Entries |
Document | Title | Date |
20100070478 | RETRIEVAL AND RECOVERY OF DATA CHUNKS FROM ALTERNATE DATA STORES IN A DEDUPLICATING SYSTEM - One aspect of the present invention includes retrieving and recovering data chunks from alternate data stores in a storage management system which utilizes deduplication. In one embodiment, deduplication information for data chunks of data objects is stored at a system-wide level to enable the transfer and access of data chunks stored among multiple storage pools. When a data object is accessed on a first storage pool that contains damaged or inaccessible data chunks, the undamaged and accessible chunks may be retrieved from the first storage pool, in addition to retrieving an undamaged copy of the damaged or inaccessible data chunks from alternate data storage pools. Thus, a complete data object can be retrieved or recovered with a combination of chunks from the first storage pool and other storage pools within the storage management system, without requiring the entire data object to be retrieved from a backup source. | 03-18-2010 |
20100082551 | DATA PLACEMENT TRANSPARENCY FOR HIGH AVAILABILITY AND LOAD BALANCING - A method of updating a clone data map associated with a plurality of nodes of a computer system is disclosed. The clone data map includes node identification data and clone location data. A node failure event of a failed node of the computer system that supports a primary clone is detected. The clone data map is updated such that a secondary clone stored at a node other than the failed node is marked as a new primary clone. In addition, clone data maps may be used to perform node load balancing by placing a substantially similar number of primary clones on each node of a node cluster or may be used to increase or decrease a number of nodes of the node cluster. Further, data fragments that have a heavy usage or a large fragment size may be reduced in size by performing one or more data fragment split operations. | 04-01-2010 |
20100082552 | BACKING UP AND RESTORING SECURITY INFORMATION FOR SELECTED DATABASE OBJECTS - A mechanism to selectively restore portions of a monolithically backed up database, while maintaining security relationships associated with the restored portions of the database is provided. Embodiments of the present invention provide a method, system and computer-readable storage medium for receiving a request to restore a selected object from among a plurality of backed up objects in a database backup, accessing security-related information associated with the selected object in the database backup, restoring the selected object using the information associated with the selected object in a target area, and associating elements of the security-related information with the restored selected object. | 04-01-2010 |
20100094811 | Apparatus, System, and Method for Virtual Storage Access Method Volume Data Set Recovery - An apparatus, system, and method are disclosed for Virtual Storage Access (VSAM) Volume Data Set (VVDS) recovery. A store module stores a data set name and data set characteristics for a data set in a recovery table when the data set is defined under a Z/OS® operating system. The recovery table indexed by the data set name. A retrieve module retrieves a Z/OS® Volume Table of Contents (VTOC) entry indexed by the data set name. In addition, the retrieve module retrieves the data set characteristics from the recovery table using the data set name. A recover module combines the data set characteristics and the VTOC entry to recover a Z/OS® VVDS entry. | 04-15-2010 |
20100106691 | REMOTE BACKUP AND RESTORE - In one embodiment of the present invention, a data-backup method includes partitioning a fingerprint namespace among a cluster of backup servers, the fingerprint namespace comprising fingerprints for representing units of data, each backup server of the cluster of backup servers managing units of data having fingerprints corresponding to an assigned partition of the fingerprint namespace. The method further includes receiving backup information from a client computing device for a block of data comprising units of data, the backup information including at least a fingerprint for each of the units of data and client-specific backup information. In addition, the method includes, utilizing the fingerprint for each of the units of data, deduplicating the units of data in parallel at the cluster of backup servers in accordance with the partitioning step, the deduplicating step comprising identifying ones of the units data already stored by the cluster of backup servers. | 04-29-2010 |
20100121822 | JOB LOG PROCESSING APPARATUS AND COMPUTER-READABLE MEDIUM - A job log collection unit cooperates with job log management programs of copying machines to collect job logs held in the copying machines and store the collected job logs in a job log storage unit. A user change history creation unit refers to a human resource database to thereby determine whether a section which each user belongs to has been changed or not in a range of newly collected job logs. The user change history creation unit creates a user change history for each user who has encountered the change and stores the user change history in a user change history storage unit. A job log aggregation unit classifies the job logs of the job log storage unit into user sections by referring to the user change history of the user change history storage unit and aggregates the job logs in accordance with each section. | 05-13-2010 |
20100121823 | COMPUTER-READABLE RECORDING MEDIUM STORING CLUSTER SYSTEM CONTROL PROGRAM, CLUSTER SYSTEM, AND CLUSTER SYSTEM CONTROL METHOD - A computer-readable recording medium stores a cluster system control program controlling a cluster system in which clustered nodes are connected to a shared disk having a journaling file system. The cluster system control program causes a computer to execute a request reply information generation procedure for, when a request is accepted from a client, generating request reply information including an identification number identifying the request and reply data to respond to the request from the client, and a saving procedure for saving the request reply information generated by the request reply information generation procedure in the journaling file system. | 05-13-2010 |
20100125554 | Memory Recovery Across Reboots of an Emulated Operating System - Approaches for recovering state data between boot sessions of an emulated operating system (OS). An OS is emulated on a host OS. In response to each memory acquire request from the emulated OS, an interface to the host OS returns a memory area for use by the emulated OS and stores allocation data associated with the memory area. The allocation data includes an address referencing the memory area and a boot sequence number that indicates a boot session of the emulated OS. While booting the second emulated OS to a current boot session, the stored allocation data is retrieved from the interface, and in response to the stored allocation data including a selected boot sequence number, data from the memory area referenced by the address in the allocation data is stored in retentive storage by the second OS. | 05-20-2010 |
20100125555 | EFFICIENT UNDO-PROCESSING DURING DATA REDISTRIBUTION - A method and system for facilitating an undo operation. In one embodiment, the method includes generating a plurality of control files, where each of the control files is associated with a batch of data that is received from a sending partition during a redistribution process, and where each control file includes a list of pages and corresponding ranges of rows of data that have been appended to the pages. The method also includes writing the control files to a persistent memory for each control file where all of the associated rows of the respective consistency point have been appended to pages and written to a persistent memory. The method also includes, in response to an interruption in the redistribution process, identifying pages and rows to be deleted during an undo operation based on the plurality of control files. | 05-20-2010 |
20100138396 | Information Processing Apparatus, Divided Management Server, Information Processing Method, Divided Management Method, Program and Information Processing System - There is provided an information processing apparatus including a blocking unit that acquires holding block information, which is information about blocks to be held by a local apparatus, about a data file divided into a plurality of blocks among other information processing apparatuses excluding the local apparatus for divided management and held by the local apparatus and divides the data file to be held by the local apparatus based on the holding block information; and a storage unit that records the blocks of the data file identified by the holding block information with the blocks associated with data file identification information, which is information to identify the data file. | 06-03-2010 |
20100161563 | SMART MEDIATION SYSTEM IN A SERVICE ORIENTED ARCHITECTURE - In one embodiment, a service mediator provides a service that is a composite of atomic services and executes a recovery pattern in the event that a service is not available. More particularly, in an initial phase of operation, the service mediator determines one or more recovery patterns for each atomic service offered in the composite service and stores in a database an identity of each such recovery pattern for each atomic service. In subsequent operation, the service mediator monitors the availability of each atomic service. When a user inquires of a composite service, the service mediator determines if any of its atomic services is unavailable. If an atomic service is unavailable, the service mediator selects a recovery pattern and executes it. | 06-24-2010 |
20100161564 | CLUSTER DATA MANAGEMENT SYSTEM AND METHOD FOR DATA RECOVERY USING PARALLEL PROCESSING IN CLUSTER DATA MANAGEMENT SYSTEM - Provided is a method for data recovery using parallel processing in a cluster data management system. The method includes arranging a redo log written by a failed partition server, dividing the arranged redo log by columns of the partition, and recovering data parallelly on the basis of the divided redo log and multiple processing unit. | 06-24-2010 |
20100161565 | CLUSTER DATA MANAGEMENT SYSTEM AND METHOD FOR DATA RESTORATION USING SHARED REDO LOG IN CLUSTER DATA MANAGEMENT SYSTEM - Provided are a cluster data management system and a method for data restoration using a shared redo log in the cluster data management system. The data restoration method includes collecting service information of a partition served by a failed partition server, dividing redo log files written by the partition server by columns of a table including the partition, restoring data of the partition on the basis of the collected service information and log records of the divided redo log files, and selecting a new partition server that will serve the data-restored partition, and allocating the partition to the selected partition server. | 06-24-2010 |
20100185589 | DISASTER RECOVERY DATA SYNC - Various embodiments for failure recovery in a computing environment following a data restoration are provided. A catalog locate is performed for each of a plurality of data sets on a base catalog structure (BCS), identifying a plurality of BCS entries. If a first BCS entry is cataloged incorrectly, the first BCS entry is designated to be re-cataloged. The plurality of BCS entries is compared with a plurality of volume table of contents and a plurality of VSAM volume data set (VTOC/VVDS) entries. If a second BCS entry found in the plurality of BCS entries is not found in the plurality of VTOC/VVDS entries, and the second BCS entry indicates that a data set associated with the second BCS entry is located on a volume, an attempt is made to vary on the volume. If the volume cannot be varied on, a request is created to restore the volume. | 07-22-2010 |
20100185590 | AUTONOMIC INFORMATION MANAGEMENT SYSTEM (IMS) MAINFRAME DATABASE POINTER ERROR DIAGNOSTIC DATA EXTRACTION - A method and system for autonomic Information Management System (IMS) mainframe database pointer error diagnostic data extraction. A receiving module may receive a database name and an error detection time. An error detection module may locate database pointer errors on the failed IMS database. A list module may generate an Image Copy (IC) list corresponding to the failed database. A code generation module may generate Job Control Language (JCL) code for the selected entries in the IC list. An execution module executes the JCL code which operates a pointer checker utility on each clean IC. A log list module locates log data sets recorded in the time between the error and when the error was detected and an extraction module extracts an evaluation log list which comprises evaluation log data sets. | 07-22-2010 |
20100185591 | COMPUTER READABLE MEDIUM AND INFORMATION MANAGEMENT SYSTEM - An information management method includes: when management subject information corresponds to the second location and another pieces of management subject information having the same contents as the management subject information is made correspond to the second location, deleting the said another management subject information except for the management subject information previously associated with the second location. Also, the method includes: changing the corresponding destination of the management subject information to a first location from the second location. And the method includes: when the management subject information is associated with plural pieces of restoration information, changing another corresponding destination from the second location to a location designated among plural first locations respectively shown by plural pieces of restoration information. | 07-22-2010 |
20100198794 | METHOD AND DEVICE FOR DATA RECOVERY USING BIT LOGGING - A method and apparatus for data recovery in a multitasking or multithreading environment is provided. The method includes creating a log record by performing bit-by-bit logging with respect to a lowest level bitmap of a multilevel bitmap, recovering the lowest level bitmap using the log record, and correcting a higher level bitmap corresponding to the lowest level bitmap based on the recovered lowest level bitmap. | 08-05-2010 |
20100198795 | SYSTEM AND METHOD FOR RESTORING A VIRTUAL DISK FROM A SNAPSHOT - A method and apparatus are disclosed for restoring a virtual disk (vdisk) in a data storage system as the vdisk was at an earlier time. Pointers are maintained to point to data represented by the vdisk. The pointers are saved to persistent storage at the earlier time. The data at the earlier time is maintained on the data storage device. A pointer pointing to data represented by the vdisk at a later time is compared with the pointers saved at the earlier time. If the pointer from the later time matches the pointer saved at the earlier time, keeping the pointer from the later time in the active file system. If the pointer from the later time does not match the pointers saved at the earlier time, copying a set of pointers associated with the pointer saved at the earlier time to the active file system. | 08-05-2010 |
20100262584 | Disinfecting a file system - A method and apparatus for disinfecting an infected electronic file in a file system. A file system is scanned using an anti-virus application to identify the infected electronic file. Once the infected file has been identified, information identifying the infected electronic file is sent to a remote node, which queries a database storing a plurality commonly used electronic files to determine whether a clean version of the electronic file is stored at the database. If so, then all or part of the clean version of the infected electronic file is sent from the remote node, and used to replace all or part of the electronic file stored in the file system. | 10-14-2010 |
20100306177 | HOST OPERATING SYSTEM INDEPENDENT STORAGE-RELATED REMOTE ACCESS AND OPERATIONS - An embodiment may include circuitry that may be comprised in a host that may execute an operating system and/or in a server. The circuitry may generate, at least in part, and/or receive, at least in part, at least one request to initiate, at least in part, at least one operation at the host. The least one operation may facilitate, at least in part, examination remotely from the host of information stored at the host. The at least one operation may be performed independently from the operating system and also may be performed at least in part by the circuitry. The examination may facilitate, at least in part, remotely from the host, backup, recovery, and/or determination of corruption of mass storage data stored at the host. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment. | 12-02-2010 |
20100306178 | SEPARATING FILE DATA STREAMS TO ENHANCE PROGRESSIVE INCREMENTAL PROCESSING - Systems, methods, and computer products for separating file data streams for improved progressive incremental processing are provided. The method comprises identifying data in a file, prior to transmission of the data in a data stream to a second system, such that the second system can distinguish first data from second data in the file. The method further comprises processing the first and second data to determine whether the first or second data has changed, and transmitting the first data to the second system in response to determining the first data has changed, so that the first data is stored in a data storage medium in association with third and fourth data previously stored without replacing the third data and fourth data, wherein the third and fourth data comprise older versions of the first and second data, respectively. | 12-02-2010 |
20100312753 | FILE MANAGEMENT APPARATUS, METHOD, AND PROGRAM - A disclosed method includes acquiring and a forward log and extracting forward file operations applied to files in an order of applying these from the forward log, specifying generation rules for generating backward file operations with reference to the forward file operations, generating the backward file operations by the specified generation rules and recording these, and applying the forward file operations to the files not having the extracted forward file operations applied and also applying the backward file operations to the files having the forward file operations applied to recover the files not having the forward file operations applied. | 12-09-2010 |
20100318497 | Unobtrusive Copies of Actively Used Compressed Indices - Unobtrusive Copies of Actively Used Compressed Indices Methods, devices and systems to make compressed backup copies of in-use compressed database indices are described. In general, an “oldest” time at which index pages in working memory had been updated is identified. Compressed index pages may be directly copied without the need to bring them into working memory or uncompressing them. The identified “oldest” time is then associated with the compressed backup copy. In some embodiments, an entire compressed backup copy may be associated with a single point in time (e.g., the identified “oldest” time). In other embodiments, a compressed backup copy may be associated with multiple points in time (e.g., one time for each portion of the compressed index that is being backed-up). Compressed indices copied in accordance with the invention may be used during restore operations to reconstruct database indices using the identified “oldest” time and database log files. | 12-16-2010 |
20100332459 | DATA PROCESSING DEVICE AND METHOD - For hierarchical data including tuples each including a combination of different data types and lists each listing data of a same data type, corresponding attribute-based data divided by attribute is stored in attribute-based files whereas information on the structure of the hierarchical data is held as schema information. The schema information includes data type information on the hierarchical data structure, including data type information on each element of each tuple and data type information on only a top element of each list. The attribute-based files storing the attribute-based data are managed to be in order by a file name management table. Data on each attribute is stored in a file in a state of being hierarchized in a list format corresponding to the depth at which the each attribute is listed in the schema information. When performing analysis processing: a required attribute is specified; files of only the specified attribute are opened; the initial data structure is restored using the schema information; and data analysis processing is performed. | 12-30-2010 |
20110125716 | METHOD FOR FINDING AND FIXING STABILITY PROBLEMS IN PERSONAL COMPUTER SYSTEMS - A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer. | 05-26-2011 |
20110131187 | SNAPSHOT STORAGE AND MANAGEMENT SYSTEM WITH INDEXING AND USER INTERFACE - A system and method of managing stored data in a storage management system. The storage management system includes a storage manager, a media agent connected to the storage manager, and a primary volume connected to the media agent. A plurality of snapshots are taken of the primary volume. The snapshots are indexed by associating respective information with the snapshot. The indexed snapshots are copied to a recovery volume. In this way, browsing features are enabled for the user. The user may view the snapshots in a hierarchical format, and may even view snapshot data in association with the corresponding application. The resultant recovery volume may be used to replace a primary volume. | 06-02-2011 |
20110178992 | FILE MANAGEMENT METHOD OF SERVER - A file management method of a server is implemented on a Linux operating system of the server. The method includes the steps of determining if there is a file deleted; when the result is yes, searching for an actual disk block location at which the deleted file is originally located and then recovering the deleted file; moving the recovered file to a predetermined location; and changing an access privilege level of the Linux operating system. | 07-21-2011 |
20110184915 | CLUSTER RESTORE AND REBUILD - Architecture that facilitates the restoration of a cluster database in a scalable way using backups (e.g., SQL database backups) and a partition rebuild mechanism to achieve a high level of partition level data consistency, even when restore fails on individual machines and/or machine failure occurs. The architecture restores replicas of the partitions in consideration that the backups may be created at different points and at different times. Optimized parallelism is achieved in restoring each database machine using local backups, which eliminates cross-machine network traffic. Thus, fast recovery of the distributed database can be accomplished on the order of hours over thousands of machines and terabytes of data. | 07-28-2011 |
20110202507 | Apparatus, System, and Method for Volume-Level Restoration of Cluster Server Data - A setup module saves disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks. A copy module copies data with a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed. A reset module rewrites the saved disk signatures to the cluster disks. | 08-18-2011 |
20110238629 | UNCORRECTABLE ERROR HANDLING SCHEMES FOR NON-VOLATILE MEMORIES - Systems and methods are provided for handling uncorrectable errors in a non-volatile memory (“NVM”), such as flash memory, during a garbage collection operation. | 09-29-2011 |
20110252003 | SYSTEM AND METHOD FOR PROCESSING DATA - According to one embodiment of the present invention there is provided a method of processing status data relating to elements of a network. The method comprises receiving status data relating to elements of the network, obtaining status data modification data, modifying at least some of the received status data in accordance with the status data modification data, and generating tree map data using the modified data. | 10-13-2011 |
20110252004 | METHOD AND SYSTEM FOR DATA REDUCTION - A “forward” delta data management technique uses a “sparse” index associated with a delta file to achieve both delta management efficiency and to eliminate read latency while accessing history data. The invention may be implemented advantageously in a data management system that provides real-time data services to data sources associated with a set of application host servers. A host driver embedded in an application server connects an application and its data to a cluster. The host driver captures real-time data transactions, preferably in the form of an event journal that is provided to the data management system. In particular, the driver functions to translate traditional file/database/block I/O into a continuous, application-aware, output data stream. A given application-aware data stream is processed through a multi-stage data reduction process to produce a compact data representation from which an “any point-in-time” reconstruction of the original data can be made. | 10-13-2011 |
20110320409 | GUARANTEED IN-FLIGHT SQL INSERT OPERATION SUPPORT DURING AN RAC DATABASE FAILOVER - The present invention is directed to methods and systems of implementing a guaranteed SQL insert operation. In one embodiment, the method may include initiating an SQL insert operation for a database, receiving an SQL exception indicating that a failover for the database has occurred, and in response to the SQL exception, caching the SQL insert operation and caching the SQL insert operation as an SQL merge operation. The method further includes determining that a primary key is associated with the SQL insert operation, and in response to determining that a primary key is associated with the SQL insert operation, executing the SQL merge operation. | 12-29-2011 |
20120084265 | CONFIGURING A DATA PROTECTION SYSTEM - A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a containment relationship identifying a direct relationship between a first object of the first Namespace and a second object of the first Namespace. Moreover, the system includes a junction relationship linking the second object of the first Namespace to a first object of the second Namespace. In one embodiment, the system is configured to facilitate the recovery of information based on the descriptions of the Namespaces that is maintained. | 04-05-2012 |
20120089576 | ITEM LEVEL RECOVERY - A backup and restore system may present recovered backup data as local resources and in a read and write manner so that the recovered backup data may be accessed using an application that created the data. In some embodiments, the recovered data may be read only data, but a differencing virtual hard disk (VHD), Common Internet File System protocol, or differencing driver may be used to present a read/write version of the data. Additionally, the data may be presented using iSCSI or other technologies to present the data as local data, even though the data may be remotely located. The backup and restore system may additionally use VHD differencing technologies to create multiple backups. | 04-12-2012 |
20120109899 | CONFIGURING A DATA PROTECTION SYSTEM - A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a containment relationship identifying a direct relationship between a first object of the first Namespace and a second object of the first Namespace. Moreover, the system includes a junction relationship linking the second object of the first Namespace to a first object of the second Namespace. In one embodiment, the system is configured to facilitate the recovery of information based on the descriptions of the Namespaces that is maintained. | 05-03-2012 |
20120117031 | APPARATUS, SYSTEM AND METHOD FOR RECOVERING META DATA USING FRAGMENTARY INFORMATION - Disclosed are an apparatus, a system, and a method for recovering meta data using fragmentary information. The system for recovering meta data includes: a data server storing recovery information for recovering at least one data file and meta data related to each of the data file; and a meta data server storing the meta data related to the data files and receiving the recovery information from the data server when the meta data are lost to recover the lost meta data. By this configuration, the exemplary embodiment of the present invention stably can the lost meta data of the meta data server by using the recovery the meta data and prevent the phenomenon that the meta data collides with each other on the same directory hierarchical structure. | 05-10-2012 |
20120117032 | INFORMATION PROCESSING DEVICE, ELECTRONIC APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing device including: a storage device in which a plurality of files are stored in a file group in which a plurality of files are associated with one another and in a file group format in which the association is regulated, and which is able to delete a stored file; and a control unit that is able to restore a file that is deleted from files that are stored in the storage device, wherein in a case when a file that is stored in the storage device is deleted, the control unit restores a deleted file and restores the restored file to a file structure according to a file group format by arranging a file that matches a file group format in a structure of a file group format based on a restored file. | 05-10-2012 |
20120150814 | CLIENT-SIDE REPOSITORY IN A NETWORKED DEDUPLICATED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage. | 06-14-2012 |
20120185440 | METHOD AND APPARATUS FOR PROVIDING ADDRESS BOOK RESTORATION - An apparatus for providing address book restoration includes at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus to receive an instruction to restore a record associated with a contact previously deleted from each of at least two synchronized address books, and recover the record from a deleted file repository at which the record was stored prior to deletion of the record, the deleted file repository being a memory location different than the address books. A corresponding method and computer program product are also provided. | 07-19-2012 |
20120191662 | Service Oriented Architecture Related Smart Mediation - In one embodiment, a service mediator provides a service that is a composite of atomic services and executes a recovery pattern in the event that a service is not available. More particularly, in an initial phase of operation, the service mediator determines one or more recovery patterns for each atomic service offered in the composite service and stores in a database an identity of each such recovery pattern for each atomic service. In subsequent operation, the service mediator monitors the availability of each atomic service. When a user inquires of a composite service, the service mediator determines if any of its atomic services is unavailable. If an atomic service is unavailable, the service mediator selects a recovery pattern and executes it. | 07-26-2012 |
20120209816 | Collaborative Information Source Recovery - Systems and methods of recovering a shared information source can involve identifying a first user of a shared information source in response to detection of a data loss with respect to the shared information source. One or more additional users of the shared information source may be identified based on data associated with the first user. Additionally, the shared information source can be recovered based at least in part on data associated with the one or more additional users. | 08-16-2012 |
20120215746 | SYSTEM FOR BACKING UP AND RESTORING DATA - In one example, a system that is operable to back up and restore data may include a high efficiency storage application configured to back up a chunk of data of a client system to a content addressed storage system by generating a recipe that includes instructions for generating the chunk of data from a plurality of data pieces. The system may further include a backup server communicably connected to the high efficiency storage application and configured to, among other things, in response to receipt of a restore request, recover the chunk of data by retrieving the recipe and appended storage addresses in one index seek without separately looking up a storage address for any of the plurality of data pieces in an index. | 08-23-2012 |
20120221528 | LOGGING SCHEME FOR COLUMN-ORIENTED IN-MEMORY DATABASES - According to some embodiments, a column-oriented in-memory database structure may be established. The database structure may, for example, include a main store and a dictionary compressed delta store. Moreover, the delta store may comprise a value identifier vector and a delta dictionary associated with a column of the database. A transaction associated with the column may then be received and recorded within the delta store. According to some embodiments, entries associated with the transaction may be added to a value log of the value identifier vector and, independently, to a dictionary log of the delta dictionary. | 08-30-2012 |
20120226666 | System and Methods for Remotely Recovering and Purging Data From a Wireless Device in a Communications Network - A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device. | 09-06-2012 |
20120239626 | Method and Apparatus for Restoring Service Label Information - Multiple service label types may be used in a given network element to optimize scalability of the data plane, minimize overhead associated with service label management, and allow new services to be offered. Service label management may be done in a dynamic manner so that service labels may be selected for routes in a dynamic fashion as the network changes. VPNs handled by the network element may have different types of service labels, and different routes within a particular VPN may be allocated different service label types. Service label requests may be stored on the data plane to allow a service label request database to be restored from the data plane upon a control plane failure, so that new service labels are not required to be allocated after a control plane failure. | 09-20-2012 |
20120259818 | System And Method For Hierarchical Recovery Of A Cluster File System - Hierarchical recovery of failed computing nodes to operative computing nodes within a cluster of computing nodes is managed by initiating a recovery leader at an operative node that retrieves management information from the operative nodes and applies the management information to recover filesets of a meta-fileset in a hierarchical filesystem. The use of hierarchical filesets throughout the cluster provides more rapid failover by distributing recovery load across computing nodes and supporting recovery of nodes in parallel. | 10-11-2012 |
20120259819 | METHOD AND SYSTEM FOR PERFORMING A CLEAN FILE LOCK RECOVERY DURING A NETWORK FILESYSTEM SERVER MIGRATION OR FAILOVER - A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server migration from one node of the cluster to a different node of the cluster. A migration count is incremented, wherein the migration count is stored at each of the nodes comprising the cluster. File lock services are paused at each of the nodes comprising the cluster. The network file system server migration is completed at the different node of the cluster. The migration count is then decremented in response to the completion. File lock services are then resumed at each of the nodes comprising cluster. | 10-11-2012 |
20120259820 | METHOD AND SYSTEM FOR RESTARTING FILE LOCK SERVICES AT AN ADOPTIVE NODE DURING A NETWORK FILESYSTEM SERVER MIGRATION OR FAILOVER - A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server fail over from one node of the cluster to an adoptive node of the cluster. File lock services are then stopped at the adoptive node. File lock services are subsequently restarted at the adoptive node, wherein the restart causes the adoptive node to commence a grace period for other network file system clients to connect to the adoptive node and reclaim file locks. After restarting file lock services, a cluster file system is updated on the adoptive node with process identifiers, and file lock services are resumed at the adoptive node. The cluster file system can be simultaneously exposing the file lock services to other clients as well, like CIFS, etc. | 10-11-2012 |
20120278289 | ACCESS CONTROLLER THAT CONTROLS ACCESS TO FILES BY USING ACCESS CONTROL LIST - Each time the file access request is received, it is discriminated whether there is an ACL which corresponds with the file system of the type following the switching in the file designated by the file access request. In cases where the judgment result is that there is no such ACL, an ACL which corresponds with the file system of the type following the switching is generated on the basis of an ACL which corresponds with the file system of the type prior to the switching which is associated with the designated file, and the ACL thus generated is used to control access in accordance with the received file access request. | 11-01-2012 |
20120284236 | Systems, Methods, and Computer Program Products for Instant Recovery of Image Level Backups - Systems, methods, and computer program products are provided for instant recovery of a virtual machine (VM) from a compressed image level backup without fully extracting the image level backup file's contents to production storage. The method receives restore parameters, initializes a virtual storage, and attaches the virtual storage to a hypervisor configured to launch a recovered VM. The method stores virtual disk data changes inflicted by a running operating system (OS), applications, and users in a changes storage. The method provides the ability to migrate the actual VM disk state (taking into account changed disk data blocks accumulated in changes storage) so as to prevent data loss resulting from the VM running during the recovery and accessing virtual storage, to production storage without downtime. In embodiments, the method displays received restore parameters in an interactive interface and delivers the recovery results via an automated message. | 11-08-2012 |
20120290540 | DATABASE RECOVERY BY CONTAINER - A method includes identifying a buddy database projection that corresponds to a recovering database projection that is to be recovered to a recovering node of a database system. A source container containing data of the buddy database projection is identified on a source node of the database system, the source container being characterized by a range of epochs that includes an epoch for which data is to be recovered to the recovering node. Data is copied from the identified source container to the recovering node. | 11-15-2012 |
20120296874 | Data Recovery Systems and Methods - Nearline disaster recovery (“nearline DR”) storage systems and methods that permit the use of previously restored stored data from a near time period by virtual applications operating off a backup storage location during the period of disaster recovery at a primary site. This is generally referred to as a “nearline DR storage process.” | 11-22-2012 |
20120303588 | DATA DE-DUPLICATION PROCESSING METHOD FOR POINT-TO-POINT TRANSMISSION AND SYSTEM THEREOF - A data de-duplication processing method for point-to-point transmission and a system thereof. An originating client sends a file recovery request to an information management server and a data storage server; obtaining a plurality of partitioned data blocks; if the partitioned data block in the file recovery request in the information management server, the information management server searches for the data storage server according to the file recovery request and returns the found data storage server and the partitioned data block belonging to the data storage server to the originating client as a response; if the partitioned data block in the file recovery request in a target client, the target client transports the partitioned data block to the originating client; the originating client performs data recovery of an input file on the partitioned data blocks according to the partitioned data blocks obtained from the target clients and the data storage server. | 11-29-2012 |
20120303589 | Method and Device for Mobile Terminal Scene Management and Backup Recovery - A method for mobile terminal scene management and backup recovery is disclosed, including: setting different scenes, dividing terminal applications into general local settings, local applications and third party installation applications, presetting status saving formats of each application under different scenes to be used for recovering applications accordingly under the different scenes; the terminal storing the activation hierarchical relationship of the applications and the call relationship between the applications under the different scenes; when a scene is saved, saving global configuration, and each activated application recording the current usage status as a scene record according to the preset status saving format; when a scene is recovered, recovering the global configuration for the selected scene according to the saved global configuration, and then according to the activation hierarchical relationship and the call relationship between the applications under this scene, starting the applications one by one based on the scene record. | 11-29-2012 |
20120310894 | METHODS AND APPARATUS FOR INTERFACE IN MULTI-PHASE RESTORE - Methods and apparatus to restore resources to a device according to an order of the resources requested by a user are described. The restoration may be interrupted in response to a user request to update an order to restore remaining resources yet to restore. The remaining resources may be restored according to the updated order. | 12-06-2012 |
20120323857 | Method for Restoring Software Applications on Desktop Computers - An automated method is provided for restoring software applications installed on a desktop computer. Information identifying an inventory of software applications resident on the computer is stored locally in a file on the computer. In response to a request to restore applications, the inventory is compared to a master library of known software applications, and those applications in the inventory that are found in the library are selected and downloaded onto the computer to complete the restoration process. | 12-20-2012 |
20130006945 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 01-03-2013 |
20130024427 | Method and Apparatus for Recovering Database Backup - A method and an apparatus for recovering a database backup is provided by the present invention, wherein the method comprises: backing up an old version database, wherein table structures of the old version database are stored; clearing records of all tables in a new version database, and acquiring table structures of the new version database; comparing the table structures of the old version database with the table structures of the new version database, and determining that the table structures changes; and recovering a backup of the old version database into the new version database according to a type of the change and a corresponding preset strategy. The forward compatibility of database backup recovery is achieved by the present invention. | 01-24-2013 |
20130046736 | RECOVERING METHOD AND DEVICE FOR LINUX USING FAT FILE SYSTEM - A recovery method applied to the FAT file system in a Linux operating system is provided. The method includes steps of: fetching an FAT chain corresponding to a file; determining whether at least an index entry contained in the FAT chain is valid; and modifying one of the at least one index entry to be valid when the modified entry is examined as invalid. Through the recovery method, FAT files, specifically having FAT chain entries which are invalid or inferring file sizes larger than the maximum length representable by the FAT file system, can be efficiently recovered in the Linux system to minimize data loss as well as to prevent a system crash. | 02-21-2013 |
20130066837 | RECOVERING STATEFUL READ-ONLY DATABASE SESSIONS - A process, apparatus, and computer-readable medium are provided for rebuilding a database session when a previous database session becomes unavailable and the commands previously sent for execution on the previous database session satisfy certain criteria. The process includes determining whether or not a set of commands sent by a client for execution on the previous database session is acceptable to replay based at least in part on whether or not the set of commands satisfies one or more criteria. The process further includes determining that the previous database session is unavailable. In response to determining that the previous database session is unavailable, if the set of commands is acceptable for replay, the set of commands is sent for execution on a new database session to rebuild the state on the new database session. The process masks the outage from the application. | 03-14-2013 |
20130117234 | Database Log Parallelization - A plurality of transactions in a data storage application are executed during which log entries according to the plurality of transactions are stored in a plurality of log buffers. The log entries are sequentially written into a current log buffer and the plurality of log buffers are written to a plurality of log partitions according to a round-robin distribution. Thereafter, in response to a data recovery event, a sequential list of the log entries in the log buffers are assembled to generate a log that can be used for data recovery by the data storage application. Related apparatus, systems, techniques and articles are also described. | 05-09-2013 |
20130144842 | FAILOVER AND RESUME WHEN USING ORDERED SEQUENCES IN A MULTI-INSTANCE DATABASE ENVIRONMENT - An approach is disclosed for implementing failover and resume when using ordered sequences in a multi-instance database environment. The approach commences by instantiating a first database instance initially to serve as an active instance, then instantiating a second database instance to serve as an instance of one or more passive instances. The active database establishes mastership over a sequence and then processes requests for the ‘next’ symbol by accessing a shared sequence cache only after accessing a first instance semaphore. The active instance and the passive instance perform a protocol such that upon passive database detection of a failure of the active database, one of the passive database instances takes over mastership of the sequence cache, and then proceeds to satisfy sequence value requests. The particular order is observed in spite of the failure. | 06-06-2013 |
20130173558 | DATABASE RECOVERY PROGRESS REPORT - The present description refers to a computer implemented method, computer program product, and computer system for receiving a start time, selecting one or more database objects for which a database recovery progress report is to be provided, determining, based on an object recovery table generated by the database recovery utility, which of the selected database objects have been recovered since the start time, and outputting a database recovery progress report that identifies at least a number or percentage of the selected database objects that have been recovered by the database recovery utility since the start time. | 07-04-2013 |
20130173559 | ELECTRONIC DEVICE, STORAGE MEDIUM, AND METHOD FOR RECOVERING DELETED FILES OF THE ELECTRONIC DEVICE - In a method to recover deleted files of an electronic device, properties of a file are stored into a file list of a storage system of the electronic device when the file is deleted from the electronic device. The method compresses the deleted file, and stores the compressed file in a hidden partition of the storage system. The method further obtains the compressed file from the hidden partition when the deleted file needs to be recovered. Then, the method decompresses the compressed file, and stores the decompressed file to an active partition in the electronic device. | 07-04-2013 |
20130246368 | SYSTEMS AND METHODS FOR SUPPORTING INLINE DELEGATION OF MIDDLE-TIER TRANSACTION LOGS TO DATABASE - Systems and methods are provided for supporting transaction recovery based on inline delegation of transaction logs to a database. The system can retrieve transaction recovery information of a transaction from a persistence store, wherein the transaction recovery information is persisted on a resource manager that is associated with the persistence store during a prepare phase. Furthermore, the system can retrieve one or more in-doubt transactions from one or more participating resource managers of the transaction. Then, the system can determine whether to commit or roll back the one or more in-doubt transactions by matching the one or more in-doubt transactions to the transaction recovery information. | 09-19-2013 |
20130262395 | APPARATUS AND METHODS FOR RESTORING DATA OBJECTS - The subject matter discloses a method for handling a data object. The method comprises the steps of storing a pointer to a physical location of the data object in a first data repository; associating, in the first data repository, the pointer with a logical location of the data object; receiving an event indicating a blocking of a user access to the data object; retrieving the pointer from the first data repository as a result of the receiving of the event; accessing the physical location by using the retrieved pointer; and copying the data object from the physical location to a second data repository, thereby enabling the restoring of said data object. | 10-03-2013 |
20130262396 | DATA STORAGE RECOVERY AUTOMATION - According to certain aspects, systems and methods are provided for automating recovery of a networked data storage environment. For instance, a system can generate a data recovery package configured to automatically carry out a process for recovering a data storage environment and/or associated data. The content of the particular workflow depends on the data storage environment, and can be defined by a user. | 10-03-2013 |
20130297566 | RECOVERING STATEFUL READ-ONLY DATABASE SESSIONS - A process, apparatus, and computer-readable medium are provided for rebuilding a database session when a previous database session becomes unavailable and the commands previously sent for execution on the previous database session satisfy certain criteria. The process includes determining whether or not a set of commands sent by a client for execution on the previous database session is acceptable to replay based at least in part on whether or not the set of commands satisfies one or more criteria. The process further includes determining that the previous database session is unavailable due to a planned or unplanned recoverable error. In response to determining that the previous database session is unavailable, if the set of commands is acceptable for replay, the set of commands is sent for execution on a new database session to rebuild the state, which was exposed to the client from the previous database session, on the new database session. The process masks the outage from the application. | 11-07-2013 |
20130339309 | DYNAMIC DISCOVERY OF STORAGE RESOURCE TOPOLOGY - In one aspect, dynamic determination generates a storage resource graph corresponding to a storage topology. The generating may comprise iterating through storage resources in the storage topology and using a discovery handler to generate a node in the storage resource graph corresponding to each of the iterated storage resources. Dynamic determination generates an operation graph by iterating through nodes in the storage resource graph and using an operating handler to generate operation-specific metadata corresponding to each iterated node of the storage resource graph. Dynamic generating executes the operation graph in a way specific to the operation. | 12-19-2013 |
20130339310 | RESTORE USING A CLIENT SIDE SIGNATURE REPOSITORY IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During restore operations, the system can use the client-side signature repository to identify data blocks located in primary storage. The system can source the identified data blocks from their respective locations within primary storage instead of the secondary storage for the restore operation. | 12-19-2013 |
20130346370 | Systems and Methods for Host Image Transfer - Methods and systems for transferring a host image of a first machine to a second machine, such as during disaster recovery or migration, are disclosed. In one example, a first profile of a first machine of a first type, such as a first client machine, is compared to a second profile of a second machine, such as a recovery machine or a second client machine of a second type different from the first type, to which the host image is to be transferred, by a first processing device. The first and second profiles each comprise at least one property of the first type of first machine and the second type of second machine, respectively. At least one property of a host image of the first machine is conformed to at least one corresponding property of the second machine. The conformed host image is provided to the second machine, via a network. The second machine is configured with at least one conformed property of the host image by a second processing device of the second machine. | 12-26-2013 |
20140089265 | Time Sequence Data Management - An apparatus, system, and method are disclosed for data management. The method includes writing data in a sequential log structure. The method also includes receiving a time sequence request from a client. The method further includes servicing the time sequence request based on a temporal order of the data in the sequential log structure. | 03-27-2014 |
20140156603 | METHOD AND AN APPARATUS FOR SPLITTING AND RECOVERING DATA IN A POWER SYSTEM - A method and an apparatus for splitting and recovering data in a power system are provided in the invention. The method includes the steps of setting a first database and a data recovery unit in a platform layer of the power system. The first database runs in a memory of the power system and is composed of the real-time image in the memory of a grid model and static parameters of a second database. The first database is used to provide the inquiry service of the grid model and static parameters for the power system. The data recovery unit is responsible for all of the associated read-write operations with the second database. After data are written into, the data recovery unit stores the data as historical data according to the time scale characters, and writes the historical data to the second database when the second database is normal. | 06-05-2014 |
20140164336 | METHOD FOR CODEC-BASED RECOVERY OF A VIDEO USING A CLUSTER SEARCH - A method for codec-based recovery of a video, which includes recovering an image by combining image decoding information and non-overwritten image frames, is provided. The method includes: a cluster extraction step of extracting a pre-cluster region; a region extraction step of extracting, from the pre-cluster region extracted in the cluster extraction step, an M frame region encoded using an MPEG-4 visual codec and an M decoding region; a combining step of combining the M frame region and the M decoding region extracted in the region extraction step and listing the combination; and a recovering step of decoding the M frame region and the M decoding region, listed in the combining step, to be recovered as an image. | 06-12-2014 |
20140317062 | AMETHOD AND APPARATUS FOR RECOVERING SQLITE FILE DELETED FROM MOBILE TERMINAL - The invention provides a method and device to recover deleted sqlite files on mobile terminal. The invention provides a method to preset several sqlite page feature rules. Perform following steps when a mobile terminal is detected: obtaining the image files of current mobile terminal; analyzing the image files of current mobile terminal and selling the search area; call at least one preset sqlite page feature rule according to the data features in the search area, and matching with the data in the search area based on the said sqlite page feature rule to capture the current sqlite page file fragment deleted by the mobile terminal; finally, decoding the data of sqlite page file fragment deleted on current mobile terminal. The invention provides a solution to obtain valid data from the uncovered page fragment of all deleted sqlite files in the mobile terminal, with a high recovery success rate and integrity. | 10-23-2014 |
20140337296 | TECHNIQUES TO RECOVER FILES IN A STORAGE NETWORK - Techniques to recover files in a storage network are described. A recovery manager application may manage file recovery operations for a file sharing application. The recovery manager application may comprise a recovery queue component to receive a request to recover a primary file deleted from a primary storage server. The recovery manager application may also comprise a file location component to locate a secondary file stored in a secondary storage server, the secondary storage server to comprise one of multiple secondary storage servers each configured to utilize a different file duplication technique, the secondary file to comprise a copy of the primary file. The recovery manager application may also comprise a file recovery component to retrieve the secondary file from the secondary storage server, and create a recovered primary file based at least in part on the secondary file. Other embodiments are described and claimed. | 11-13-2014 |
20150058297 | ADDING COOPERATIVE FILE COLORING PROTOCOLS IN A DATA DEDUPLICATION SYSTEM - For adding cooperative file coloring protocols in a data deduplication system using a processor device in a computing environment, a preferred character is represented for file coloring in a file using a code selected from a multiplicity of codes that represent a variety of contexts. The original meaning of the preferred character is retained when representing the preferred character for the file coloring by the code selected from the multiplicity of codes. | 02-26-2015 |
20150058298 | PARTITION TOLERANCE IN CLUSTER MEMBERSHIP MANAGEMENT - Techniques are disclosed for managing a cluster of computing nodes following a division of the cluster into at least a first and second partition, where the cluster aggregates local storage resources of the nodes to provide an object store, and objects stored in the object store are divided into data components stored across the nodes. In accordance with one method, it is determined that a majority of data components comprising a first object are stored within nodes in the first partition. It is determined that a majority of data components comprising a second object are stored within nodes in the second partition. Configuration objects are permitted to be performed on the first object in the first partition while denying access to the first object from the second partition, and on the second object in the second partition while denying access to the second object from the first partition. | 02-26-2015 |
20150081643 | CLASSIFYING AND MONITORING DATABASE OPERATIONS BASED ON A COST OF RECOVERY - A method of classifying and monitoring database operations based on a recovery cost may include receiving an indication of a recoverable operation. A count in a persistent storage, such as a catalog, corresponding to an occurrence of the recoverable operation is incremented. | 03-19-2015 |
20150095290 | METHOD AND DEVICE FOR IDENTIFYING AN APPLICATION TYPE OF UNKNOWN DATA - The present embodiments relate generally to a computer device, system and method of identifying an application type of unknown data. The method may include: determining that the unknown data corresponds to database information, the database information comprising at least one table with at least one column; for a column of a table in the database information, determining if a column identifier of the column comprises a keyword associated with a particular application type; and if the column identifier comprises the keyword, identifying data stored in the database as belonging to an application that is of the particular application type. | 04-02-2015 |
20150120673 | Method and System for Eliminating Backups in Databases - Methods, devices and systems enable restoring a database system more efficiently. A server computing device may be configured to determine a recovery time interval, periodically review database records to identify a database record that has not been updated within a most recent recovery time interval, add the identified database record to a journaling log, and update the identified database record to include information identifying a time at which the database record was last added to the journaling log. After detecting a failure event, the server computing device may perform the database operations identified in the journaling log to restore the database system. | 04-30-2015 |
20150309885 | METHOD AND DEVICE FOR PROCESSING DATA AND ELECTRONIC APPARATUS - A method and a device for processing data and an electronic apparatus are provided. The method comprises: obtaining recovery data and modification data when original data is modified, wherein the modification data is data obtained after modifying the original data, and the recovery data is data configured to recover at least a part of the modification data to data in the original data; executing one of the recovery data and the modification data; and executing the other one of the recovery data and the modification data when failing to executing one of the recovery data and the modification data. With the present disclosure, the problem that recovering the system or the system files causes the system unable to work normally is solved, and a stability of the system is enhanced. The present disclosure can be used in the solution for computer viruses. | 10-29-2015 |
20150331752 | METHOD OF DATA STORAGE ON CLOUD DATA CENTER FOR REDUCING PROCESSING AND STORAGE REQUIREMENTS BY ENGAGING USER EQUIPMENT - The invention relates to a method of storage of encoded blocks of files on user-equipment along with the datacenter. Files are coded on the user equipment and coded blocks are distributed among participating user end devices and the data center storage fabric. The storage of parts of file on the user equipment reduces the storage requirement at the data center and reconstruction at the user equipment releases the data center off the processing overhead. Similarly, North-South and East-West traffic is reduced since only a coded part of the file is transported to the data center unlike conventional data centers where entire files are stored on the data center. The invention reduces processing and storage overhead at the data center while reducing the amount of traffic generated for the data center. | 11-19-2015 |
20150355980 | RELIABLY RECOVERING STORED DATA IN A DISPERSED STORAGE NETWORK - A method begins by storage units of a dispersed storage network (DSN) receiving a retrieval request for a data object, where each storage unit stores a unique group of encoded data slices of the data object and a local set of encoded recovery data slices. The method continues with some storage units sending the unique group of encoded data slices to a requesting computing device and with one storage unit sending an encoded recovery data slice to the requesting computing device. The method continues with the requesting computing device identifying an errant unique group encoded data slice, correcting the errant encoded data slice based on received data slices to produce an updated unique group of encoded data slices, and dispersed storage error decoding the updated unique group of encoded data slices and the unique groups of encoded data slices from other storage units to recover the data object. | 12-10-2015 |
20150355981 | Hybrid SCM-DRAM Transactional Storage Engine For Fast Data Recovery - A data recovery system and method are disclosed. Primary data is stored a database in byte-addressable NVRAM, where the database includes one or more persistent tables of data in a byte-addressable, RAM format, and a persistent memory allocator that maps persistent memory pointers of the persistent memory to virtual memory pointers of a virtual memory associated with the database. Secondary data is stored in volatile DRAM. A failure recovery includes recovering the persistent memory allocator, mapping the persistent memory to the virtual memory to recover primary data using their persistent memory pointers, translating the persistent memory pointers to virtual memory pointers, undoing changes to the primary data made by unfinished transactions of the query execution at the time of failure of one of the one or more queries, and reconstructing the secondary data from the primary data. | 12-10-2015 |
20160011944 | STORAGE AND RECOVERY OF DATA OBJECTS | 01-14-2016 |
20160125017 | DETECTION OF DATA REPLICATION CONSISTENCY - A method, system, and computer program product for detecting consistency between first and second data replicas is provided. Detecting consistency between data replicas includes acquiring first characteristic information of a first data replica and second characteristic information of a second data replica, the first and second characteristic information being associated with keys of the respective first and second data replicas. Detecting consistency between data replicas further include determining, based on a predetermined threshold value of a number of determination times, whether the first characteristic information is identical to the second characteristic information of the second data replica. In response to the determining that the first characteristic information and the second characteristic information are identical, whether the first data replica is consistent with the second data replica may then be confirmed. | 05-05-2016 |
20160132398 | IMPLEMENTING CHANGE DATA CAPTURE BY INTERPRETING PUBLISHED EVENTS AS A DATABASE RECOVERY LOG - A method for implementing a change capture system using an event publishing system as a database recovery log is provided. The method may include determining a set of data based on a description of events for which change capture is possible. The method may also include selecting at least one item of data from within the determined set of data, wherein the at least one item of data requires change capture to be performed. Additionally, the method may include identifying at least one published event, wherein the at least one published event is produced by the event publishing system. The method may include instructing the event publishing system to deliver the at least one identified published event to the change capture system. Furthermore, the method may include receiving the at least one identified published event. The method may also include processing the at least one published event. | 05-12-2016 |
20160147778 | APPLYING A DATABASE TRANSACTION LOG RECORD DIRECTLY TO A DATABASE TABLE CONTAINER - Disclosed herein are system, method, and computer program product embodiments for directly restoring a database from a log volume. An embodiment operates by reading one or more database transaction log records from a log volume. The embodiment then loads from a database table persistent storage one or more pages containing rows in the database table that will be read from or written to by the one or more database transaction log records. The embodiment then loads a dictionary for each column associated with the one or more database transaction log records. The embodiment then applies the one or more database transaction log records directly into the one or more loaded pages and the one or more dictionaries. Each dictionary and page modified in memory is then written to the database table persistent storage when a savepoint operation is performed. | 05-26-2016 |
20160179630 | DATA ASSET RECONSTRUCTION | 06-23-2016 |
20160196190 | DATA ASSET RECONSTRUCTION | 07-07-2016 |
20220138055 | PARALLEL RESTORE OF A LARGE OBJECT - A request to restore an instance of an object that is stored in a storage associated with a cluster of nodes to a target destination is received. Data of the object is divided into a plurality of data portions. Corresponding data portions of the plurality of data portions are assigned to each node of a plurality of nodes of the cluster. It is determined that a first node of the cluster of nodes does not currently store in a storage associated with the first node at least a part of a corresponding data portion of the object assigned to the first node. At least the part of the corresponding data portion of the object assigned to the first node is received at the first node from a second node of the cluster of nodes. At least the part of the corresponding data portion of the object received from the second node is provided from the first node to the target destination. | 05-05-2022 |