Abstract:
Systems, methods, and computer-readable storage media for inter-node data replication while reducing network traffic for remote backup. A system receives a command to duplicate a dataset, located on a source network node, to a remote network node, accesses, on the source network node, signatures of a previous snapshot of the dataset and signatures of a current snapshot of the dataset, performs, at the source network node, a local signature comparison between the previous snapshot and the current snapshot to identify one or more signatures that do not match, sends the signatures that do not match to the remote network node, searches, on the remote network node, for the signatures that do not match, and sends data associated with the signatures that do not match to the remote network node for incorporation within a current remote snapshot if they do not exist on a current remote network node.
Abstract:
Techniques for on-demand remote diagnostics for hardware component/device failure and disk drive data recovery using embedded media are described. In one example embodiment, a hardware device failure event alert along with a unique ID and a hardware device configuration fingerprint is sent upon detecting a hardware component failure event associated with the hardware device in a datacenter to an image management framework. A recovery image associated with the hardware device failure event is then obtained using the unique ID and the hardware device configuration fingerprint. The recovery image is then stored in an embedded storage media associated with the failed hardware device. The embedded storage media is then configured as a bootable hardware device. The hardware component failure is then diagnosed using the stored recovery image and the bootable hardware device upon hardware device boot-up. Recovering from the hardware device failure based on diagnosing the hardware component failure.
Abstract:
Storing and retrieving ciphertext in data storage can include determining a first ciphertext value for a first data chunk to be saved to a client-server data storage system using an encrypted chunk hash value associated with the first data chunk as an initial value, and storing the first data chunk on a server in the client-server data storage system in response to determining that the first ciphertext value is a unique ciphertext value. Also, storing and retrieving ciphertext in data storage can include decrypting a ciphertext value for a second data chunk received from a client in the client-server data storage system and based on an encrypted chunk hash value associated with the second data chunk, and sending the second data chunk to the client in response to determining that the decrypted ciphertext value corresponds to an original data chunk saved to the server by the client.
Abstract:
A system for backup replication comprises a processor and a memory. The processor is configured to determine data present in a most recent backup not present in a previous backup; transmit an extent specification; and transmit data segment fingerprints of the one or more data segments. The memory is coupled to the processor and is configured to provide the processor with instructions.
Abstract:
Methods and apparatuses for backing up data to a database are provided. A specified data set to be backed up is broken down into a plurality of data blocks, each data block is associated with a data block digest, and the data blocks and associated data block digests are stored in the database. When one or more data blocks are subsequently changed, an update to the backup may be performed by adding to the backup data only the data blocks that have changed since the initial backup. Methods and apparatuses for restoring backup data from a database are also provided. Timestamp information associated with the data blocks in the database is used to select the data blocks to be restored.
Abstract:
A method and apparatus are provided to backup and restore data (410) from/to wireless computing devices, utilizing strongly collision free deterministic identifiers.
Abstract:
A method and system for updating an archive of a computer file to reflect changes made to the file includes selecting one of a plurality of comparison methods as a preferred comparison method. The comparison methods include a first comparison method wherein the file is compared to an archive of the file and a second comparison method wherein a first set of tokens statistically representative of the file is computed and compared to a second set of tokens statistically representative of the archive of the file. The method further includes carrying out the preferred comparison method to generate indicia of differences between the file and the archive of the file for updating the archive of the file.
Abstract:
A testing methodology for very large scale integrated circuits, for example, microprocessors having several million transistors. Initially a set of pseudorandom test patterns is selected. During the design of the integrated circuit it is partitioned into functional units and each unit is designed to be verified and tested by the test patterns. During a test mode all of the units of the integrated circuit receives the test patterns in parallel. The output from each unit is coupled to a signature register. The contents of the signature registers are examined following application of the test pattern. This testing methodology lends itselt to the simultaneous testing of many integrated circuits.