Patent application number | Description | Published |
20090070528 | APPARATUS, SYSTEM, AND METHOD FOR INCREMENTAL RESYNCHRONIZATION IN A DATA STORAGE SYSTEM - An apparatus, system, and method are disclosed for performing an incremental resynchronization between two unrelated volumes when a third volume fails. The apparatus, system, and method include initiating registration of changed tracks; keeping track of bytes in flight activities between a local volume and an intermediate volume; recording the changed tracks in bitmaps at the local volume; stopping the recording of the changed tracks; and starting a resynchronization process by sending the changed tracks to a recovery volume. | 03-12-2009 |
20090177850 | APPARATUS, SYSTEM, AND METHOD FOR A READ-BEFORE-WRITE STORAGE CONTROLLER INSTRUCTION - An apparatus, system, and method are disclosed for a read-before-write storage controller instruction. A sequencer receives an atomic read-before-write instruction comprising new data, a target address for the new data, and an undo log address. An I/O unit reads old data from the target address, writes the old data and the target address to the undo log address, and writes the new data to the target address as directed by the sequencer. | 07-09-2009 |
20090187613 | ARTICLE OF MANUFACTURE AND SYSTEM FOR FAST REVERSE RESTORE - Techniques are provided for performing a copy operation. A fast reverse restore command indicating a new source and a new target is received, wherein the new source is an original target and the new target is an original source. A synchronous scan is performed on the new target. A new target structure associated with the new target is updated using a new source structure associated with the new source. Techniques are also provided for performing a copy operation in which a fast reverse restore command is received after an instant virtual copy has been performed from a new target to a new source and wherein the fast reverse restore command is performed before a background copy has been performed by the instant virtual copy. | 07-23-2009 |
20090249116 | MANAGING WRITES RECEIVED TO DATA UNITS THAT ARE BEING TRANSFERRED TO A SECONDARY STORAGE AS PART OF A MIRROR RELATIONSHIP - Provided are a method, system, and article of manufacture for managing writes received to data units that are being transferred to a secondary storage as part of a mirror relationship. Synchronization information indicates data units to transfer from a primary storage to a secondary storage, wherein the synchronization information data is updated to indicate the transfer of one of the data units from the primary storage to the secondary storage. A storage controller receives a write request having an update to a target data unit comprising one of the data units indicated in the synchronization information that has not been transferred from the primary storage to the secondary storage. The write request is allowed to apply the update to the target data unit in response to transferring the data in the target data unit to a network adapter of the storage controller and before the data in the target data unit is transferred to the secondary storage. | 10-01-2009 |
20100050008 | Estimating Power Consumption in a Computing Environment - A method for determining power consumption in a data storage system is provided. The method comprises determining data access patterns for at least a first storage device in a storage system based on operations performed by the first storage device; and calculating power consumption for the storage system by interpolating costs associated with the operations performed by the first storage device, wherein the cost associated with each operation is determined based on: (1) various levels of activities for the first storage device and a mix of workload characteristics, and (2) predetermined power consumption measurements obtained from one or more benchmarks for same operations performed by a second storage device in a test environment. | 02-25-2010 |
20100094990 | Platform-level Indicators of Application Performance - A method for monitoring performance includes monitoring packet traffic on at least one socket that is associated with an application running on a computer and is communicated over a data network. First and second instances of a performance indicator of the packet traffic are measured respectively during first and second monitoring intervals. An alert is issued upon making a determination that a change between the first instance and the second instance exceeds a predetermined threshold. | 04-15-2010 |
20100169716 | MANAGING CONFIDENCE LEVELS IN A COMPUTING SYSTEM - A method for managing confidence levels in a computing system is provided. The method comprises determining a first confidence level associated with a first operation performed in the computing system. The first confidence level indicates probability that the first operation was performed successfully and is calculated based on attributes of one or more components in the computing system. Once the first confidence level is determined, the first confidence level is compared to a confidence threshold for the first operation. If the first confidence level is less than the confidence threshold, a first remedial action is taken to raise the first confidence level. | 07-01-2010 |
20100235582 | METHOD AND MECHANISM FOR DELAYING WRITING UPDATES TO A DATA CACHE - A novel and useful mechanism and method for writing data updates to a data cache subsystem of a storage controller. Updates received by the storage controller requiring storage allocation on a repository volume are delayed prior to being written to the data cache subsystem. The delay is based on the storage utilization of the repository volume. As the utilization of the repository volume increases, the cache write delay increases, thereby limiting the possibility that there will still be any updates in the data cache subsystem waiting to be destaged to the repository volume when the repository volume is fully utilized. When the repository volume is fully utilized all writes to the data cache of updates that will cause destage of tracks in the repository volume are stopped, thereby causing an infinite delay. | 09-16-2010 |
20110047343 | DATA STORAGE SYSTEM FOR FAST REVERSE RESTORE - Techniques are provided for performing a copy operation. A fast reverse restore command indicating a new source and a new target is received, wherein the new source is an original target and the new target is an original source. A synchronous scan is performed on the new target. A new target structure associated with the new target is updated using a new source structure associated with the new source. Techniques are also provided for performing a copy operation in which a fast reverse restore command is received after an instant virtual copy has been performed from a new target to a new source and wherein the fast reverse restore command is performed before a background copy has been performed by the instant virtual copy. | 02-24-2011 |
20110145534 | EFFICIENT LOADING OF DATA INTO MEMORY OF A COMPUTING SYSTEM - A method for deploying one or more virtual machines on a host computing system is provided. The method comprises receiving mapping information from a data storage system. The mapping information associates a first data chunk stored in the data storage system with a unique identifier to support deployment of a first virtual machine on a host computing system. Once the mapping information is received, the mapping information is utilized to determine whether any copies of the first data chunk have already been loaded into a memory of the host computing system in association with deployment of the first virtual machine or a second virtual machine on the host computing system. If no copies of the first data chunk have already been loaded into the memory, the first data chunk is retrieved from the data storage system, loaded into the memory, and utilized to deploy the first virtual machine on the host computing system. | 06-16-2011 |
20120131575 | DEVICE EMULATION IN A VIRTUALIZED COMPUTING ENVIRONMENT - Systems and methods for optimizing operation of a physical device in a virtualized computing environment are provided. The method comprises monitoring instructions issued by an application running on a virtual machine's (VM) operating system, wherein the VM is hosted by a hypervisor providing access to a physical device connected to a virtualized computing environment; wherein a device driver supported by the operating system issues one or more instructions to an emulated device supported by the hypervisor to control the physical device according to the issued instructions, wherein the emulated device's registers are implemented in memory of the hypervisor and the instructions issued by the device driver are stored in said registers, wherein the hypervisor handles the instructions, in response to learning that the instructions are stored in said registers. | 05-24-2012 |
20120136977 | STORAGE APPLIANCE, APPLICATION SERVER AND METHOD THEREOF - A storage appliance system is disclosed which may include at least one application server for locally executing an application, and one or more storage servers in communication with the application server for I/O transmission therebetween. Also disclosed are an application server, a method, and a computer program product. | 05-31-2012 |
20130054540 | FILE SYSTEM OBJECT-BASED DEDUPLICATION - Systems and methods for optimizing deduplication in a data storage system are provided. The method comprises associating a first name with first data blocks including first content stored in a data storage system, wherein the first name is associated with the first data blocks by way of a reference to a first meta file that points to a data file which points to the first data blocks; storing a first signature derived from the first content in an indexing data structure, wherein the first signature is used to associate the first name with the first data blocks and as means to verify whether a second content is a duplicate of the first content, based on value of a second signature derived from the second content. | 02-28-2013 |
20130246723 | Efficient Loading of Data into Memory of a Computing System - The method comprises receiving mapping information from a data storage system. The mapping information associates a first data chunk stored in the data storage system with a unique identifier to support deployment of a first virtual machine on a host computing system. Once the mapping information is received, the mapping information is utilized to determine whether any copies of the first data chunk have already been loaded into a memory of the host computing system in association with deployment of the first virtual machine or a second virtual machine on the host computing system. If no copies of the first data chunk have already been loaded into the memory, the first data chunk is retrieved from the data storage system, loaded into the memory, and utilized to deploy the first virtual machine on the host computing system. | 09-19-2013 |
20140068620 | TASK EXECUTION & MANAGEMENT IN A CLUSTERED COMPUTING ENVIRONMENT - Machines, systems and methods for task management in a computer implemented system. The method comprises registering a task with brokers residing on one or more nodes to manage the execution of a task to completion, wherein a first broker is accompanied by a first set of worker threads co-located on the node on which the first broker is executed, wherein the first broker assigns responsibility of execution for the task to the one or more worker threads in the first set of co-located worker threads, wherein in response to a failure associated with a first worker thread in the first set, the first broker reassigns the responsibility of execution for the task to a second worker thread in the first set, wherein in response to a failure associated with the first broker, a second broker assigns responsibility of execution for the task to one or more co-located worker threads. | 03-06-2014 |
20140201480 | Data Recovery Scheme Based on Data Backup Status - Machines, systems and methods for increasing data resiliency in a computing system, the method comprising distinguishing between first data and second data stored in one or more data storage mediums, wherein the first data is more vulnerable than the second data for the purpose of recovering lost data; and recovering the first data before recovering the second data. Increasing redundancy protection for the first data to increase chances for data recovery by way of data reconstruction; and decreasing redundancy protection for the first data, after the first data has been backed up at least once. | 07-17-2014 |
20140330869 | SECURE ISOLATION OF TENANT RESOURCES IN A MULTI-TENANT STORAGE SYSTEM USING A SECURITY GATEWAY - Machines, systems and methods for handling a client request in a hierarchical multi-tenant data storage system, the method comprising processing a request in subtasks, wherein a subtask is executed with a minimal set of privileges associated with a specific subtenant; extracting a claimed n-level hierarchy of a tenant and sub-tenant identities from the request; extracting authentication signatures or credentials that correspond to a level in the hierarchy; for a first level in the hierarchy, sending the request to a dedicated subtenant authenticator with privilege to validate credentials for a subtenant at the first level; and receiving a confirmation from the dedicated subtenant authenticator, whether the request is authentic. | 11-06-2014 |
20140330936 | SECURE ISOLATION OF TENANT RESOURCES IN A MULTI-TENANT STORAGE SYSTEMWITH INTER-SERVER COMMUNICATION - A distributed system, machine and method in which execution of a client request is performed by entities located on multiple server nodes, the system comprising a proxy and guard component serving as sole communication exit and entry points on a source node and a target nodes respectively, wherein the source node hands off a request to the target node to service via the proxy and guard component; a mechanism via which the proxy locally extracts a set of tenant-related privileges associated with a client submitting the request for service; wherein the proxy sends the request to the guard via a secured network while attaching a description of the sender's set of tenant privileges to the request. | 11-06-2014 |
20140331337 | SECURE ISOLATION OF TENANT RESOURCES IN A MULTI-TENANT STORAGE SYSTEM USING A GATEKEEPER - Machines, systems and methods for controlling access to data stored on shared storage, servicing a plurality of tenants, the method comprising receiving a request from a first process to access a first data item associated with a first tenant in a multi-tenant data storage system, and providing access to the data item through a gatekeeper, in response to determining that the first process is associated with the first tenant. | 11-06-2014 |
20150032910 | INPUT/OUTPUT MONITORING MECHANISM - Machines, systems and methods for I/O monitoring in a plurality of compute nodes and a plurality of service nodes utilizing a Peripheral Component Interconnect express (PCIe) are provided. In one embodiment, the method comprises assigning at least one virtual function to a services node and a plurality of compute nodes by the PCIe interconnect and a multi-root I/O virtualization (MR-IOV) adapter. The MR-IOV adapter enables bridging of a plurality of compute node virtual functions with corresponding services node virtual functions. A front-end driver on the compute node requests the services node virtual function to send data and the data is transferred to the services node virtual function by the MR-IOV adapter. A back-end driver running in the services node receives and passes the data to a software service to modify/monitor the data. The back-end driver sends the data to another virtual function or an external entity. | 01-29-2015 |