Patent application number | Description | Published |
20120095965 | SYNCHRONIZATION FOR INITIALIZATION OF A REMOTE MIRROR STORAGE FACILITY - A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region. | 04-19-2012 |
20120239622 | SYNCHRONIZATION FOR INITIALIZATION OF A REMOTE MIRROR STORAGE FACILITY - A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region. | 09-20-2012 |
20120297113 | OPTIMIZED FLASH BASED CACHE MEMORY - Embodiments of the invention relate to throttling accesses to a flash memory device. The flash memory device is part of a storage system that includes the flash memory device and a second memory device. The throttling is performed by logic that is external to the flash memory device and includes calculating a throttling factor responsive to an estimated remaining lifespan of the flash memory device. It is determined whether the throttling factor exceeds a threshold. Data is written to the flash memory device in response to determining that the throttling factor does not exceed the threshold. Data is written to the second memory device in response to determining that the throttling factor exceeds the threshold. | 11-22-2012 |
20120297127 | OPTIMIZED FLASH BASED CACHE MEMORY - Embodiments of the invention relate to throttling accesses to a flash memory device. The flash memory device is part of a storage system that includes the flash memory device and a second memory device. The throttling is performed by logic that is external to the flash memory device and includes calculating a throttling factor responsive to an estimated remaining lifespan of the flash memory device. It is determined whether the throttling factor exceeds a threshold. Data is written to the flash memory device in response to determining that the throttling factor does not exceed the threshold. Data is written to the second memory device in response to determining that the throttling factor exceeds the threshold. | 11-22-2012 |
20130007366 | DELAYED INSTANT COPY OPERATION FOR SHORT-LIVED SNAPSHOTS - A method, including defining a snapshot referencing a source partition of a storage volume on a storage device, and receiving a request to write a block of data to the source partition. Upon receiving the write request, a delayed instant copy operation is initiated by allocating a target partition on the storage device and replacing, in the storage volume, the source partition with the target partition. A definition of a condition for completion of the delayed instant copy operation is received, and the delayed instant copy operation is completed upon the condition being met. | 01-03-2013 |
20140372635 | UNIT ATTENTION PROCESSING IN PROXY AND OWNER STORAGE SYSTEMS - Methods, apparatus and computer program products implement embodiments of the present invention that include a storage device configured to store a logical volume mapped between a host computer and a computer having multiple initiator ports, and a processor configured to detect a unit attention condition for the logical volume. Examples of unit attention conditions for the logical volume include management operations on the logical volume and host requests for the logical volume. Upon detecting a unit attention condition, the processor can to generate a unit attention code and a respective unique serial number in response to detecting the unit attention condition, and upon receiving an input/output (I/O) request for the logical volume from a given initiator port, the processor can convey, to the given initiator port, the unit attention code and the respective unique serial number in response to the I/O request. | 12-18-2014 |
20140372636 | SAFELY MAPPING AND UNMAPPING HOST SCSI VOLUMES - Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a storage system, a change in a mapping of a logical volume to one or more host ports of a host computer communicating with the storage system via a storage area network (SAN). Subsequent to detecting the change, first and second input/output (I/O) requests for the logical volume are received from a given host port, and a first unit attention message is conveyed to the given host port in response to the first I/O request. A second unit attention message is conveyed to the given host port upon determining that the storage system received the second I/O request within a specific time period commencing upon receiving the first I/O request. However, the second I/O request can be performed if the storage system received the second I/O request subsequent to the specific time period. | 12-18-2014 |
20150046667 | SYNCHRONIZATION FOR INITIALIZATION OF A REMOTE MIRROR STORAGE FACILITY - A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region. | 02-12-2015 |