Patent application number | Description | Published |
20080205299 | CONFIGURATION OF FIBRE CHANNEL SAN PATH - System and computer program product are provided to configure a path between nodes through a fabric in a fibre channel storage area network (SAN). A node name is provided for a target node on the SAN and a port name is provided for each port in the target node. A relationship is established in a data structure between each port name and a slot in which each port is physically located in the target node. Prior to configuring a path between a source node and a port in the target node, the ports which are physically connected and logged in to the fabric are identified by port address. The port names corresponding to the port addresses are then identified. The port names are used to generate interface_ids of the ports corresponding to the physical slots in which the ports are located. A data structure is created to maintain the relationship between interface_ids and port names. To establish a path connection between a port in the source node and a selected port in the target node, the node name of the target node and the interface_id of the selected port are input to the data structure and the port name of the selected port is output. The port name is then used to obtain the address of the selected port and an I/O session path opened between the source and target nodes. | 08-28-2008 |
20100049920 | DYNAMICALLY ADJUSTING WRITE CACHE SIZE - A storage system includes a backend storage unit for storing electronic information; a controller unit for controlling reading and writing to the backend storage unit; and at least one of a cache and a non-volatile storage for storing the electronic information during at least one of the reading and the writing; the controller unit executing machine readable and machine executable instructions including instructions for: testing if a frequency of non-volatile storage full condition has occurred one of above and below an upper threshold frequency value and a lower threshold frequency value; if the frequency of the condition has exceeded a threshold frequency value, then calculating a new size; calculating an expected average response time for the new size; comparing actual response time to the expected response time; and one of adjusting and not adjusting a size of the non-volatile storage to minimize the response time. | 02-25-2010 |
20130268716 | EXECUTING HOST DATA TRANSFER OPERATIONS DURING SETUP OF COPY SERVICES OPERATIONS - Host input/output (I/O) operations are performed via a file stored in a non-volatile storage coupled to a storage controller while data structures are being generated in the storage controller to copy data from source logical volumes to target logical volumes. The source logical volumes and the target logical volumes are logical representations of physical storage maintained in a plurality of direct access storage devices. The contents of the file are transferred from the non-volatile storage to one or more of the plurality of direct access storage devices, after the data structures have been generated, wherein the host I/O operations are performed via the file while the contents of the file are being transferred to the one or more of the plurality of direct access storage devices. The host I/O operations to the plurality of direct access storage devices are resumed, in response to transferring entire contents of the file to the one or more of the plurality of direct access storage devices. | 10-10-2013 |
Patent application number | Description | Published |
20080263271 | System for Selectively Performing a Secure Data Erase to Ensure Timely Erasure - A system is provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a plurality of physical volumes and calculating a remaining time for each physical volume. The remaining time is calculated for each physical volume by comparing a current date to the erasure deadline of each physical volume respectively. The physical volumes may then be sorted based on the remaining time and the physical volume with a shortest calculated remaining time will be selectively secure data erased. | 10-23-2008 |
20080263274 | System for Determining Allocation of Tape Drive Resources for a Secure Data Erase Process - A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance by evaluating a quantity of physical volumes to be secure data erased, a maximum queued threshold, an average time to an erasure deadline and a minimum expiration threshold. An additional tape drive is allocated for the secure data erase process when it is determined that allocating an additional tape drive would improve secure data erase performance. | 10-23-2008 |
20080263293 | Method for Selectively Performing a Secure Data Erase to Ensure Timely Erasure - A method and computer program product are provided to ensure a timely secure data erase by determining an erasure deadline for each physical volume of a plurality of physical volumes and calculating a remaining time for each physical volume. The remaining time is calculated for each physical volume by comparing a current date to the erasure deadline of each physical volume respectively. The physical volumes may then be sorted based on the remaining time and the physical volume with a shortest calculated remaining time will be selectively secure data erased. | 10-23-2008 |
20080263294 | Method for Determining Allocation of Tape Drive Resources for a Secure Data Erase Process - A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance by evaluating a quantity of physical volumes to be secure data erased, a maximum queued threshold, an average time to an erasure deadline and a minimum expiration threshold. An additional tape drive is allocated for the secure data erase process when it is determined that allocating an additional tape drive would improve secure data erase performance. | 10-23-2008 |
20100030956 | APPARATUS AND METHOD TO STORE ORIGINAL POINT-IN-TIME DATA - A method to store point-in-time data, comprising establishing a block size, providing source data storage comprising (S) blocks, and target data storage comprising (T) blocks. The method configures (B) source storage segments and (B) target storage segments, and receives updated point-in-time data for original point-in-time data written to an (i)th source storage segment. The method then determines if a (j)th target storage segment comprises available storage capacity to store the original point-in-time data. If a (j)th target storage segment comprises available storage capacity to store the original point-in-time data, the method writes the original point-in-time data to that (j)th target storage segment. | 02-04-2010 |
20100049925 | EXECUTING HOST DATA TRANSFER OPERATIONS DURING SETUP OF COPY SERVICES OPERATIONS - Host input/output (I/O) operations are performed via a file stored in a non-volatile storage coupled to a storage controller while data structures are being generated in the storage controller to copy data from source logical volumes to target logical volumes. The source logical volumes and the target logical volumes are logical representations of physical storage maintained in a plurality of direct access storage devices. The contents of the file are transferred from the non-volatile storage to one or more of the plurality of direct access storage devices, after the data structures have been generated, wherein the host I/O operations are performed via the file while the contents of the file are being transferred to the one or more of the plurality of direct access storage devices. The host I/O operations to the plurality of direct access storage devices are resumed, in response to transferring entire contents of the file to the one or more of the plurality of direct access storage devices. | 02-25-2010 |
20100199050 | PROACTIVE TECHNIQUE FOR REDUCING OCCURRENCE OF LONG WRITE SERVICE TIME FOR A STORAGE DEVICE WITH A WRITE CACHE - Provided are techniques for introducing a delay in responding to host write requests. A percentage of fullness of a write cache is determined. Based on the determined percentage of fullness of the write cache (f), a low cache threshold (L), alpha (α), and k, an amount of delay to introduce into responding to a host write request is determined. Techniques wait the amount of the delay before responding to the host write request although the host write request processing has completed. | 08-05-2010 |
20110225356 | Method for Determining Allocation of Tape Drive Resources for a Secure Data Erase Process - A method and computer program product are provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance by evaluating a quantity of physical volumes to be secure data erased, a maximum queued threshold, an average time to an erasure deadline and a minimum expiration threshold. An additional tape drive is allocated for the secure data erase process when it is determined that allocating an additional tape drive would improve secure data erase performance. | 09-15-2011 |
20110225357 | System for Determining Allocation of Tape Drive Resources for a Secure Data Erase Process - A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance by evaluating a quantity of physical volumes to be secure data erased, a maximum queued threshold, an average time to an erasure deadline and a minimum expiration threshold. An additional tape drive is allocated for the secure data erase process when it is determined that allocating an additional tape drive would improve secure data erase performance. | 09-15-2011 |
20120227100 | APPARATUS, SYSTEM, AND METHOD FOR NETWORK AUTHENTICATION AND CONTENT DISTRIBUTION - An apparatus, system, and method are disclosed for network authentication and content distribution. The apparatus includes an authentication module configured to receive redirected network requests over a communications network from a firewall module and configured to present a user license agreement and not require user-identifiable information, and a content distribution module configured to synchronize over the communications network with a client module and transmit content to the client module. The system includes a firewall module connected with a global communications network, a network connected with the firewall module, a computing device configured to couple with the network, and the apparatus. The method includes receiving redirected network requests over a communications network from a firewall module, presenting a user license agreement and not requiring user-identifiable information, and synchronizing over the communications network with a client module and transmitting content to the client module. | 09-06-2012 |
20120311253 | Reallocation of Tape Drive Resources Associated With a Secure Data Erase Process - A method according to one embodiment includes determining whether to reallocate one or more of a plurality of tape drives that are presently allocated for a secure data erase process in response to an evaluation of a quantity of physical volumes to be secure data erased and a minimum queued threshold; and in response to said determination that one or more of said plurality of tape drives is to be reallocated, reallocating the one or more of said plurality of tape drives from the secure data erase process to another function. | 12-06-2012 |