Abstract:
Methods and apparatus are provided for moving data between storage devices when a source storage device is becoming a bottleneck. One or more blocks of data are identified as blocks to be moved or replicated from the source storage device to one or more other storage devices. The one or more other storage devices are selected and copy services are used to move the blocks from the source storage device to the one or more other storage devices. A metadata store is updated with locations of the blocks that have been moved.
Abstract:
Continuously mounted backup storage media are managed to decrease the otherwise lengthy period of vulnerability to data loss while data gradually accumulates pending eventual media saturation and demounting. Responsive to operator-specified switch-media events, all continuously mounted storage media are examined. Without terminating their respective ongoing backup operations, idle storage media are demounted and substituted with replacement media. Busy storage media are scheduled for later demounting and replacement.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a system and a program for enhancing the checking and repair of a network configuration. SOLUTION: A technique for performing configuration checking of a network is disclosed. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison. A technique for performing proactive configuration checking of a network is also disclosed. Moreover, a technique for performing reactive configuration checking of a network and a technique for correcting a configuration problem are disclosed. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
Continuously mounted backup storage media are managed to decrease the otherwise lengthy period of vulnerability to data loss while data gradually accumulates pending eventual media saturation and demounting. Responsive to operator-specified switch-media events, all continuously mounted storage media are examined. Without terminating their respective ongoing backup operations, idle storage media are demounted and substituted with replacement media. Busy storage media are scheduled for later demounting and replacement.
Abstract:
Provided are techniques for copying data. A volume container copyset that includes volume containers is received. A volume container copyset that includes volume containers is received. Each of the volume containers is associated with a copyset role, and each of the volume containers includes zero or more volumes, wherein each of the volumes in a volume container has the copyset role of that volume container. Sets of volumes are associated with a replication session, wherein each of the sets of volumes has one volume from each of the volume containers. Each of the sets of volumes has volumes associated with a copyset role that is associated with the volume containers with which each volume is associated. In response to determining that one of membership of one of the volume containers and a size of a volume in one of the volume containers has been modified, one or more corresponding volume containers in the volume container copyset are automatically modified.
Abstract:
Continuously mounted backup storage media are managed to decrease the otherwise lengthy period of vulnerability to data loss while data gradually accumulates pending eventual media saturation and demounting. Responsive to operator-specified switch-media events, all continuously mounted storage media are examined. Without terminating their respective ongoing backup operations, idle storage media are demounted and substituted with replacement media. Busy storage media are scheduled for later demounting and replacement.