Patent application number | Description | Published |
20080244041 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR AUTOMATICALLY GENERATING BEST PRACTICES FOR CONFIGURING A NETWORKED SYSTEM - A method, system, and computer program product for automatically generating best practices for configuring a networked system of entities are provided. The method includes identifying a networked system configuration problem and determining a set of problematic entities. The set of problematic entities includes the entities reporting the networked system configuration problem. The method further includes determining a set of problem associated entities, where the set of problem associated entities includes the entities with a common association having a strongest correlation to the set of problematic entities. The method additionally includes classifying the set of problem associated entities on an attribute basis to determine one or more attributes of the entities that contribute to the networked system configuration problem, and reporting the best practices for configuring the networked system of entities as avoiding the one or more attributes of the entities that contribute to the networked system configuration problem. | 10-02-2008 |
20080275933 | SYSTEMS AND METHODS FOR STORAGE AREA NETWORK DESIGN - Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported. | 11-06-2008 |
20080275934 | SYSTEMS AND METHODS FOR STORAGE AREA NETWORK DESIGN - Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported. | 11-06-2008 |
20090150456 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DISASTER RECOVERY PLANNING - Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application. | 06-11-2009 |
20090150712 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DISASTER RECOVERY PLANNING - Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application. | 06-11-2009 |
20090182784 | RECOVERY POINT IDENTIFICATION IN CDP ENVIRONMENTS - The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached. | 07-16-2009 |
20100106538 | DETERMINING DISASTER RECOVERY SERVICE LEVEL AGREEMENTS FOR DATA COMPONENTS OF AN APPLICATION - Techniques for determining one or more disaster recovery (DR) service level agreements (SLAs) for each of one or more components of an application are provided. The techniques include identifying one or more components of an application, capturing one or more intra-application data dependencies between the one or more components, and mapping each of the one or more components to a DR profile to determine one or more DR SLAs for each of the one or more components of an application. | 04-29-2010 |
20110022562 | SYSTEM AND METHOD FOR SEMANTIC INFORMATION EXTRACTION FRAMEWORK FOR INTEGRATED SYSTEMS MANAGEMENT - The invention provides an enterprise administration system and method. The system includes a user interface module configured to enter administration terms or select a predetermined script of administration terms, a knowledge base configured to store system information, a meta information module configured to use the system information to store entity-objective indexes, and a workflow mapping module configured to map the administration terms to system information extraction tasks to extract relevant entities and objectives and apply a rule to the extracted entities and objectives for presenting the extracted entities and objectives in a ranked order. | 01-27-2011 |
20110022879 | AUTOMATED DISASTER RECOVERY PLANNING - A system and associated method for automated disaster recovery (DR) planning. A DR planning process receives disaster recovery requirements and a target environment configuration from a user to design DR plans for the target environment configuration that meets disaster recovery requirements. The DR planning process accesses a knowledgebase containing information on replication technologies, best practice recipes, and past deployment instances. The DR planning process creates the DR plans by analyzing the disaster recovery requirements into element risks, associating replication technologies to protect each element risks, combining associated replication technologies based on the best practice recipes, and selecting highly evaluated combination based on the past deployment instances. The DR planning process presents the DR plans as classified by replication strategy-architecture combination for each DR plans and marks how strongly each DR plans are recommended. | 01-27-2011 |
20110078695 | CHARGEBACK REDUCTION PLANNING FOR INFORMATION TECHNOLOGY MANAGEMENT - Reducing cost chargeback in an information technology (IT) computing environment including multiple resources, is provided. One implementation involves a process wherein resource usage and allocation statistics are stored for a multitude of resources and associated cost policies. Then, time-based usage patterns are determined for the resources from the statistics. A correlation of response time with resource usages and outstanding input/output instructions for the resources is determined. Based on usage patterns and the correlation, a multitude of potential cost reduction recommendations are determined. Further, a multitude of integrals are obtained based on the potential cost reduction recommendations, and a statistical integral is obtained based on the statistics. A difference between the statistical integral and each of the multiple integrals is obtained and compared with a threshold to determine potential final cost reduction recommendations. A final cost reduction recommendation is then selected from the potential cost reduction recommendations. | 03-31-2011 |
20110231541 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 09-22-2011 |
20110238672 | COST AND POWER EFFICIENT STORAGE AREA NETWORK PROVISIONING - Various embodiments for efficiently provisioning a storage area network (SAN) are provided. In one embodiment, SAN information is provided to an engine for optimization. The SAN information includes at least one of SAN configuration information, SAN usage information, at least one cost profile, and at least one chargeback model. Based on the SAN information, those of an available plurality of storage resources not meeting at least one storage criterion are filtered. The filtered storage resources are ranked on a cost basis. A resource configuration graph is constructed based on the ranked storage resources. The resource configuration graph is traversed to obtain a plurality of possible SAN configuration plans. At least one power profile is applied to the plurality of possible SAN configuration plans to rank the plurality of possible SAN configuration plans by energy consumption. | 09-29-2011 |
20110295815 | Proactive Detection of Data Inconsistencies in a Storage System Point-in-Time Copy of Data - Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested. | 12-01-2011 |
20120221745 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 08-30-2012 |
20120271678 | CHARGEBACK REDUCTION PLANNING FOR INFORMATION TECHNOLOGY MANAGEMENT - Minimizing cost chargeback in an information technology (IT) computing environment including multiple resources. One implementation involves determining time-based usage patterns and allocation statistics for a plurality of resources and associated resource workloads. Using a regression function for determining a correlation of response time with resource usages and outstanding input/output instructions for the plurality of resources. Based on the time-based usage patterns, allocation statistics and the correlation, deriving an interpolation using positive and negative integrals to minimize a difference between allocated resource values and average allocation values. Determining service level objectives (SLOs) and resource allocation for minimizing cost chargeback for the resource workloads based on the derived interpolation. | 10-25-2012 |
20120323861 | DEDUPLICATED CACHING OF QUERIES FOR GREEN IT MANAGEMENT - Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated. | 12-20-2012 |
20130326279 | RESOURCE PLANNING FOR DATA PROTECTION VALIDATION - A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario. | 12-05-2013 |
20130333000 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 12-12-2013 |
20140074794 | OPTIMIZING RESTORATION OF DEDUPLICATED DATA - A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks can be utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that can be serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence. | 03-13-2014 |
20140122435 | INTELLIGENT RESTORE-CONTAINER SERVICE OFFERING FOR BACKUP VALIDATION TESTING AND BUSINESS RESILIENCY - An existing data protection environment is analyzed to determine a plurality existing infrastructure containers. A popular infrastructure container is identified from the plurality of existing infrastructure containers. Responsive to determining that the popular infrastructure container does not exist within a central repository, the restore container is created within the central repository to match the popular infrastructure container. | 05-01-2014 |
20140143207 | MANAGING REPLICATED DATA - An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and corresponding confidence score(s) are determined. The confidence score(s) indicate respective likelihood(s) that the candidate replica(s) include the data item. | 05-22-2014 |
20140149791 | REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Under embodiments of the present invention, data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level. | 05-29-2014 |
20140223012 | CLUSTER-AWARE RESOURCE PROVISIONING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing cluster-aware (storage) resource provisioning in a networked computing environment (e.g., a cloud computing environment) based upon policies, best practices, and/or storage cluster/environment configurations. In a typical embodiment, a set of characteristics (e.g., computing resources/components, etc.) of a storage environment will be determined. A set of requirements for a set of workloads to be processed by the components of the storage environment will then be identified. A set of policies and a set of best practices will then be determined to identify a configuration of the storage environment to optimize the processing of the set of workloads according to the set of requirements. Based on the configuration, a plan will be generated that indicates a data path through the set of computing resources that minimizes a potential for error in processing the set of workloads. | 08-07-2014 |
20140330795 | OPTIMIZING RESTORATION OF DEDUPLICATED DATA - A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks is utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that are serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence. | 11-06-2014 |
20150026129 | MANAGING REPLICATED DATA - An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and confidence score(s) indicating likelihood(s) that the candidate replica(s) include the data item are determined. Based on temporal distance(s) and percent change(s) between first and second replica(s), confidence score(s) of the second replica(s) are determined. | 01-22-2015 |
20150058069 | RESOURCE PLANNING FOR DATA PROTECTION VALIDATION - A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario. | 02-26-2015 |
20150081376 | CUSTOMIZATION OF EVENT MANAGEMENT AND INCIDENT MANAGEMENT POLICIES - A method includes analyzing, by a computer device, data associated with tickets generated in a managed environment. The method also includes generating, by the computer device, a suggested rule change based on the analyzing. The method further includes receiving, by the computer device, an acceptance or denial of the suggested rule change. | 03-19-2015 |
20150081641 | BACKING UP A COMPUTER APPLICATION - A method and associated systems for backing up a target computer application that comprises identifying and backing up databases and other information repositories upon which the target application depends. The target application is identified and related to a backup requirement that specifies a minimum application-backup frequency. The application's “dependencies” are automatically identified from sources that include configuration files, where each dependency identifies one or more databases or other information repositories that store information upon which the application directly or indirectly depends. If any of these databases or repositories is associated with a backup frequency less than the application's minimum backup frequency, the database or repository is flagged. Each flagged entity's backup schedule is then revised so that the flagged entity's backup frequency is equal to or greater than the application's minimum backup frequency. | 03-19-2015 |