-
公开(公告)号:US11720594B2
公开(公告)日:2023-08-08
申请号:US15377742
申请日:2016-12-13
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Bradley Gene Calder , Niranjan Nilakantan , Shashwat Srivastav , Jiesheng Wu , Abdul Rafay Abbasi , Shane Mainali , Padmanabha Chakravarthy Uddaraju
CPC classification number: G06F16/275 , G06F11/2076 , G06F16/2343 , G06F16/2379 , G06F11/2074 , G06F16/27 , G06F2201/855
Abstract: Embodiments of the present invention relate to synchronously replicating data in a distributed computing environment. To achieve synchronous replication both an eventual consistency approach and a strong consistency approach are contemplated. Received data may be written to a log of a primary data store for eventual committal. The data may then be annotated with a record, such as a unique identifier, which facilitates the replay of the data at a secondary data store. Upon receiving an acknowledgment that the secondary data store has written the data to a log, the primary data store may commit the data and communicate an acknowledgment of success back to the client. In a strong consistency approach, the primary data store may wait to send an acknowledgement of success to the client until it receives an acknowledgment that the secondary has not only written, but also committed, the data.
-
公开(公告)号:US20180246948A1
公开(公告)日:2018-08-30
申请号:US15445593
申请日:2017-02-28
Applicant: SAP SE
Inventor: Colin Florendo , Michael Muehle , Thorsten Glebe , Rolando Blanco , Chaitanya Gottipati , Nirvik Basak , Martin Heidel , Peter Steinemann , Vivek Kandiyanallur , Shiping Chen , Sarika Iyer , Jörn Schmidt
IPC: G06F17/30
CPC classification number: G06F16/273 , G06F11/2094 , G06F11/2097 , G06F16/2365 , G06F16/2455 , G06F2201/80 , G06F2201/855
Abstract: A computer implemented method for manipulating data comprises receiving log transaction information from a primary database system at a secondary database system and parsing the log transaction information to identify data objects that have been modified on the primary database system. The secondary database system determines whether the data objects are present in main memory on the secondary database system and whether the log transaction corresponds to a data manipulation language (DML) query or a data definition language (DDL) query. If the data objects are not in the main memory and the query is a DML query, they are copied from persistence data volumes to the main memory. The data objects in main memory are modified by replaying the log transactions on the data objects in the main memory. Then, the data objects in the persistence data volumes are modified. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US09990259B1
公开(公告)日:2018-06-05
申请号:US14474273
申请日:2014-09-01
Inventor: David M. Niedzielski , Christopher S. Trost , Roger Pena , Tommy Lavelle , Donald E. Clemons
CPC classification number: G06F11/2023 , G06F17/30265 , G06F17/30873 , G06F17/3089 , G06F2201/805 , G06F2201/855 , G06Q30/02 , H04L61/1511 , H04L67/10 , H04L67/1002 , H04L67/1008 , H04L67/1021 , H04L67/104 , H04L67/1095 , H04L67/1097 , H04L69/40 , H04W88/12
Abstract: The present disclosure provides a system and method for online brand continuity. Online brand continuity can include a number of Internet or intranet access points via which one or more network addresses can be advertised. A client can be provided with availability of a business image application via at least one of the Internet or intranet access points.
-
公开(公告)号:US20180143881A1
公开(公告)日:2018-05-24
申请号:US15357689
申请日:2016-11-21
Applicant: SAP SE
Inventor: Reiner Singer , Werner Thesing
CPC classification number: G06F11/1658 , G06F11/2094 , G06F11/2097 , G06F2201/80 , G06F2201/855
Abstract: A computer implemented method for replication includes registering a first database system with a second database system and performing a failback operation on the first database system. The failback operation includes opening a snapshot that includes data known to have existed on the first database system and the second database system at a first time. Transaction log information is requested from the second database system. The transaction log information corresponds to transactions performed on the second database system beginning with the first time. The transaction log information is applied to the snapshot data on the first database system. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US09952786B1
公开(公告)日:2018-04-24
申请号:US15148901
申请日:2016-05-06
Applicant: Veritas Technologies LLC
Inventor: Suhas Dantkale , Satyendra Thakur , Kirubakaran Kaliannan , Prasad Vadlamannati
CPC classification number: G06F3/0619 , G06F3/061 , G06F3/065 , G06F3/067 , G06F11/2066 , G06F12/0223 , G06F2201/855 , H04L67/1008 , H04L67/1014 , H04L67/1095 , H04L67/1097
Abstract: Write operations are scheduled for multiple nodes in a shared storage cluster that supports volume replication. Requests are received from nodes for allocation of space for write operations in a replication log. In response to a received request, the current capacity of the requesting node to manage a backlog can be determined. The amount of space in the replication log allocated to the node is then calibrated to the node's capacity, thereby preventing self-throttling. A separate priority can be assigned to each volume, and space in the replication log assigned to each volume based on its priority. Nodes can target synchronous and other latency sensitive operations to higher priority volumes. A single global queue can be maintained to schedule write operations for all nodes, thereby providing a fair scheduling. A separate local queue can be maintained for each node, thereby providing specific levels of preference to specific nodes.
-
306.
公开(公告)号:US09898374B2
公开(公告)日:2018-02-20
申请号:US14248266
申请日:2014-04-08
Applicant: International Business Machines Corporation
Inventor: Juan A. Coronado , Sara M. Coronado , Christina A. Lara , Lisa R. Martinez
CPC classification number: G06F11/1469 , G06F11/1451 , G06F11/2058 , G06F11/2069 , G06F21/568 , G06F2201/84 , G06F2201/855
Abstract: A primary storage controller determines that a quarantined area of the primary storage controller cannot be repaired, wherein the quarantined area is infected with a virus. A query is sent to a secondary storage controller to determine whether the secondary storage controller has data that is free of virus in an area of the secondary storage controller corresponding to the quarantined area of the primary storage controller. In response to receiving a notification that the secondary storage controller has data that is free of virus, the primary storage controller is repaired to remove the virus.
-
公开(公告)号:US20180039436A1
公开(公告)日:2018-02-08
申请号:US15788686
申请日:2017-10-19
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Ran Goldschmidt , Raz Zieber , Anat Inon
CPC classification number: G06F11/1484 , G06F9/45558 , G06F11/1451 , G06F11/2066 , G06F11/2071 , G06F2009/45579 , G06F2009/45587 , G06F2201/815 , G06F2201/835 , G06F2201/84 , G06F2201/855
Abstract: A method, system, and computer program product for intercepting IO to a virtual machine file system by a storage based splitter, replicating, via a replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system, and periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor.
-
公开(公告)号:US09823847B2
公开(公告)日:2017-11-21
申请号:US14629519
申请日:2015-02-24
Applicant: International Business Machines Corporation
Inventor: Dash D. Miller , Miguel A. Perez , David C. Reed , Max D. Smith
CPC classification number: G06F3/0607 , G06F3/065 , G06F3/067 , G06F11/2056 , G06F11/2058 , G06F17/30581 , G06F2201/855 , H04L47/728 , H04L67/1095
Abstract: A method for increasing the efficiency of copying data is disclosed. In one embodiment, such a method includes receiving a request to copy data from a first location to a second location. The method determines an original copy algorithm associated with the request and determines whether the original copy algorithm is the best copy algorithm available to copy the data. If the original copy algorithm is the best copy algorithm, the method uses the original copy algorithm to copy the data. If, however, the original copy algorithm is not the best copy algorithm available, the method substitutes a more efficient copy algorithm for the original copy algorithm. In certain embodiments, this may be accomplished by looking in a prioritized list of copy algorithms and selecting a more efficient copy algorithm from the list. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US09684576B1
公开(公告)日:2017-06-20
申请号:US14976727
申请日:2015-12-21
Applicant: EMC Corporation
Inventor: Assaf Natanzon , Saar Cohen
CPC classification number: G06F11/2058 , G06F11/2069 , G06F11/2074 , G06F11/2076 , G06F11/2082 , G06F2201/815 , G06F2201/84 , G06F2201/855
Abstract: In one aspect, a method includes mirroring a logical unit between a first site and a second site, tracking the changes to the logical unit on a backlog mirrored between the first site and the second site, replicating a virtual machine from the first site to a third site, storing virtual machine disks on a file system on the mirrored logical unit and resuming replication of the virtual machine to the third site from the second site using the mirrored logical unit after failure of the first site.
-
公开(公告)号:US09671967B2
公开(公告)日:2017-06-06
申请号:US15149618
申请日:2016-05-09
Applicant: Nutanix, Inc.
Inventor: Mohit Aron , Brian Byrne
IPC: G06F3/06 , G06F12/08 , G06F12/02 , G06F11/20 , G06F12/0804 , G06F12/0868
CPC classification number: G06F3/0619 , G06F3/06 , G06F3/065 , G06F3/067 , G06F11/2056 , G06F11/2058 , G06F11/2074 , G06F11/2076 , G06F12/0238 , G06F12/0246 , G06F12/08 , G06F12/0804 , G06F12/0868 , G06F2201/855 , G06F2212/1016 , G06F2212/222 , G06F2212/286
Abstract: Disclosed is an improved approach for implementing a storage system having an operation log where data writes are initially performed to a fast operation log, rather than to its permanent storage location. A distributed operation log can be employed to replicate the data to multiple locations in the storage system.
-
-
-
-
-
-
-
-
-