Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Recoverability

Subclass of:

707 - Data processing: database and file management or data structures

707200000 - FILE OR DATABASE MAINTENANCE

707201000 - Coherency (e.g., same view to multiple users)

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20090157769FILE STORAGE SYSTEM AND METHOD FOR MANAGING DUPLICATE FILES IN FILE STORAGE SYSTEM - Provided are a file storage system, and a method for managing duplicate files in the file storage system. The file storage system that performs file duplication for error recovery includes a client for requesting generation of a duplicate file of a new file being stored, a metadata server for storing information associated with prestored duplicate files and determining whether a file that is identical to the new file is present among the prestored duplicate files, to limit a number of identical duplicate files to a preset number, and a data server comprising a file duplication unit and a storage unit for respectively performing file duplication and file storage under the control of the metadata server. Accordingly, file recovery can be performed while duplicate files in the system are minimized.06-18-2009
20090157768COMPUTER SYSTEM AND DATA LOSS PREVENTION METHOD - A primary storage system and a secondary storage system are connected via a copy network in this computer system. This computer system includes a measurement unit for measuring an update data input amount to be input into the primary update data storage area, a calculation unit for calculating a recovery point in each given period of time based on the measured update data input amount and the band of the copy network, and a comparison unit for comparing the calculated recovery point and a target recovery point to be pre-set as a target value for recovering the update data.06-18-2009
20090157766Method, System, and Computer Program Product for Ensuring Data Consistency of Asynchronously Replicated Data Following a Master Transaction Server Failover Event - A method, system, and computer program product for ensuring data consistency during asynchronous replication of data from a master server to a plurality of replica servers. Responsive to receiving a transaction request at the master server, recording in the plurality of replica servers a set of transaction identifiers within a replication transaction table stored in local memory of the plurality of replica servers. Responsive to receiving an acknowledgement signal from the plurality of replica servers, committing data resulting from the identified data operation within local memory of the master server. Responsive to a failover event that prevents the master server from sending a post commit signal to the at least one replica server, designating a new master server from among the plurality of replica servers. The selected replica server is associated with the replication transaction table having a fewest number of pending transaction requests.06-18-2009
20090157765System Restoration Apparatus and Method for Management of Dependencies, Ordering Sensitivities, and Database Index Rebuilds - A method, apparatus, and program product restore database data having dependencies or ordering sensitivities, or that incorporates a database index. Unresolved dependencies are identified in response to an attempt to restore data in a computer. The data restoration is deferred and the data is cached when it has an unresolved dependency. After the dependency is resolved, the data restoration is completed. The unresolved dependency may be based-on data that must be restored or created prior to completing restoration. Deferred data is cached in memory and tracked in a deferred operation table. Data that is deferred may be accessed so long as operations that access the underlying based-on data are denied.06-18-2009
20090157764Techniques for the Logical Replication of High-Level Procedures - A method and system that annotates a redo log to provide information concerning the execution of a procedure at a primary database. The annotations include entry and exit markers that indicate the beginning and the end of the execution along with any arguments passed to the procedure, and whether the execution of the procedure was successful. At the standby database, these markers are used to create a logical transaction associated with the procedure. The operations performed by the procedure are grouped into individual transactions, and these individual transactions are grouped as belonging to the logical transaction. If the execution of the procedure was successful at the primary database, then the individual transactions are discarded, and the logical transaction is applied by executing the procedure at the standby database. If the execution of the procedure failed at the primary database, then the individual transactions and the logical transaction are discarded.06-18-2009
20090043826Method for Reliably Updating A Data Group In A Read-Before-Write Data Replication Environment Using A Comparison File - A method is disclosed for reliably updating a data group in a read-before-write data replication environment. The method reliably updates the data group by receiving an updated data group sent from a first storage medium to a second storage medium, comparing the updated data group with a previous data group previously existing on the second storage medium and writing the updated data group to the second storage medium. The read-before-write and differencing method disclosed maintain reliability by storing multiple copies of changes made to the second storage medium during and after the write process.02-12-2009
20090327357TIME BASED FILE SYSTEM FOR CONTINUOUS DATA PROTECTION - A plurality of tokens corresponding to a plurality of data units written to a rewritable file system is stored, wherein an ordering relationship is maintained among the plurality of tokens, wherein the ordering relationship is such that a first token corresponding to a first data unit is of a lesser numerical value in comparison to a second token corresponding to a second data unit, and wherein the first data unit is written at an earlier point in time in comparison to the second data unit. The rewritable file system is reverted to an indicated point in time based on the ordering relationship that is maintained among the stored plurality of tokens.12-31-2009
20090307275SYSTEM FOR IMPROVING ACCESS EFFICIENCY IN DATABASE AND METHOD THEREOF - A system and method for improving access efficiency in a database. The database stores values of a plurality of keys associated with the respective keys. The system of the invention executes a plurality of transactions on the database, and acquires and records a referenced value which is a value of a key referenced in a corresponding transaction from the database according to the execution of each of the transactions. Then, according to commit requests of the plurality of transactions, the system requests a reply of a resultant table including an arrangement of judgment results obtained by judging whether the value of the key stored in the database is maintained as the referenced value without change made by another transaction for the respective transactions. The system further judges whether each transaction is successful, based on the resultant table sent back and commits only transactions judged to be successful.12-10-2009
20090094295Electronic equipment and log output method - There is provided electrical equipment which includes a macro file storage portion to store a macro file for acquiring log information under control of an operation system and log information outside control of the operation system at a time and a macro file executing portion to execute the macro file stored in the macro file storage portion and record log information obtained as a result of executing the macro file into a removable external recording medium.04-09-2009
20090094294Associating Database Log Records into Logical Groups - A method, system and medium for organizing and associating log records into logically related groups is described. One or more input sources from, possibly, different systems/subsystems are input to a log correlation method. As the log records are processed the fields are interrogated to determine which log records are related to each other. As further log records are processed more information about previously unidentifiable relationships is determined. After this later information is known, log records that could previously not be associated with any other log records are added to the existing association. The system engineer is therefore presented with the pertinent information for monitoring, administrating and diagnosing system activities.04-09-2009
20090094293METHOD AND UTILITY FOR COPYING FILES FROM A FAULTY DISK - The present invention provides a faulty disk copy utility. A method for copying files in accordance with an embodiment of the present invention includes: obtaining a list of files to be copied from a first location to a second location; initiating copying of a file from the list; logging an identifier of the file in a log file if an error occurs during the copying; and repeating the copying and logging for each file in the list of files; wherein the copying of the files from the list does not end if an error occurs during the copying.04-09-2009
20090271449WORK SUPPORT APPARATUS FOR INFORMATION PROCESSING DEVICE - To provide a work support apparatus capable of allowing an operator to safely and easily perform work requiring all or a part of a privilege, and concisely confirming the contents of the work later, a work support apparatus 10-29-2009
20090271448System, Method, and Computer Readable Media for Identifying a User-Initiated Log File Record in a Log File - A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file.10-29-2009
20090070390RECOVERY METHOD USING CDP - First information representing a plurality of snapshot acquisition time points of the data storage device, journal management data which are second information including the time point at which data are written to the data storage device and the size of the journal for writing the data, and third information representing a plurality of recovery points are acquired. The total transfer data size of one or more data to be transferred in order to recover the data group of the data storage device at the recovery point is calculated for each recovery point on the basis of the first information, journal management data, and third information. A display screen that visualizes the correspondence relationship between the respective recovery points and respective recovery load information representing a recovery load that is expressed on the basis of the total transfer data size calculated for the respective recovery points is displayed.03-12-2009
20090013008Computer System, Managing Computer and Recovery Management Method - The invention provides a method for computing the appropriate capacity of a journal volume based on the operating patterns of backup and recovery performed by the user, and composing a recovery system that enables recovery to be performed in a short time using journals. The invention provides a computer system comprising a storage system 01-08-2009
20090055443Recording a Log of Operations - Systems and methods are provided that record an easily viewable log of operations. A particular system includes a response receiving unit that receives an input response from a server, the input response related to a first client request and including first content adapted to prompt data input via a client. Additionally, the system includes a response sending unit that sends the client an output response, including the first content and an identifier to identify the first content and a logging database to record the first content in association with the identifier. Further, the system includes a request receiving unit that receives a second client request including input data related to the first content and the identifier and a content combining unit that combines the input data extracted from the second client request with the first content that is retrieved from the logging database based on the identifier.02-26-2009
20090006493Method For Enabling Traceability And Recovery From Errors During Migration Of Software Applications - A method (which can be computer implemented) for addressing errors during migration of software applications includes the step of obtaining access to a data repository, which includes a listing of migration decisions and a listing of dependencies associated with the migration decisions. The method further includes the steps of obtaining an indication of a migration error, tracing the migration error to at least a first one of the migration decisions in the data repository, and employing the listing of dependencies to identify at least a second one of the migration decisions, depending on the at least first one of the migration decisions identified in the tracing step, which is impacted by the migration error. Techniques for populating the data repository are also provided.01-01-2009
20090248753DATABASE MANAGEMENT SYSTEM RISK ASSESSMENT - A method of evaluating an implementation of a DBMS is provided. The method comprises collecting data associated with the implementation of the DBMS and accessing a database comprising problems and their associated solutions, wherein the solutions are configured to remedy at least one of the problems. The method further comprises comparing the data associated with the implementation of the DBMS with the problems and identifying at least one problem associated with the DBMS. Finally, a DBMS risk assessment report is generated that identifies the problem associated with the DBMS and a solution configured to remedy the problem.10-01-2009
20080208923Method for verifying data consistency of backup system, program and storage medium - A technology for verifying backup data capable of synchronizing timings of checksum calculation and verifying data consistency regardless of the storing position of the data is provided. In a backup system using a data update log, a checksum of data of a backup source and a checksum of backup data are checked, thereby verifying data consistency. Data check log generation means and the like are provided so that the data update log and the data check log are transmitted in order to a secondary site. By this means, the timings of the checksum calculation are synchronized. Further, by providing data area extraction means and the like, the verification of data consistency can be performed regardless of the storing position of the data.08-28-2008
20090089338TECHNIQUES FOR FILE SYSTEM RECOVERY - Techniques for file system recovery are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for file system recovery comprising starting a recovery process for a failed node, utilizing the recovery process to read one or more committed but un-applied transactions from storage associated with the failed node, and recreating the one or more committed but un-applied transactions in memory associated with the recovery process.04-02-2009
20090193060EFFICIENT QUERY PROCESSING OF DML SQL STATEMENTS - Various technologies and techniques are disclosed for efficiently processing DML SQL statements through minimal logging and optimized insertions. Rows are inserted into a table in a database in a sorted order. When an insertion of a particular row into the table causes a page split and a new page created during the page split is empty, the new page is locked until an end of a transaction associated with the insertion is completed. When the page split is caused by appending monotonically increasing values at an end of the table, the sorted order will guarantee that the new page is empty. Minimal logging is performed. When the transaction associated with the insertion is completed, a forced checkpoint is performed.07-30-2009
20090089339TRANSACTION LOG MANAGEMENT - A method and apparatus for managing a log-full condition of a transaction log in a transaction processing system are provided. The transaction log has a plurality of log records each associated with a particular transaction. When a log-full condition is detected, the active transaction having the oldest log entry of all active transactions is identified and logging for all transactions except for the identified transaction is temporarily suspended. A dynamic transaction backout of the identified transaction is initiated, with the writing of a backout record for the identified transaction to the log being delayed. The method waits for confirmation that the backout has completed before trimming the log. Then the delayed backout record for the identified transaction is written to the log and normal logging is resumed.04-02-2009
20080275921Self-managed processing device - A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services.11-06-2008
20090276470Data Processing System And Method - A method of rotating a current log file, comprising associating a first file system data structure associated with the current log file with a backup log file, and associating a second file system data structure associated with the backup log file with the current log file.11-05-2009
20090307276MIGRATION USING FILE SYSTEM LINKS - User state migration using file system hard links system and method. A file system hard link refers to a directory entry for a file that allow a file to be referenced by two or more separate filenames, without data of the file being stored in two or more places.12-10-2009
20090287745IMAGE FORMING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR - An image forming apparatus capable of preventing the degradation of performance when the log data is outputted to an external device. An output unit outputs an operation condition about image forming as log data to an external device. A changing unit changes a detailed degree of the log data outputted by the output unit according to a log level that classifies the detailed degrees of the log data into some levels. A setting unit sets up a limit value corresponding to volume of the log data outputted by the output unit. A control unit controls the log level based on the limit value set up by the setting unit.11-19-2009
20090292744SOLUTION METHOD OF IN-DOUBT STATE IN TWO-PHASE COMMIT PROTOCOL OF DISTRIBUTED TRANSACTION - A solution method of an in-doubt state in two-phase commit protocol of a distributed transaction system includes assigning a unique identifier to each log group, and registers information about a database management device having the management right of each log group in a first table, and rewriting the first table in such a way that another database management device may have a management right of a global representative log group when a management right of the global representative log group to the other database management device during an in-doubt state period of two-phase commit, and rewriting the first table in such a way that another database management device may have a management right of the global representative log group when a management right of a log group other than the global representative log group to another database management device during the in-doubt state period of two-phase commit.11-26-2009
20090292742System, Method, and Computer Readable Media for Identifying a Log File Record in a Log File - A system, a method, and a computer readable media for identifying a log file record in a log file are provided. The log file has a plurality of log file records therein. The plurality of log file records has a repeating pattern of log file records. The method includes displaying a first graphical user interface on a display device. The method further includes selecting the log file utilizing the first graphical user interface. The method further includes analyzing the log file to determine the repeating pattern of log file records. The method further includes selecting a first command button on the first graphical user interface that executes an algorithm to analyze additional log file records that were automatically added to the log file by a software program. The additional log file records are associated with the repeating pattern of log file records. The method further includes storing the first log file record in a memory device if a first log file record in the additional log file records has at least one command-related attribute that does not correspond to command-related attributes in the repeating pattern of log file records.11-26-2009
20090287744APPARATUS, SYSTEM AND METHOD FOR HEALTHCHECK OF INFORMATION TECHNOLOGY INFRASTRUCTURE BASED ON LOG DATA - A method and system for checking health of information technology infrastructure based on log data, in one aspect, collect log data non-intrusively from a production system, said log data at least associated with transactions occurring in the production system and resource utilization of the production system, normalize said log data into a plurality of log data types, perform data regression analysis using said plurality of log data types to estimate resources consumed by each of said transactions and throughput of each of said transactions, and use a queuing model to predict performance of the information technology infrastructure under various workloads.11-19-2009
20080208924Security model for common multiplexed transactional logs - A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers—abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations—by using the interfaces brokered by the principal in the protected subsystem.08-28-2008
20090112941COMPUTER SYSTEM AND FIRMWARE RECOVERY METHOD FOR COMPUTER SYSTEM - A firmware recovery method for a computer system including the following steps is provided. The computer system enters a firmware recovery mode. It is determined whether a display unit initial firmware is stored in a non-volatile memory. While the display unit initial firmware is not completely stored in the non-volatile memory, the display unit initial firmware is read from a storage apparatus for initializing a display unit. The display unit displays a firmware recovery hint. A complete initial firmware is read from the storage apparatus and then stored to the non-volatile memory. Finally, the computer system is turned on again.04-30-2009
20090112942System and Method for Decoupling Space Reservation in Transactional Logs - A common logging system (a “virtual logging system”) that presents to one or more log clients the appearance that each log client is interacting with a dedicated logging system. In reality, the virtual logging system is multiplexing virtual log streams, including log records, for each log client into a single transactional log. In particular, the invention is directed at a system and method for decoupling space reservation between a plurality of distributed components and a core component in the virtual logging system.04-30-2009
20090276469METHOD FOR TRANSACTIONAL BEHAVIOR EXTACTION IN DISTRIBUTED APPLICATIONS - A method of analyzing log data related to a software application includes: selectively collecting data log entries that are related to the application; agnostically categorizing the data log entries; and associating the categories of the data log entries with one or more operational states of a model.11-05-2009
20080250078METHOD AND SYSTEM FOR SERVER-BASED ERROR PROCESSING IN SUPPORT OF LEGACY-BASED USAGE AND BILLING SYSTEMS - An error processing system comprising a client/server based PC application supported by SQL Server databases for use with legacy usage metering and billing services. The error processing system provides increased functionality, flexibility and reliability of error processing at a much lower cost than was possible using error processing and correction systems built into legacy usage metering systems. Error processing is simplified for users by implementation of a PC based GUI screens developed in Visual Basic.10-09-2008
20090063578MANAGEMENT OF DATA NEEDED TO RESOLVE POINTER ERRORS IN HEIRARCHICAL DATABASE MANAGEMENT SYSTEMS - A method for managing data needed to resolve pointer errors is provided. The method provides for receiving information concerning a pointer error, preparing the information received, submitting a job to select, sort, and format a subset of log and/or trace records such that the subset of records can be analyzed to resolve the pointer error.03-05-2009
20080228838JOURNALING DATABASE CHANGES USING MINIMIZED JOURNAL ENTRIES THAT MAY BE OUTPUT IN HUMAN-READABLE FORM - A minimized journaling mechanism stores minimized journal data in a format that allows for display and outputting the journal data in human-readable form. When a change to a record occurs, instead of writing only the changed bytes, all of the bytes in each field that changed are written to the journal, along with all of the bytes in each field selected to be always journaled. A default object is created with default data in all of the fields. When the journal entry needs to be output in human-readable form, the default object is read, and the minimized journal entry is then overlaid on the default object. The result is an object that contains default data in all non-selected fields that were not changed, with the journal data in all fields and that did change and in all fields that were selected to always be journaled.09-18-2008
20080228839APPARATUS FOR HIGHLY AVAILABLE TRANSACTION RECOVERY FOR TRANSACTION PROCESSING SYSTEMS - A highly available transaction recovery service migration system in accordance with one embodiment of the present invention implements a server=s Transaction Recovery Service (TRS) as a migratable service. In one embodiment of the present invention, the TRS is a server instance or software module implemented in JAVA. The TRS migrates to an available server that resides in the same cluster as the failed server. The migrated TRS obtains the TLOG of the failed server, reads the transaction log, and performs transaction recovery on behalf of the failed server. The migration may occur manually or automatically on a migratable services framework. The TRS of the failed server migrates back in a fail back operation once the failed primary server is restarted. Failback operation may occur whether recovery is completed or not. This expedites recovery and improves availability of the failed server thereby preserving the efficiency of the network and other servers.09-18-2008
20080228836Network flow for constrained replica placement - A deterministic technique is used for assigning locations to object replicas in a data center, while taking the various constraints into account that guarantee high availability and fast recovery. Example constraints include not putting the replicas on the same machine and not on the same rack, in case the rack or the network switch goes down. Also, because power distribution units (PDUs) can fail, the two replicas are not put on the same PDU. A solution is guaranteed to be found, if one exists.09-18-2008
20080228833SYSTEM AND METHOD FOR MANAGING CONSISTENCY AMONG VOLUMES BASED ON APPLICATION INFORMATION - In accordance with new technique, a computerized data recovery system includes a storage subsystem and a backup server operatively coupled to backup storage medium, the storage subsystem including a continuous data protection system. The backup server executes a recovery manager which: collects consistency points from at least two database applications executing on at least one host; collects journal terms of the continuous data protection system for each of the at least two database applications; collects log terms associated with each of the at least two database applications; displays to a user a timeline for a protected term and consistency points for the at least two database applications; receives recovery time selection from a user; receives recovery database application selection from the user; receives baseline database application selection from the user; performs crash recovery for each database application; and performs recovery of data based on transactions associated with the at least two database applications.09-18-2008
20080281876METHODS AND APPARATUS TO RECOVER DATA AND CONFIGURATION OF STORAGE SYSTEM - Every configuration change and/or detected failure is stored in the CDP journal together with time point information indicative of the time when the respective change or the failure has occurred. When the administrator performs the recovery of the data by specifying the recovery time point, the content of journal is displayed to the administrator so that the administrator can search for a recovery point by referring not only to series of data changes but also the series of events. If the administrator specifies a recovery point and initiates the recovery process, the configuration at the recovery time point is reproduced by undoing configuration changes between the current time point and the recovery time point.11-13-2008
20080288558Method and Apparatus for Non-Deterministic Incremental Program Replay Using Checkpoints and Syndrome Tracking - Methods and apparatus are provided for non-deterministic incremental program replay using checkpoints and syndrome tracking. Replay of a program proceeds by, for a given execution of the program, recording one or more checkpoints of the program, the one or more checkpoints containing program state information; and a recorded list of values for one or more identified variables executing in one or more threads of the program. Thereafter, during a replay execution of the program, the process continues by commencing execution from a particular one of the recorded checkpoints; restoring the program state information associated with the particular one of the recorded checkpoints; comparing an observed list of values to the recorded list of values for the one or more identified variables executing in each of the one or more threads; and identifying a difference between the observed list of values and the recorded list of values A perturbation or suspend statement can optionally be introduced into the replay execution of the program.11-20-2008
20100030820Reassembling fragmented files or documents in an order-independent manner that ensures each of the fragments belongs to only one reassembled file - Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein each of the fragments is permitted to belong to only one of the at least two files, and wherein at least two files are reconstructed such that the results are independent of the order in which the files are reconstructed.02-04-2010
20080313242Shared data center disaster recovery systems and methods - Systems and methods for providing disaster recovery services to enterprise customers of virtual computing services are described. Disaster recovery services may be provided in data centers that also provide primary computing services to enterprise customers. Disaster recovery services may be distributed across the data centers, such that no dedicated disaster recovery site exists. In addition, disaster recovery services may be provided such that each of the enterprise customers receiving primary services at a given data center may be distributed across the remaining data centers for disaster recovery purposes.12-18-2008
20080313241DISTRIBUTED DATA STORAGE USING ERASURE RESILIENT CODING - An erasure resilient coding (ERC) distributed data storage system and method for storing data in a reliable and survivable fashion while minimizing hardware and associated costs. The system and method includes forming multiple protection groups both within and across storage nodes of the storage system. Data is segmented into original data blocks and ERC data blocks. Load balancing occurs by interleaving storage nodes with equal numbers of original data blocks and ERC data blocks while ensuring each node has an equal number of combined read and write operations. Unique read and write operations on data block can be performed independent of other data blocks in a protection group. The write operation uses Galois field arithmetic and ERC transform to either write or append a new data block to a storage node. The read operation recovers data in a variety of ways using ERC decoding.12-18-2008
20080250079STORAGE SUBSYSTEM - The data up to a point of time whereat failure has occurred will be restored at high speed at a remote site without imposing any burden on a host. The first storage system on the master side processes an I/O request from the host, and as a result of I/O processing to the second storage system on the remote side, transmits the update data. The second storage system retains data received from the first storage system as update log data. The host transmits a command for settling a state of an application to the first storage system as data, and the first storage system transmits the data to the second storage system. The host and the second storage system both retain an identifier corresponding to the command, and relate the identifier to the log data. Thereby, the host designates the identifier at any given time, whereby the second storage system restores the data at any given time.10-09-2008
20080208922IMAGE METADATA ACTION TAGGING - Data files are action tagged by electronic devices as the files are used, and such tags are used to compute a total value for each data file among a group of data files for the purpose of running comparative-type operations, e.g., sorting or organizing the group of data files, or searching for one or more files in the group. The action tags are carried on each data file, preferably in the header, so as to travel with the file as the file is transferred among devices. The action tagging generally involves tracking, and storing as metadata in the data file, each occurrence of each of multiple indirect actions, and one or more characteristics associated with each indirect action occurrence. In setting up a comparative-type operation, a user can select via an interface one or more parameters with which to constrain each input value computation for respective indirect activities. A user-selected weight can be assigned to each input calculation. Embodiments of the invention and/or aspects thereof can be realized in methods, instruction-containing mediums, data structures, devices and systems.08-28-2008
20080307011FAILURE RECOVERY AND ERROR CORRECTION TECHNIQUES FOR DATA LOADING IN INFORMATION WAREHOUSES - A method of data loading for large information warehouses includes performing checkpointing concurrently with data loading into an information warehouse, the checkpointing ensuring consistency among multiple tables; and recovering from a failure in the data loading using the checkpointing. A method is also disclosed for performing versioning concurrently with data loading into an information warehouse. The versioning method enables processing undo and redo operations of the data loading between a later version and a previous version. Data load failure recovery is performed without starting a data load from the beginning but rather from a latest checkpoint for data loading at an information warehouse level using a checkpoint process characterized by a state transition diagram having a multiplicity of states; and tracking state transitions among the states using a system state table.12-11-2008
20080208925Communication Method and System - A communication method is disclosed as including the steps of (a) associating sensor with an object; (b) associating a mobile phone or personal digital assistant with a secure token capable of communication contactlessly with the sensor; (c) setting a number of rules of possible allowable ways of interaction between the object and the mobile pone; (d) the sensor obtaining information relating to the object; (e) the secure token initiating and establishing information contactless communication with the sensor and receiving from the sensor the information obtained by the sensor; and (f) the secure token issuing an output on the basis of the rules of possible or allowable ways of interaction and the information received from the sensor.08-28-2008
20080235298Distributed Database System Providing Data and Space Management Methodology - A distributed database system providing data and space management methodology. In a distributed database system having an allocation page for tracking allocation and deallocation of data pages including a deallocation bit for tracking data page deallocation, a method for determining when to clear the deallocation bit during recovery comprises: during runtime operation, generating log records recording allocation and deallocation of data pages, setting the deallocation bit during deallocation of a data page by a transaction, and clearing the deallocation bit after the transaction has committed; during recovery following a failure, identifying a particular log record corresponding to the deallocation bit set during deallocation of a given data page; determining whether the deallocation of the given data page recorded in the particular log record committed prior to the failure; and if the deallocation of the given data page committed prior to the failure, clearing the deallocation bit.09-25-2008
20080235296Database management using a file to accumulate changes - Database management is described. A source data structure is copied to create a new data structure. Changes to the source data structure that occur during and after creation of the new data structure are accumulated in a file before they are added to the new data structure. Changes included in the file are subsequently applied to the second data structure.09-25-2008
20080235297Method for Indexing a Large Log File, Computer-Readable Medium for Storing a Program for Executing the Method, and System for Performing the Same - A system for performing a method for indexing a large log file includes a log line indexing section, a character string matching report file and a file pointer list file. The log line indexing section receives a character string by a user operation to extract a log line comprising the corresponding character string from an original log file, and counts the number of the file pointers. The character string matching report file stores the character string and the number of the file pointers corresponding to the character string. The file pointer list file stores the file pointers of the original log file corresponding to the character string. Therefore, the size of the “found” log file corresponding to the found log lines may be decreased, which are found in a log analysis that searches for and analyzes log lines including a specific character string in a large log file.09-25-2008
20080235294No data loss system with reduced commit latency - Techniques for reducing commit latency in a database system having a primary database system and a standby database system that is receiving a stream of redo data items from the primary. The standby sends an acknowledgment for a received item of redo data before the standby writes the redo data item to a redo log for the stream. When a no more redo event occurs in the standby, the standby sets a “no data lost flag” in the redo log if the stream of redo data items has no gaps and all of the redo data items received in the standby have been written to the redo log. The database system may operate in a first mode in which an acknowledgment is sent as just described and a second mode in which an acknowledgment is sent after the redo data item has been written to the redo log.09-25-2008
20080235293METHOD FOR ENHANCED FILE SYSTEM DIRECTORY RECOVERY - A method is provided for directory recovery in a file system. Once a directory object problem is identified, a problem directory associated with the directory object problem is determined. A repaired directory is created to take the place of the problem directory, and the repaired directory is linked into the parent directory of the problem directory such that the repaired directory is hidden from an end user. A logical repair directory is created including the problem directory and the repaired directory. Information from the problem directory is moved to the repair directory while the file system is active. The problem directory is renamed to the repaired directory such that the problem directory is hidden from the user, and the repaired directory is made visible to the end user. The problem directory and the logical repair directory are deleted.09-25-2008
20080270488Fault recovery for transaction server - A primary server transmits a write transaction to N backup devices. Each backup device records the write transaction to a local redo log stored at a high-performance storage and then transmits a notification to the primary device. When the primary device receives notifications from M of the N backup devices, it commits the write transaction, recording it to a low-performance storage. Once the write transaction has been recorded to the low-performance storage, the primary device requests that the backup devices delete their logs. If the primary device incurs a fault, one of the backup devices becomes the new primary device and determines which backup device has the newest local redo log. The backup device having the newest log sends it to the other backup devices, which update their local redo logs to the same state as the newest log. Thereafter, the new primary device is ready to resume transaction processing.10-30-2008
20090187608HANDLING TRANSFER OF BAD DATA TO DATABASE PARTITIONS IN RESTARTABLE ENVIRONMENTS - Method, computer program product, and system for transferring data to database partitions are provided. A transaction is initiated to insert one or more records into a partition of a database. At least one of the one or more records is then saved in binary form to a dump table in the database as a part of the transaction in response to the insertion of the at least one record into the partition having failed as a result of the at least one record not satisfying a predetermined condition. In response to the saving of the at least one record in binary form to the dump table having failed, the transaction is rolled back.07-23-2009
20090182784RECOVERY POINT IDENTIFICATION IN CDP ENVIRONMENTS - The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.07-16-2009
20090182783LAZIER TIMESTAMPING IN A TRANSACTION TIME DATABASE - Systems and methods for facilitating more efficient timestamping in a lazy timestamping transaction time database environment are described herein. A recovery log component can store timestamp information of a transaction in a commit record of the transaction, wherein the commit record of the transaction is included in a recovery log. A volatile reference count component can update reference count data of the transaction in a volatile timestamp table to reflect a number of records of the transaction that do not persistently include timestamp information. Further, a checkpoint component can update timestamp information for a batch of transactions, wherein the timestamp information is updated in a record of the persistent timestamp table to ensure that the timestamp information persists in the record of the persistent timestamp table before the commit record of the transaction that contains the transaction's timestamp information is deleted from the recovery log.07-16-2009
20090164525Online Recovery of User Tables Using Flashback Table - A method and apparatus for updating databases are disclosed. In response to a flashback request, a database object is restored to a state as of a specified flashback time. The changes introduced into the database object are reversed in a sequence starting with a change introduced into the database object immediately before issuance of the flashback request and ending with a change introduced into the database object immediately after the specified flashback time.06-25-2009
20090138527PORTABLE DATA RECOVERY APPARATUS AND METHOD - Data recovery operations on corrupted computer equipment now commonly accomplished by bringing the computer to a laboratory are carried out by a portable unit at the computer site. The imposed restriction of data transfer to or from a hard drive in the portable unit precludes data from reaching any destination other than the originating data store or the unit hard drive. The unit is operative, in the field, to service a sequence of corrupted data memories in a number of computers by constraining data transfer in each instance solely between the originating data memory and the designated file in the hard disk of the portable unit.05-28-2009
20090006494Resource Management for Scalable File System Recovery - A system and method for storing data. In one embodiment, a file system stores data including associated metadata. In response to detecting that a file system error has occurred, the file system identifies a container including data in which the error occurred and performs a consistency check of the data included in the container. If a bidirectional link exists between the container and another container and if an error is found in the bidirectional link, the file system performs a consistency check of data included in the other container and determines if another bidirectional link exists between the other container and a third container. If another bidirectional link exists between the other container and a third container and if an error is found in the other bidirectional link, the file system performs a consistency check of data included in the third container.01-01-2009
20090019093PARTIALLY REPLICATED DISTRIBUTED DATABASE WITH MULTIPLE LEVELS OF REMOTE CLIENTS - A method of and system for collecting, storing, and retrieving data in a data base management system. The database management system includes a master database server (01-15-2009
20090063580APPARATUS, SYSTEM, AND METHOD FOR HIERARCHICAL ROLLBACK OF BUSINESS OPERATIONS - An apparatus, system, computer program product and method are disclosed for the hierarchical rollback of business objects on a datastore. The hierarchical rollback method utilizes a non-linear process designed to restore data to a previous point in the case of a data modification failure in order to prevent incorrect linking and data corruption. The hierarchical rollback methods are generated by retrieving existing data and creating commands in an order that will prevent orphan data in a datastore.03-05-2009
20090063579MANAGING AND COORDINATING SAVEPOINT FUNCTIONALITY IN A DISTRIBUTED DATABASE SYSTEM - Provided are techniques for savepoint processing. One of a savepoint statement, a rollback to savepoint statement, and a release savepoint statement is received. It is determined whether to propagate the received one of the savepoint statement, the rollback to savepoint statement, and the release savepoint statement to a data source based on an asymmetrical model in which a nested level of savepoints on a federated server side is capable of being greater than a nested level of savepoints on a data source side and wherein a two-tiered data structure is used to preserve savepoint information in the asymmetrical model. In response to determining that propagation is to occur, the one of the savepoint statement, the rollback to savepoint statement, and the release savepoint statement is propagated to the data source.03-05-2009
20090144340METHOD AND APPARATUS FOR REPORTING AND INVOICING OF DATA DOWNLOADS - The present invention provides an apparatus for reporting about a download of an item of digital data to an end user from a plurality of logged data sources. The item of digital data is downloadable in one or more sessions but also divisible into portions. The apparatus comprises multiple event logs being associated with the logged data sources of the plurality of logged data sources. The apparatus further comprises a retrieving device for retrieving the multiple event logs from the logged data sources. The apparatus further comprises multiple event logs indicating the portions of the item of digital data downloaded in at least one of the one or more sessions. The apparatus further comprises a reporting device for combining the at least one event log and producing a report of the download of the item of digital data.06-04-2009
20090210458Tag based backup and recovery - Systems, methods, and other embodiments associated with selective tag-based file backup and recovery are described. One example method includes selectively tagging a file for inclusion in a snapshot-based backup image by associating a tag with the file. The associating may include encoding file metadata with a tag. The method may include selectively adding a file to the backup image upon determining that the file has experienced a write event and that the file is associated with a tag. The method may also include receiving a request to provide a recovery file from the backup image and selectively providing the recovery file upon determining that the recovery file is associated with a recovery tag specified in the request.08-20-2009
20090198746GENERATING ANONYMOUS LOG ENTRIES - Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user's location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user's identification, the IP address, the time of search, and differences between the search terms used in the search queries.08-06-2009
20090055444Method and System for High-Availability Database - The present invention provides a system switching function for database management systems which requires no standby resources idling during normal operation. One aspect of the invention is directed to a method for processing databases in a system which includes a plurality of storage areas each storing a database and a plurality of computers each having a database management program running thereon which manages one of the plurality of storage areas. Each storage area is associated with only the computer managing the storage area. The method comprises, when a failure has occurred in one of the plurality of computers as a failed computer, obtaining preset substitution information indicating that the storage area managed by the database management program running on the failed computer is to be managed by the database management program running on another one of the plurality of computers as a substitute computer; and, based on the substitution information, changing association of the storage area with the failed computer to the substitute computer. The storage area is to be managed by the database management program running on the substitute computer.02-26-2009
20080263106Database queuing and distributed computing - This disclosure relates to a high performance database queuing method and apparatus which supports reliable service-oriented architecture. The servers and clients add tasks to the queues, which are database table with records that point to other records in other tables. The application servers pick up tasks in priority (first-in-first-out) order to perform tasks, flag tasks as done, and delete records periodically. The queuing makes use of database strengths such as indexing, synchronization, transaction process, reliability and recovery.10-23-2008
20090204645SYSTEM, METHOD, PROGRAM, AND SYSTEM IMPLEMENTATION METHOD FOR TRANSACTION PROCESS LOGGING - A system is provided to log a transaction process performed based on a service level agreement concerning the response time of the transaction process. The system includes a logging policy table, a transaction process monitoring unit, and a storage device. The logging policy table records one or more logging policies defined to log a transaction process with a varying amount of log data based on a required response time specified in the service level agreement. The transaction process monitoring unit automatically monitors the response time of the transaction process. The storage device records a transaction process log. The system further includes a logging control unit. The logging control unit uses response time of a transaction process monitored by the transaction process monitoring unit to select one of the logging policies stored in the logging policy table. According to the selected logging policy, the logging control unit allows the storage device to record a log of the transaction process.08-13-2009
20090204644 SYSTEM AND METHOD FOR ON-DEMAND GENERATION OF A SELECTABLE INPUT FOR ENACTING A PREVIOUS DOCUMENT PROCESSING DEVICE CONTROL SEQUENCE - The subject application is directed to a system and method for on-demand generation of a selectable input for enacting a previous document processing device control sequence. User identification data is received, and a document processing session is opened. A sequence of instructions is then received, and data associated with the sequence is logged according to identification data. After the session opening, logged data is stored in associated memory. Data of a request to generate a selectable input corresponding to the logged data is then received, and testing is performed to determine whether data has been logged in a current session. Data logged during the session is associated with the selectable input, and stored data is retrieved and associated with the selectable input when no data has been logged during the current session. The sequence of selected instructions is then commenced upon the selection of the selectable input by the user.08-13-2009
20090164524SHADOW-PAGE DEFERRED-UPDATE RECOVERY TECHNIQUE INTEGRATING SHADOW PAGE AND DEFERRED UPDATE TECHNIQUES IN A STORAGE SYSTEM - Disclosed herein is a recovery method in a storage system that integrates shadow page and deferred update techniques. In our invention, for update operations that occur during a transaction, update of a page in the buffer is not immediately reflected to the database, but is deferred until the transaction is committed. Instead, we store the updated buffer page in the log volume in the unit of a page. When reading a page that does not exist in the buffer from the disk, we read the up-to-date page from the database or from the log volume. Here, the log table index is used to determine whether the up-to-date page exists in the database or in the log volume and to identify the position of the page stored in the log volume if the up-to-date page exists in the log volume. The proposed invention has the following excellent advantages. It is simple and efficient because the deferred update file does not have to be additionally accessed for correct query processing. Besides, there is no performance degradation because the position of an updated page in the database is not changed, and thus, the original clustering of logically related data is preserved.06-25-2009
20090210457TRANSACTIONAL MEMORY WITH DYNAMIC SEPARATION - Strong semantics are provided to programs that are correctly synchronized in their use of transactions by using dynamic separation of objects that are accessed in transactions from those accessed outside transactions. At run-time, operations are performed to identify transitions between these protected and unprotected modes of access. Dynamic separation permits a range of hardware-based and software-based implementations which allow non-conflicting transactions to execute and commit in parallel. A run-time checking tool, analogous to a data-race detector, may be provided to test dynamic separation of transacted data and non-transacted data. Dynamic separation may be used in an asynchronous I/O library.08-20-2009
20090198747Memory Card Reader Device for Recovering Memory Card - Disclosed is a memory card reader recovering memory card. The memory card reader recovering memory card according to an embodiment of the present invention may comprise a first interfacing unit interfacing with a memory card, a first storing unit storing a recovery program for recovering any deleted or impaired data in the memory card, a control unit executing the recovery program for the deleted or impaired data at a recovery mode and a display unit displaying a file list of both data stored in the memory card and the data recovered on a display screen.08-06-2009
20090106324PUSH-MODEL BASED INDEX DELETION - A method and apparatus for push-model based index deletion. In one embodiment of the method, a first transaction is generated for deleting a first data object from memory. A first message is generated in response to generating the first transaction, wherein the first message comprises information related to an identifier of the first data object, and wherein the first message comprises information that indicates that the first data object was or will be deleted. The first message is then transmitted to a computer system that implements a search engine.04-23-2009
20090210456Methods, Systems and Media for TPM Recovery Key Backup and Restoration - A method of trusted platform module (TPM) activation and recovery in an information handling system (IHS). The method includes providing a first virtual recording medium associated with a first recording medium, wherein the first recording medium is coupled to a management console. Further, a TPM recovery key is stored on the first virtual recording medium.08-20-2009
20090240743METHOD AND APPARATUS FOR SYNCHRONIZING APPLICATIONS FOR DATA RECOVERY USING STORAGE BASED JOURNALING - Disclosed is a method to synchronize the state of an application and an application's objects with data stored on the storage system. The storage system provides API's to create special data, called a marker journal, and stores it on a journal volume. The marker contains application information, e.g. file name, operation on the file, timestamp, etc. Since the journal volume contains markers as well as any changed data in the chronological order, IO activities to the storage system and application activities can be synchronized.09-24-2009
20090100112Method and System for Replicating Objects - A method and system for method for replicating object consisting of creating a group of objects at a first location; transmitting the group of objects from a first location to a second location over a network coupling the first location to the second location, such that the number of transmissions is minimized receiving the group of objects at the second location; and storing the group of objects at the second location. The objects are preferably data objects and are collated into group based on a probability score is computed for each data object centered on an access pattern. Advantages include minimizing the number of transmission of the group of objects thereby reducing network traffic and failure of operation during replication of the objects.04-16-2009
20090248755SYSTEM AND METHOD FOR DATA BACKUP USING LOG RECORDS - To generate backup data based on a log while a power consumption of a standby system is reduced, provided is a method for data backup in which a first computer system transmits a data update record, a second storage system of a second computer system receives and then stores the data update record, and a second computer of the second computer system generates a copy of data contained in the first computer system based on the stored data update record, the method for data backup, including: monitoring the data update record transmitted by the first computer system, and stopping, when a predetermined first condition is satisfied, the second computer; and starting, when a predetermined second condition is satisfied, the second computer, thereby generating the copy of the data contained in the first computer system based on the stored data update record.10-01-2009
20090248754Providing resumption data in a distributed processing system - An approach for providing a user with resumption data before pausing or terminating a partially-processed job that is processing in a distributed system. Certain applications, when paused, are not able to resume processing data at precisely the point where it was paused. As a result, users surrender some, or all, of the processed portion of the data when processing is paused. In one embodiment of the invention, a user is provided with resumption data before the user confirms a request to pause the processing. Resumption data from each of the service nodes that is processing a segment of source data are collected and aggregated. Resumption data reflects a measure of processed data that would require re-processing if the processing were paused and resumed. Alternatively, resumption data includes a duration of spent processing time that would be lost if the processing were paused and resumed.10-01-2009
20090222492Logging Device and Recording Medium - In the logging device, data at a check point in execution of an application program, a log output condition preliminarily set from outside, and a plurality of log output functions called at each check point are built in the application program; and at normal time, a log output is made only in case that an error level having been specified with a parameter of a log output function is coincident with the normal-time log output condition, and in case that the error level coincident with a trigger level arises, a detailed log at the error level coincident with the abnormal-time log output level is outputted.09-03-2009
20090240742Transaction Log Management - A transaction processing system comprising a transaction log, a log management policy, a profile and a log manager, and method for managing the transaction log are provided. The method comprises maintaining a transaction log of recoverable changes made by transaction processing tasks, each task having an associated transaction type; storing a log management policy including at least one log threshold and a plurality of possible actions associated therewith; and storing a profile of log resource usage characteristics of tasks for different types of transactions. Usage of the log by transaction processing tasks is monitored to determine when a log threshold is reached. The profile indicates the normal logging behaviour of particular types of transaction by identifying ranges of acceptable values for a plurality of log resource usage characteristics. Such characteristics may include time taken for a task to complete, CPU resource consumed, number of log records made, etc. From a comparison of the profile behaviour with the current log resource usage of a task which has been identified as holding up trimming of the log, likelihood that the identified task having entered an invalid loop and represents a ‘bad’ program, rather than simply validly taking a long time to complete can be inferred. Thus the most appropriate action can be selected and taken.09-24-2009
20090150456METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DISASTER RECOVERY PLANNING - Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application.06-11-2009
20090254591Manipulating Electronic Backups - Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes initiating a backup operation of data including a plurality of items, interrupting the backup operation, where interrupting occurs after a portion of the data has been completed, receiving an input to resume the backup operation, identifying a previously completed portion of the backup data, and performing a backup of a remaining uncompleted portion of the backup data. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.10-08-2009
20090300074BATCH RECOVERY OF DISTRIBUTED TRANSACTIONS - A recovery manager detects that a distributed transaction is unresolved for a first participant of said distributed transaction. The recovery manager identifies that the distributed transaction is unresolved for a second participant of said distributed transaction. The recovery manager generates a list of participants for which the distributed transaction is unresolved, the list including an entry for the first participant and an additional entry for the second participant. The recovery manager determines a result of the distributed transaction based on information received from a remote coordinator of said distributed transaction. The recovery manager notifies each participant identified in the list of the result.12-03-2009
20090043825LOG LOCATION DISCOVERY AND MANAGEMENT - Illustrative embodiments provide a computer implemented method for managing log information. The method comprising, responsive to receiving a request to discover log information, and invoking a set discovery agents to discover the log information for logs located on a set of managed nodes. The method further identifies the log information on the set of managed nodes using the set of discovery agents and stores the log information in a repository knowledge base containing log information.02-12-2009
20090125568DATABASE RECOVERY METHOD APPLYING UPDATE JOURNAL AND DATABASE LOG - A database recovery method including a computer and a storage system, in which: the storage system includes a disk drive for storing data; the disk drive includes a data volume, a snapshot volume, a database log for storing an update log, and an update journal for storing update information of the data volume; a recovery point for indicating an end point of a range to which the update journal is to be applied and a starting point of a range to which the database log is to be applied is recorded to recover the data volume; and when the database is to be recovered, the update journal is applied to the snapshot volume up to the recovery point, the snapshot volume after the update is switched to the data volume, and the database log after the recovery point is applied to the data volume that is set by switching.05-14-2009
20090112940Method, system and computer-readable media for repairing corruption of data record references - A system, method and computer-readable media are provided for repairing corrupted data related to a software database. An electronic information technology system includes (1.) a logical page index; (2.) a free page map; and (3.) a computer-readable medium. The logical page index includes a plurality of logical page index pairs, each logical page index pair having a logical page number and a physical page location address of the computer-readable medium that reference a same record. The database system also includes a means to detect a logical page index pair having a logical page number and a physical page location that are not referencing a same record, and another means to search for a free page map entry that references the physical page address of the record referenced by the logical page index pair.04-30-2009
20090019092ABSTRACTION BASED AUDIT AND SECURITY LOG MODEL FOR INCREASED ROLE AND SECURITY ENFORCEMENT - Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be subject to unwanted disclosure (either from within or without a given organization). For example, an organization (e.g., a research institution) may allow a database administrator to review log event records to diagnose and correct system performance issues, without being forced to trust the administrator with sensitive medical data (e.g., medical records related to participants in a research study). Thus, the security of sensitive information may be maintained, while at the same time, the database administrator may still access the information needed to maintain a working system.01-15-2009
20080228834Delaying Database Writes For Database Consistency - A continuous set of committed transactions can be lost without destroying the integrity of the database, by deferring the writing of the database pages stored in cache to the database on stable storage. A waypoint tracks a point in the transaction log following which transactions have not been applied to the database on stable storage and thus records after the waypoint are not needed for recovery to a consistent database. When there is a failover of an active database on Node A to a passive database on Node B, log records are compared starting with the most current and moving backwards and the point at which divergence in the log occurs is determined. When the lost portion of the log occurs after the point indicated by after the waypoint, the database is recoverable by log-based incremental reseed.09-18-2008
20090106329CONTROLLING EXECUTION OF TRANSACTIONS - A requester includes a business process history DB having recorded therein GBPIDs, input messages, and provider names, and each of providers includes a log DB having recorded therein log data containing DBPIDs and images before updates of the DB. Moreover, in the requester, an UNDO information creator and a REDO information creator refer to the business process history DB to respectively create UNDO information and REDO information for the provider in charge of the business process of a GBPID after the modification REDO. Furthermore, in the provider, an UNDO processor and a REDO processor refer to the log DB to respectively perform UNDO and REDO processes.04-23-2009
20090106328FAULT TOLERANCE AND FAILOVER USING ACTIVE COPY-CAT - Fault tolerant operation is disclosed for a primary instance, such as a process, thread, application, processor, etc., using an active copy-cat instance, a.k.a. backup instance, that mirrors operations in the primary instance, but only after those operations have successfully completed in the primary instance. Fault tolerant logic monitors inputs and outputs of the primary instance and gates those inputs to the backup instance once a given input has been processed. The outputs of the backup instance are then compared with the outputs of the primary instance to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup instance to take over for the primary instance in a fault situation wherein the primary and backup instances are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. As such, the primary instance need not be specifically designed or programmed to interact with the fault tolerant mechanisms. Instead, the primary instance need only be designed to adhere to specific basic operating guidelines and shut itself down when it cannot do so. By externally controlling the ability of the primary instance to successfully adhere to its operating guidelines, the fault tolerant mechanisms of the disclosed embodiments can recognize error conditions and easily failover from the primary instance to the backup instance.04-23-2009
20090106327Data Recovery Advisor - A computer is programmed to identify failures and perform recovery of data. Specifically, in several embodiments, the computer is programmed to automatically check integrity of data in a storage structure to identify a set of failures related to the storage structure. The computer is further programmed in some embodiments to identify, based on one failure in the set of failures, a group of repairs to fix that one failure. Each repair in the group of repairs is alternative to another repair in the group. The computer is also programmed in some embodiments to execute at least one repair in the group of repairs, so as to generate corrected data to fix the one failure. In certain embodiments, the corrected data is stored in non-volatile storage media of the computer.04-23-2009
20090144341Ad Hoc Data Storage Network - One or more devices on a network are detected by an offsite data backup system. Upon detection of a given device, the data backup system authenticates the device and determines whether the device is authorized and capable to receive backup data. The backup system identifies data to be backed up, and one or more devices to receive the data backup, based on the combined unused storage capacity of the devices and a data backup policy that takes into account the value of the data. The data backup system can generate a database of synchronization information, which can be used to fully or partially restore data from the devices.06-04-2009
20090037494CHECKPOINT-FREE IN LOG MINING FOR DISTRIBUTED INFORMATION SHARING - A checkpoint free log mining mechanism comprising a capture process and an apply process that are logically associated with each other may be provided in a database system. In an embodiment, log mining information published by the capture process to the apply process comprises a complete set of log information for each interesting transaction. A system change number of a start transaction record of a transaction may be used to represent a start time of the entire transaction. The capture and apply processes may work cooperatively to establish a safe time point in the form of a particular system change number in logs to begin mining, under various circumstances such as in an initial startup state, in a steady state, in a process restart scenario in the middle of checkpoint free log mining, or in a transition between the checkpoint mode and the checkpoint free mode.02-05-2009
20090063581SYSTEM FOR TRACKING MEDIA CONTENT TRANSACTIONS - A system that incorporates teachings of the present disclosure may include, for example, a web server having a controller adapted to manage an archive of media content for a subscriber, and record a transaction description and a corresponding tracking identifier for a transaction that manipulates the archive. Other embodiments are disclosed.03-05-2009
20090100111APPARATUS AND METHOD TO ARCHIVE LOG ENTRIES FORMED BY A DATA STORAGE SYSTEM - A method to archive log entries created by a data storage system comprising a first memory and a library log encoded in that first memory, wherein the first memory comprises a storage capacity, and wherein the method writes a plurality of log entries to the library log, wherein each log entry comprises a log entry time. At a time T04-16-2009
20090100113TRANSACTION LOG MANAGEMENT - A transaction processing system comprising a transaction log, a log management policy, a profile and a log manager, and method for managing the transaction log are provided. The method comprises maintaining a transaction log of recoverable changes made by transaction processing tasks; storing a log management policy including at least one log threshold and a plurality of possible actions associated therewith; and generating a historical profile comprising a set of acceptable values for characteristics of the log resource usage of tasks. Such log resource usage characteristics may include time taken for a task to complete, CPU resource consumed, number of log records made, etc. From a comparison of the profile behaviour to the actual behaviour of a task which has been identified as holding up trimming of the log, the likelihood that the identified task has entered an invalid loop and represents a ‘bad’ transaction instance, rather than simply just taking a long time to complete, can be inferred. Thus the most appropriate action can be selected and taken.04-16-2009
20100023560Method and apparatus for concurrently updating a database - A method and apparatus for concurrently updating a database is provided. An exclusive copy of a record is created in the database, the exclusive copy for exclusive use by a first entity of a first class. First proposed changes to the record from the first entity are posted to the exclusive copy. It is determined if the exclusive copy conflicts with a non-exclusive copy of the record, the non-exclusive copy for non-exclusive use by a plurality of second entities of a second class. If the exclusive copy does not conflict with the non-exclusive copy, the first proposed changes are posted to the record. Hence high availability devices can concurrently modify the database in parallel with low availability configuration applications, with conflict resolution.01-28-2010
20100036894DATA SYNCHRONIZATION METHOD, DATA SYNCHRONIZATION PROGRAM, DATABASE SERVER AND DATABASE SYSTEM - A data synchronization method is provided to enhance reliability and performance of the database. The data reflection method selection unit of the active server weights collected values in the resource utilization table by multiplying the collected values by assessment coefficients assigned to the individual collected values in an assessment coefficient table and sums up the weighted values to calculate an assessment value for each data reflection method, and determines the data reflection method whose assessment value is minimum. The log data transmission unit, according to the determined data reflection method, sends log data that is reflected on the active database to the standby server, which forms one of the duplicated servers making up the redundant configuration. The data reflection method identifies the content to be transmitted.02-11-2010
20090313308METHOD AND APPARATUS FOR COMPARING PROCESS DESIGNS - This invention relates to a data comparison tool, method and computer program product for analysing a set of data, the set of data being derived from an original set of data, comprising: comparing the derived set of data with the original set of data; generating a hyperlink to represent each difference between the derived and original data set, each difference being a changed item, an additional item, or a missing data item; providing at least one agent that is activated on selection of the hyperlink to operate on the changed, additional or missing data item; whereby a list of hyperlinks is generated to represent all the differences of the derived and original data set and selecting one of the hyperlinks will execute an agent to operate on a single data item in one of the data sets. An editor agent is provided for allowing the user to confirm or make further changes to the data item. An undo agent is provided for undoing the difference wherein a changed item is changed back, an additional item is removed and a missing item is replaced.12-17-2009
20090216813METHOD AND SYSTEM FOR GENERATING A TRANSACTION-BOUND SEQUENCE OF RECORDS IN A RELATIONAL DATABASE TABLE - A method for generating a transaction-bound sequence of records in a database table is disclosed. In response to a transaction attempting to insert a record to a database table within a relational database, an identification (ID) of the transaction and the name of the associated database table are initially obtained. A determination is then made whether or not the obtained transaction ID and the associated database table name are found in the transaction-bound tracking table. If they are not found in the transaction-bound tracking table, a new entry is generated in the transaction-bound tracking table for the obtained transaction ID and database table name, and a value in a last_order_number column associated with the entry is set to 1; otherwise, a value in the last_order_number column associated with the entry is incremented by 1. The value in the last_order_number column associated with the entry is subsequently copied to the corresponding order tracking field associated with the record entry in the database table.08-27-2009
20090106325RESTORING RECORDS USING A CHANGE TRANSACTION LOG - In one embodiment of the method, a first transaction is generated for deleting a record from a table of a database. In response the record is deleted from the table. Further in response to the generation of the first transaction, a copy of data of the record is stored in an entry of a transaction log before the record is deleted from the table. An instruction is then generated, and in response the record is restored to the table after the record is deleted, wherein the record is restored in the table using the copy of the data in the transaction log entry.04-23-2009
20100005124AUTOMATED METHOD FOR IDENTIFYING AND REPAIRING LOGICAL DATA DISCREPANCIES BETWEEN DATABASE REPLICAS IN A DATABASE CLUSTER - A method and system for monitoring and maintaining the consistency of replicated databases in a shared-nothing database cluster architecture is presented. The method involves the continuous monitoring of the database transaction logs that are maintained by the autonomous database managers that manage the individual database replicas in the cluster. In the event that data discrepancies are detected via the comparison of the transaction logs of the individual database replicas, remedial action is carried out according to configured rules in the main cluster controller. These remedial actions may include, but are not limited to, making a database node inactive within the cluster, or automatically repairing any data discrepancies that are detected among the database replicas in the cluster. Additionally, if the database management system running within each node of the cluster possesses a database history file that records key events pertaining to a database replica, such as the occurrence of non-logged bulk loads of table data, or the modification of tables, a method can be instituted for the monitoring of the history files for discrepancies between the database replicas. Finally, an enhanced relational database management system is described that: (a) tags each data change record in the transaction log for a given managed database with a unique transaction identifier that is associated with the transaction request that initiated the data change; and, (b) tags each data change record in the transaction log for a given managed database with a client identifier that identifies the client that submitted the transaction request that initiated the data change. The enhanced relational database management system also includes an extended client interface that makes the unique transaction identifier for each transaction request available to the client application that submitted the transaction request.01-07-2010
20100005123Tracking Manufacturing Test Changes - A process methodology and application for change control monitoring and identification used with a circuit board testing platform. This methodology uses “baselines” to track an approved collection of changes for testing a circuit board. An approver is an authorized user or a user that have permission to modify board-test parameters. Modifications of board-test parameters made by unauthorized persons are reported though a change notification system that can alert quality control systems so corrective action of the change can be taken. The change notification system associates the identity of the circuit board to the changes being made. The system uses digital signature encryption to protect the integrity and verifiability of the data from the test system and prevents data forgery.01-07-2010
20090177712Digital data Recording device - Provided is a digital data recording device capable of efficiently backing up media data of digital data requiring copyright protection and personal information protection within a range of the copyright holder's permission. The digital data recording device includes a record control unit for recording a media file configured by a media data file and a media management file containing decryption key information of the media data file to a recording device, backing up the media data file or the media management file to the recording device or a removable recording device, and restoring the media data file or the media management file backed up in the recording device or the removable recording device.07-09-2009
20080288557System for backing up and recovering data applied to data processing apparatus and method for the same - The invention discloses a data backup/recovery system for backing up and recovering data in a data processing apparatus. The data processing apparatus comprises a Basic Input Output System (BIOS) with a memory, a System Data Security Module (SDSM), and the data backup/recovery system. The SDSM is used for storing a backup data and has a real time clock. The data backup/recovery system determines whether the backup data should be recovered to the BIOS by checking whether the checksum of the memory fails and whether there is a copy of the backup data stored in the SDSM. Finally, the data backup/recovery system backs up the data stored in the memory to the SDSM. Accordingly, the data backup/recovery process is accomplished.11-20-2008
20080222214STORAGE SYSTEM AND REMOTE COPY SYSTEM RESTORING DATA USING JOURNAL - This invention provides a storage system including: a control unit; a first storage device for storing data; and a second storage device for storing journals of the data stored in the first storage device, in which: the first storage device has a RAID configuration for recording parity data dispersedly in a plurality of physical storage devices; and the control unit is configured to: create updated parity data based on updated data included in an update instruction; store the updated data and the updated parity data in the first storage device; record a journal including the updated data and the updated parity data in the second storage device; and read sequentially at least one of the journals upon reception of an instruction to restore the data stored in the first storage device to write the updated data and the updated parity data contained in the read journals in the first storage device.09-11-2008
20080243945Log Data Store and Assembler for Large Objects in Database System - A mechanism works in conjunction with a DB2® Log and an analysis tool, such as BMC's Log Master™, to handle logged data for Large Objects (LOBs) stored in tables of a DB2 database system. A plurality of controls track data logged for the LOBs. The mechanism reads log records from a DB2 Log and uses the controls to determine which of the tracked LOBs is associated with the log records and obtains data from those associated log records. The mechanism builds keys to index the data and stores the keys and the data in a Virtual Storage Access Method store having Key Sequenced Data Sets maintained separate from the log record store for the DB2 Log. When requested by the analysis tool, the data in the store can be reassembled using the keys and map records in the first store that map the logged data for the tracked LOBs.10-02-2008
20090300075Method and System for Data Definition Language (DDL) Replication - Systems, methods and computer program products for DDL replication are described herein. An embodiment includes a replication agent to instantiate one or more DDL triggers in a primary database and a replication server to provide DDL command text to a replicate database based on said DDL triggers. The replication agent uses the DDL trigger(s) to capture one or more DDL events and retrieve a transaction log associated with the DDL events. The replication agent processes the transaction log to obtain DDL command text. The DDL command text is then sent to a replicate database by the replication server where it is executed in an appropriate user context. In this way, DDL commands in may be replicated using DDL trigger(s) and session context switching.12-03-2009
20090187609DISTRIBUTED BACKUP AND RETRIEVAL SYSTEM - A method is provided for performing distributed backup and retrieval of data. Data is sent by a plurality of client devices to be processed by a server and then stored in a database. A subset of the processed data stored in the database is backed up to each of the plurality of client devices. For the one or more particular client devices owned by a user, the subset of processed data stored on the one or more particular client devices is the subset of processed data that is associated with the user. The server and client device is updated to maintain the same state of processed data in the database and the backup. In the event of failure of either the database or a client device, processed data may be restored using the processed data stored on the database or the backup stored on the plurality of client devices.07-23-2009
20090300073SYSTEM AND APPARATUS TO ENSURE A LOW-LATENCY READ OF LOG RECORDS FROM A DATABASE MANAGEMENT SYSTEM ("DBMS") - A system and method to ensure a low-latency read of log records from a Database Management System (“DBMS”) in asynchronous log-based database replication capture from a blocking log read Application Programming Interface (“API”). The system may include a replication server with a log read module to initialize a log read thread. The reading module of the log read thread may read a predefined number of DBMS log records. A log flush module of the log flush thread may be executed by the log read thread and waits for a read complete notification. The update module, in response to a log flush thread time out, may also generate a plurality of loggable transactions such that a number of log records in an internal API log satisfies a DMBS threshold and unblocks the DBMS API. Therefore, the latency time may be constant, low, and predictable ensuring an accurate replication capture.12-03-2009
20090292743MODELING USER ACCESS TO COMPUTER RESOURCES - Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes.11-26-2009
20100030822DATA RECOVERY USING A MINIMUM NUMBER OF RECOVERY STREAMS - A data recovery method that uses a minimum number of recovery streams is provided. The method comprises defining a minimum number of recovery streams to be read from during restoration of data from one or more storage volumes in a communication network, wherein the minimum number is determined according to one or more parameters defining availability of one or more resources in the communication network; restoring the data using at least the minimum number of recovery streams to optimize the rate at which the data is restored; and dynamically changing the minimum number of recovery streams, in response to determining that the availability of the one or more resources has changed.02-04-2010
20100030821SYSTEMS AND METHODS FOR PRESERVING AUDITABLE RECORDS OF AN ELECTRONIC DEVICE - Embodiments of a system and method for preserving data records of a system comprising a mobile electronic device and a remote log storage configured to store data records corresponding to auditable events. The mobile electronic device comprises memory storage configured to store user data and the user data includes a data log comprising data records corresponding to auditable events. As well, the mobile electronic device is operatively coupleable to the remote log storage. The method comprises receiving a command to delete the user data; determining any data records in the data log which have not been uploaded to the remote log storage; storing any determined data records in the remote log storage; and deleting the user data.02-04-2010
20090083339Efficient and Correct Fuzzy Snapshots - A method and device are provided for taking a database snapshot using a fuzzy snapshot. In one example, the method includes starting and maintaining a transaction log of the database, starting and maintaining a fuzzy snapshot of the database without applying any hindering locks to the database, and restoring the database by applying the transaction log to the fuzzy snapshot.03-26-2009
20090157767CIRCULAR LOG AMNESIA DETECTION - The setting up of a circular log implementation to be able to detect amnesia in a circular log, and to the determination of whether or not amnesia has occurred in such a circular log. Upon detecting a checkpoint trigger, information is preserved sufficient to detect whether or not the removed records ever existed in the circular log. If a request for information from a record were subsequently to be received by the circular log implementation, and if the record was not actually in the circular log, the preserved information could then be consulted to see if it indicates that the record had once existed in the circular log. If the information indicates that the record had once existed in the circular log, then amnesia has not occurred. If the information does not indicate that the record had once existed in the circular log, then amnesia has occurred. Accordingly, amnesia detection is made possible even in a complicated circular log implementation.06-18-2009
20080235295High availability of JCA inflowed transactions - Recovery of inflowed transactions are provided by any instance in a cluster, along with peer recovery of transactions in a cluster, and administrative functionality related to these aspects. A method of managing transaction processing comprises performing transaction processing using a first process, wherein the first process logs the transaction processing that it performs, detecting failure of the first process, wherein the transaction logs of the first process are locked, taking ownership of the locked transaction logs of the first process at a second process, unlocking the locked transaction logs of the first process for use by the second process, and recovering at least one transaction using the transaction logs.09-25-2008
20090106326CUSTOMIZED ROLL BACK STRATEGY FOR DATABASES IN MIXED WORKLOAD ENVIRONMENTS - Roll back strategies for database deadlock resolution are customized by identifying a first transaction to a database, identifying a second transaction to the database and detecting a deadlock between the first and second transactions with respect to the database. The deadlock is resolved based upon a predetermined roll back strategy associated with at least one of the first or second transactions to identify a select one of the first and second transactions for roll back and a request is conveyed to roll back the selected one of the first and second transactions, wherein the preferred transaction is allowed to continue processing.04-23-2009
20090132608SYSTEM AND METHOD FOR DOCUMENT PROCESSING MAINTENANCE REPORTING - The subject application is directed to a system and method for document processing maintenance reporting. First, a service operation of an associated document processing device is commenced. Next, data corresponding to the service operation on the document processing device is logged into an associated data storage after the commencement of the operation. Address data corresponding to the address of at least one system administrator assigned to the document processing device is then stored. The service operation is then concluded upon the completion of the operation. A report format instruction is then received after the completion of the service operation. Maintenance operation report data is then generated in accordance with the logged data. The generated maintenance operation report data is then selectively transmitted to the at least one system administrator in accordance with the stored address data and with the received report format instruction.05-21-2009
20090132607TECHNIQUES FOR LOG FILE PROCESSING - Techniques for log file processing are provided. Multiple user-defined functions process in parallel on different nodes of a network. Each user-defined function on a particular node creates its own log file. All the log files are represented by the same identifier within their respective node environments. When access to the log files is requested, all the log files are accessed and merged automatically into a single database table for centralized viewing and access.05-21-2009
20100049750RECOVERY OF A COMPUTER THAT INCLUDES VIRTUAL DISKS - Described is the backup and/or restore of virtual disks In general, metadata is backed up for restoring a virtual disk. To restore the disk, a physical disk is created, with the virtual disk the created on a partition of the physical disk. Backup and restore is described for nested virtual disks, including for block level restore. Further described is backing up of critical virtual disks and their containers, and virtual disk backup with respect to basic disks and dynamic volumes.02-25-2010
20080215637LOGGING LAST RESOURCE - A logging last resource (LLR) system can provide a transaction log and transaction data to a LLR resource after a number of two-phase-commit resources have been prepared. The LLR resource manager can operate on the transaction log and transaction data in an atomic fashion so that the one-phase or local commit can be done. The one-phase or local commit can be done by the LLR manager in an atomic manner.09-04-2008
20100011031STORING LOG DATA EFFICIENTLY WHILE SUPPORTING QUERYING - A logging system includes an event receiver and a storage manager. The receiver receives log data, processes it, and outputs a column-based data “chunk.” The manager receives and stores chunks. The receiver includes buffers that store events and a metadata structure that stores metadata about the contents of the buffers. Each buffer is associated with a particular event field and includes values from that field from one or more events. The metadata includes, for each “field of interest,” a minimum value and a maximum value that reflect the range of values of that field over all of the events in the buffers. A chunk is generated for each buffer and includes the metadata structure and a compressed version of the buffer contents. The metadata structure acts as a search index when querying event data. The logging system can be used in conjunction with a security information/event management (SIEM) system.01-14-2010
20080301200LOG FILE AMNESIA DETECTION - Log file amnesia detection is accomplished by associating a unique identifier with each record in a log file, where each record receives a unique log sequence number. Multiple time intervals are associated with the log file with different events triggering the beginning of a new time interval. The log file implementation marks the beginnings of these multiple time intervals with a unique identifier. Every time an event occurs that triggers a new time interval a new unique identifier is generated. This unique identifier will be associated with the records in the log file that are created thereafter until the next unique identifier gets generated, marking the beginning of a next time interval. Log file amnesia can be identified when a log client requests information about a record and then comparing the unique identifier and log sequence number of the record with all records in the log file.12-04-2008
20080301199Failover Processing in Multi-Tier Distributed Data-Handling Systems - A method and system for processing a transaction request in a distributed data handling architecture. Responsive to receiving a transaction request at a master transaction server, a transaction identifier that identifies a data operation specified by the received transaction request is recorded within a local memory of a replica server. Data operation results are committed master transaction server memory and responsive to committing the data within the master transaction server memory, a post commit signal is sent to the replica server. Data operation results are also committed within local memory of the replica server, and responsive to a failover condition that prevents the master transaction server from sending the post commit signal, the recorded transaction identifier is utilized to synchronize data stored locally within the replica server with data stored within a persistent backend data store shared by the master transaction server and the replica server.12-04-2008
20080256139METHODS AND SYSTEMS FOR DATA RECOVERY - To recover deleted files in a data store, candidate blocks of the data store may be identified and, for each of the candidate blocks, a probability that the candidate block contains a directory entry may be determined. Directory entry metadata for candidate blocks that have a determined probability that is greater than a predetermined probability threshold may then be extracted.10-16-2008
20080256138Recovering a file system to any point-in-time in the past with guaranteed structure, content consistency and integrity - A data management system (DMS) includes a continuous real-time object store that captures all real-time activities, with associated object metadata information. The DMS is capable of reintroducing any point-in-time view of data ranging from a granular object to an entire file system. A set of algorithms (for creation of a file or directory, modification of a file or directory, deletion of a file or directory, and relocation/renaming of a file or directory) are used to generate and maintain a file system history in the DMS and to ensure that a latest version of a directory always refers to a latest version of its children until the directory changed. Any point-in-time recovery is implemented using the file system history in one of various ways to provide strong individual file integrity, exact point-in-time crash consistency, and/or recovery of last version of all files in the file system.10-16-2008
20080243946Storage system and data recovery method - Proposed are a storage system and a data recovery method capable of guaranteeing data recovery processing at a service level sought by a user. This storage system and data recovery method uses one or more data recovery candidate points and specifies a section containing the journal and the replication of write data, checks a redundancy relation of a write range in the volume of write data written from host into the volume contained in the journal regarding one or more the journals in the section, and executes redundancy elimination processing of merging a plurality of the replications of write data or a plurality of the journals into a single replication of write data or a single journal based on the check result.10-02-2008
20080228837System and method of restoring data and context of client applications stored on the web - An improved system and method for supporting web system services is provided for storing data and context of client applications on the web. A client application may include a web system services interface for invoking web system services to support web applications to operate over the web using different devices that may store data and context of web applications as a web application document onto a web server. A web application document may be represented by components that may include view information, content, and context information. The application may also include a web system services user interface for providing a graphical user interface for a user to invoke web system services that may include a new document system service, a store document system service, and a restore document system service. A schema for context scope may be implemented for collecting context information relevant to the web application document.09-18-2008
20080228835SHARED DISK CLONES - Embodiments of the invention generally relate to data processing systems and more particularly to high availability data processing systems. A primary server may share a storage device with one or more clone systems. Each clone generally replicates the state of the primary server, but relies on the same disk-based storage as the primary server. Thus, the clone systems may provide a shadow of the primary server, ready to take over should the primary server fail. The clone systems may access a log file that includes entries reflecting the actions performed by the primary system. The primary server may flush entries from a log buffer maintained on the primary server to a log file stored on the shared disk-based storage. The primary server may also send a log sequence number to the clone systems, and the clone systems periodically transmit a log sequence number back to the primary server indicating how far through the log file a clone system has progressed.09-18-2008
20080222215Method for Deleting Virus Program and Method to Get Back the Data Destroyed by the Virus - The present invention discloses a method of recovering data corrupted by a virus program, comprising: obtaining a devastating behavior operation step that can be performed by the virus program; establishing a reverse behavior operation step corresponding to the devastating behavior operation step; performing the corresponding reverse behavior operation step in response to the devastating behavior operation step that can be performed by the virus program. The present invention further provides a method of removing a virus program, comprising: establishing reverse behavior operation steps corresponding to operation steps of the virus program, executing the reverse behavior operation steps and removing the program to be checked. The method of the present invention employs different reverse behavior operation steps for different virus programs, recovering data corrupted by a virus program, eliminates the defect that existing methods of removing a virus perform a identical processing step for any virus program, enabling the computer removed of the virus program to recover as far as possible to its previous state before infected by the virus program.09-11-2008
20080270487AUTOMATIC JTA MIGRATION - The failure of a first application server instance of a cluster can be detected and transaction recovery service can be automatically migrated from the first application server instance to a second application server instance without requiring rebooting the first application server instance.10-30-2008

Patent applications in class Recoverability