a storage device and determining a likelihood that a next first write will be to a respective data block based, at least in part, on the analyzed plurality of snapshots. A snapshot is then taken of a selected data block based, at least in part, on the respective likelihood for the selected data block, before receiving a write request to the selected data block. A write request to a respective data block is then received and data is written to the respective data block, if the snapshot of the respective data block had been taken. If the snapshot of the respective data block had not been taken, then a snapshot of the respective data block. Then data is written to the respective data block. | 05-07-2015 |
20150134617 | VOLUME SNAPSHOT IN A SHARED ENVIRONMENT - A system may receive information associated with a write operation to be performed on a data volume. The data volume may be maintained by one or more cloud resources within a cloud computing environment. The system may determine that a snapshot of the data volume is to be created based on receiving the information associated with the write operation. The system may generate a snapshot command based on determining that the snapshot is to be created. The system may create snapshots at the one or more cloud resources based on the snapshot command. The snapshot command may be issued at each of the one or more cloud resources to cause the snapshots to be consistent across the one or more cloud resources. The system may store the snapshots. | 05-14-2015 |
20150142747 | Snapshot Generating Method, System, and Apparatus - Embodiments of the present invention relate to a snapshot generating method, computer system, and apparatus, which can determine a plurality of virtual machines where an application runs and a deployment server where the plurality of virtual machines is deployed, and send a snapshot instruction to the deployment server of the plurality of virtual machines, so that the deployment server of the plurality of virtual machines can start snapshot operations on the plurality of virtual machines at consistent time points according to the snapshot instruction, so as to generate snapshot files of the plurality of virtual machines at the consistent time points, thereby implementing unified snapshots on the plurality of virtual machines where the application runs and ensuring consistency among backup data of the application. | 05-21-2015 |
20150142748 | COMPUTERIZED METHODS AND APPARATUS FOR DATA CLONING - Systems and methods for creating a live copy of a data object from a production system for use by third party applications. The systems and methods include receiving at least one request for a copy of production data from an application; creating a live backup copy; creating a flash copy of the live backup copy, and a flash copy bitmap; creating a modified version of the live backup copy by changing a subset of data in the live backup copy; recording the changed subset of data using the flash copy bitmap; mounting, the modified version of the live backup copy to the application; and transforming the modified version of the live backup copy back to the live backup copy when unmounting the modified version of the live backup copy of the production data from the application by applying changes associated with the flash copy bitmap to the live backup copy. | 05-21-2015 |
20150293815 | PREDICTING STORAGE CAPACITY AND PERFORMANCE REQUIREMENTS OF A BACKUP SOLUTION - Techniques are described for predicting the storage capacity and performance requirements for deploying and maintaining a backup solution within an enterprise. In particular, a backup system is described which uses an initial pilot phase, during which the system can gather information about the files and data on each end user's device (i.e., client device) that will be backed up and provide a more realistic estimate and resource planning for the backup solution deployment. This initial pilot phase can be performed before any content is actually backed up from the client devices. | 10-15-2015 |
20150309881 | CENTRALIZED EXECUTION OF SNAPSHOT BACKUPS IN A DISTRIBUTED APPLICATION ENVIRONMENT - Systems and methods for centralizing database manipulation for a plurality of heterogeneous databases are disclosed. A single or limited number of central servers can be used to manage a plurality of hosted client systems. With such a technique, database consistent backups can be performed without requiring altering of the central server, even when different database engines are used across the hosted client systems. | 10-29-2015 |
20150324386 | FILE SERVICE USING A SHARED FILE ACCESS-REST INTERFACE - In various embodiments, methods and systems for providing access to file systems are provided. An SFA-based operation having an operation modifier for a file in a file system is received. The SFA-based operation is defined based on a file-representational state transfer (REST) interface. The SFA-REST interface comprises integrated functionality of an SFA protocol and REST protocol. The SFA-based operation is executed using the operation modifier. A REST-based operation for the file in the distributed file storage is received. The REST-based operation is defined based on the SFA-REST interface. The operation modifier is referenced in order to execute the REST-based operation. The REST-based operation based on the SFA-REST interface. A schema can be implemented for accessing the file system. The schema includes tables to store files, the table comprises fields corresponding to elements of a SFA-REST interface. A snapshot component can be implemented to backup file shares in the file system. | 11-12-2015 |
20150331756 | POINT-IN-TIME SNAP COPY MANAGEMENT IN A DEDUPLICATION ENVIRONMENT - In accordance with one embodiment of the present description, a logical file unit containing a set of data stored in cache or other memory and mapped by a reference pointer to a physical file unit in a storage, may be overwritten with new data in the memory without first read/write copying the data in memory to a new logical file unit in the file system. Instead, the original physical file unit of data in the storage is preserved and the original reference pointer for the original physical file unit of data may be used to map a new logical file unit in the file system to the original physical file unit storing the original set of data. Other aspects are described. | 11-19-2015 |
20150347430 | TECHNIQUES FOR ENABLING COARSE-GRAINED VOLUME SNAPSHOTS FOR VIRTUAL MACHINE BACKUP AND RESTORE - A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium. | 12-03-2015 |
20160004721 | REPLICATING LOCAL FILE SYSTEMS AS RESPECTIVE LUNS IN A STORAGE ARRAY, USING BLOCK-LEVEL DATA TRANSFERS AND ENHANCED STORAGE MANAGERS, DATA AGENTS, AND MEDIA AGENTS IN AN INFORMATION MANAGEMENT SYSTEM - Systems and methods are disclosed for block-level incremental replication of a local file system in a source volume/partition to a storage array—replicated to a single logical disk designated by a logical unit number (LUN) with a single volume/partition corresponding to the source. From the perspective of the storage array, non-native data (e.g., data in a local file system residing in locally-attached storage) may be backed up to a LUN that is native to the storage array and thus available for any number of subsequent LUN-based operations. Enhanced data agents, media agents, and storage manager(s), including replication storage policies, operate in concert with the storage array to execute successive file-system-to-LUN block-level replication jobs to protect the data in the local file system. | 01-07-2016 |
20160012071 | Immediate Recovery Of Virtual Machine Using Deduplication Device and Snapshots | 01-14-2016 |
20160019317 | VOLUME OR VIRTUAL MACHINE LEVEL BACKUP AND GENERATING PLACEHOLDERS FOR VIRTUAL MACHINE FILES - According to certain aspects, a method can include creating a backup copy of data associated with a virtual machine (VM) on one or more secondary storage devices, wherein the backup copy includes corresponding secondary copies of a plurality of files associated with the VM; analyzing metadata associated with the secondary copies to determine which of the plurality files are eligible to be removed from the primary storage device; in response determining that one or more files are eligible to be removed from the primary storage device, for respective file of the one or more files: determining whether the respective file has been changed since a first time at which the backup copy of the data associated with the VM was created; in response to determining that the respective file has not changed since the first time, removing the respective file; and adding a file placeholder for the removed file. | 01-21-2016 |
20160034356 | BACKUP OPERATIONS IN A TREE-BASED DISTRIBUTED FILE SYSTEM - Techniques for cloning, writing to, and reading from file system metadata. Cloning involves identifying a first set of pointers included in a first root node in a file system metadata tree structure that stores file system metadata in leaf nodes of the tree structure, creating a first copy of the first root node that includes the first set of pointers, creating a second copy of the first root node that includes the first set of pointers, associating the first copy with a first view, and associating the second copy with a second view. Reading generally involves traversing the tree structure towards a target leaf node that contains data to be read. Writing generally involves traversing the tree structure in the same manner, but also creating copies of any nodes to be modified if those nodes are deemed to have a different treelD than a particular root node. | 02-04-2016 |
20160042090 | PRESERVING THE INTEGRITY OF A SNAPSHOT ON A STORAGE DEVICE VIA EPHEMERAL WRITE OPERATIONS IN AN INFORMATION MANAGEMENT SYSTEM - A pseudo-storage-device driver is employed to configure pseudo-volumes that correspond to respective snapshots in a storage array. Each pseudo-volume is mounted as a recovery point instead of the corresponding snapshot. Instead of writing changes to the snapshots, the changes—typically modifications to metadata associated with the snapshot—are managed via the pseudo-volume. Metadata changes that arise in the context of mapping, mounting, and/or using a snapshot are written to the pseudo-volume, in a data structure referred to as a “private store.” Information management operations that need metadata associated with the snapshot are directed to the private store for the latest updates to the metadata. After the information management operation ends, the pseudo-volumes are unmounted and the updates in the private store are discarded. Because no changes were made to the snapshot, no changes need to be reversed. Accordingly, the illustrative system preserves the integrity of the snapshots through any number of information management operations that may generate metadata changes. Moreover, because the illustrative system is agnostic as to whether a given storage device is persistent-type or not, there is less burden on administration and also less risk of error. | 02-11-2016 |
20160048429 | Back-Up Storage For Home Network - An embodiment of the present invention is a technique to provide back-up storage. A service is searched for back-up storage from a device on a home network. The device advertises presence on the home network. The device is queried for information on the back-up storage. The device is configured to receive a file using the information. The file is transferred to the device. | 02-18-2016 |
20160062846 | CONSOLIDATED PROCESSING OF STORAGE-ARRAY COMMANDS USING A FORWARDER MEDIA AGENT IN CONJUNCTION WITH A SNAPSHOT-CONTROL MEDIA AGENT - The illustrative systems and methods consolidate storage-array command channels into a media agent that executes outside the production environment. A “snapshot-control media agent” (“snap-MA”) is configured on a secondary storage computing device that operates apart from client computing devices. A “forwarder” media agent operates on each client computing device that uses the storage array, yet lacks command channels to the storage array. Likewise, a “forwarder” proxy media agent may operate without command channels to the storage array. No third-party libraries or storage-array-command devices are installed or needed on the host computing device. The forwarder media agent forwards any commands directed at the storage array to the snap-MA on the secondary storage computing device. The snap-MA receives and processes commands directed at the storage array that were forwarded by the forwarder media agents. Responses from the storage array are transmitted to the respective forwarder media agent. The snap-MA advantageously pools any number of storage-array-command devices so that capacity limitations in regard to communications channels at the storage array may be avoided. As a result, the snap-MA operating in conjunction with the forwarder media agents enable the illustrative system to consolidate the communication of storage-array commands away from client computing devices and/or proxy media agent hosts and into the secondary storage computing device that hosts the snap-MA. | 03-03-2016 |
20160063014 | METHODS AND SYSTEMS FOR CREATING AND REMOVING VIRTUAL MACHINE SNAPSHOTS BASED ON GROUPS OF METRICS - Techniques are described herein which minimize the impact of virtual machine snapshots on the performance virtual machines and hypervisors. In the context of a volume snapshot which may involve (i) taking virtual machine snapshots of all virtual machines associated with the volume, (ii) taking the volume snapshot, and (iii) removing all the virtual machine snapshots, the virtual machine snapshots may be created in a first order and removed in a second order. Specifically, snapshots for busy virtual machines (i.e., virtual machines with higher disk write activity) may be created last and removed first. Consequently, snapshots of busy virtual machines are retained for the shorter periods of time, thereby minimizing the effect of virtual machine snapshots on those virtual machines (and their associated hypervisors) that would be most negatively impacted by virtual machine snapshots. | 03-03-2016 |
20160077920 | SNAPSHOTS AND FORKS OF STORAGE SYSTEMS USING DISTRIBUTED CONSISTENT DATABASES IMPLEMENTED WITHIN AN OBJECT STORE - A method is described that includes providing a snapshot counter for a storage system implemented with multiple distributed consistent database instances. The method further includes recognizing the taking of a snapshot of the storage system by incrementing the snapshot counter from a first snapshot counter value to a second snapshot counter value. The method further includes, in response to a first change for one of the distributed consistent databases subsequent to the taking of the snapshot, performing the following: saving state information of the distributed consistent database as the state information existed prior to the change and associating the first snapshot counter value to the state information. Associating the second snapshot counter's value with the distributed consistent database having the first change. Another method for the taking of a snapshot of a distributed consistent database is also described. | 03-17-2016 |
20160078044 | MAIN-MEMORY DATABASE CHECKPOINTING - The present invention extends to methods, systems, and computer program products for main-memory database checkpointing. Embodiments of the invention use a transaction log as an interface between online threads and a checkpoint subsystem. Using the transaction log as an interface reduces synchronization overhead between threads and the checkpoint subsystem. Transactions can be assigned to files and storage space can be reserved in a lock free manner to reduce overhead of checkpointing online transactions. Meta-data independent data files and delta files can be collapsed and merged to reduce storage overhead. Checkpoints can be updated incrementally such that changes made since the last checkpoint (and not all data) are flushed to disk. Checkpoint I/O is sequential, helping ensure higher performance of physical I/O layers. During recovery checkpoint files can be loaded into memory in parallel for multiple devices. | 03-17-2016 |
20160092313 | Application Copy Counting Using Snapshot Backups For Licensing - Technologies are described herein to use snapshot backups for licensing. Some example technologies may access a snapshot backup that is taken during an execution of a virtual machine on a server. One or more snapshot backups may be examined to detect applications that executed on the server at a time the snapshot backup was taken. A determination may be made as to what applications that were identified are subject to a license. Licensing information may be provided that includes information associated with the one or more of the applications that are subject to the license. | 03-31-2016 |
20160092534 | DATABASE SNAPSHOTS - Techniques herein are for creating a database snapshot by creating a sparse database. A method involves receiving a creation request to create a sparse database. The creation request has an identity of a parent database. The creation request is processed to create a sparse database. The sparse database has the identity of the parent database. The sparse database does not contain data copied from the parent database. A write request to write data into the sparse database is received. The write request is processed by writing the data into the sparse database. The parent database does not receive the data. | 03-31-2016 |
20160124977 | DATA MANAGEMENT SYSTEM - Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine. | 05-05-2016 |
20160140253 | Platform for Continuous Graph Update and Computation - A continuous stream data (e.g., messages, tweets) is received by ingest nodes of a platform. The ingest nodes may analyze the data to create a transaction of graph updates, assign a sequence number to the transaction, and distribute the graph updates with the sequence number to graph nodes of the platform. The graph nodes may store graph updates from ingest nodes, and then the ingest nodes may report graph update progresses in a progress table. A snapshot may be taken based on the progress table, and then graph-mining computation may be implemented. Tolerate failures and decaying may be supported and incremental expansion may be allowed to cope with increasing update rates and computation needs. | 05-19-2016 |
20160154707 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS | 06-02-2016 |
20160154709 | POINT-IN-TIME BACKUPS OF A PRODUCTION APPLICATION MADE ACCESSIBLE OVER FIBRE CHANNEL AND/OR ISCSI AS DATA SOURCES TO A REMOTE APPLICATION BY REPRESENTING THE BACKUPS AS PSEUDO-DISKS OPERATING APART FROM THE PRODUCTION APPLICATION AND ITS HOST | 06-02-2016 |
20160162499 | CUSTOMIZED SYNTHETIC DATA CREATION - A computing system for generating synthetic data in a relational database management system is provided. The computing system includes a processor configured to execute a plurality of programmatic threads and a relational database structure component having information indicative of a structure of the relational database management system. The processor is configured to receive values information relative to the synthetic data and to execute, substantially simultaneously, a plurality of synthetic data generation threads using the information indicative of the structure of the relational database management system and the values information. | 06-09-2016 |
20160170834 | BLOCK DATA STORAGE SYSTEM IN AN EVENT HISTORIAN | 06-16-2016 |
20160179629 | SYSTEM AND METHOD FOR DOMAIN NAME SYSTEM RESTORE POINTS | 06-23-2016 |
20160196297 | METHOD AND SYSTEM FOR TIME-STAMPING A DOCUMENT THE STATE OF WHICH CHANGES OVER TIME | 07-07-2016 |
20160203056 | Apparatus, snapshot management method, and recording medium | 07-14-2016 |
20170235649 | CONTAINER AWARE NETWORKED DATA LAYER | 08-17-2017 |
20170235754 | De-Duplication-Based Remote Replication Method, and Apparatus | 08-17-2017 |
20220138048 | DATA CONNECTOR COMPONENT FOR IMPLEMENTING MANAGEMENT REQUESTS - Techniques are provided for implementing management requests associated with objects of an object store. A data connector component may be instantiated as a container for processing management requests associated with backup data stored within an object store as an object according to an object format. A management request associated with the backup data may be received by the data connector component. A structure associated with the object having the object format may be traversed by the data connector component to identify the backup data. The data connector component may be implemented upon the backup data stored within the object. | 05-05-2022 |
20220138149 | FILE LEVEL INCREMENTAL CONTINUOUS DATA PROTECTION - Creating point-in-time versions of files for applications at a storage system includes maintaining at the storage system a data structure correlating each of a plurality of applications with files for each of the applications and correlating each of the files with portions of the data storage system, using the data structure to determine specific files for a particular one of the applications for which a point-in-time version is being created, using the data structure to determine specific portions of the storage system corresponding to the specific files, suspending writes to the specific portions, completing previous writes to the specific portions following suspending writes, and performing a snapshot of the specific files following completing previous writes. The portions of the data storage may be extents. A host may provide information to the storage system to correlate applications with files and to correlate files with portions of the data storage system. | 05-05-2022 |
20220138150 | MANAGING CLUSTER TO CLUSTER REPLICATION FOR DISTRIBUTED FILE SYSTEMS - Embodiments are directed to managing data in a file system over a network. A source file system and a target file system associated based on a replication relationship associated with snapshot policies. Snapshots may be generated on the source file system based on snapshot policies such that each snapshot is an archive of the source file system. The snapshots may be added to a queue on the source file system that may be associated with the replication relationship such that the snapshot is associated with a snapshot retention period that is local to the source file system and a remote replication retention period based on the replication relationship. Copying the snapshot to the target file system based on the remote replication retention period being unexpired. | 05-05-2022 |
20220138152 | FULL AND INCREMENTAL SCANNING OF OBJECTS - Techniques are provided for on-demand creation and/or utilization of containers and/or serverless threads for hosting data connector components. The data connector components can be used to perform integrity checking, anomaly detection, and file system metadata analysis associated with objects stored within an object store. The data connector components may be configured to execute machine learning functionality to perform operations and tasks. The data connector components can perform full scans or incremental scans. The data connector components may be stateless, and thus may be offlined, upgraded, onlined, and/or have tasks transferred between data connector components. Results of operations performed by the data connector components upon base objects may be stored within sibling objects. | 05-05-2022 |
20220138153 | CONTAINERIZATION AND SERVERLESS THREAD IMPLEMENTATION FOR PROCESSING OBJECTS - Techniques are provided for on-demand creation and/or utilization of containers and/or serverless threads for hosting data connector components. The data connector components can be used to perform integrity checking, anomaly detection, and file system metadata analysis associated with objects stored within an object store. The data connector components may be configured to execute machine learning functionality to perform operations and tasks. The data connector components can perform full scans or incremental scans. The data connector components may be stateless, and thus may be offlined, upgraded, onlined, and/or have tasks transferred between data connector components. Results of operations performed by the data connector components upon base objects may be stored within sibling objects. | 05-05-2022 |