-
公开(公告)号:GB2507287A
公开(公告)日:2014-04-30
申请号:GB201219102
申请日:2012-10-24
Applicant: IBM
Inventor: OBERHOFER MARTIN , UHL ANDREAS , TRINKS ANDREAS , NEEF ALEXANDER
IPC: G06F11/14
Abstract: Disclosed is a method by which restore points can be determined for an in-memory application, the application having several states during its execution. At least one state is associated with data stored in a memory of the host computer and is being accessed by the application. The method determines a first restore point of the application, the first restore point representing a first time point in the execution time associated with a first state of the at which the application accesses the data stored in a first group of memory locations, wherein the access is performed using first addresses and first pointers to contents in the first group of memory locations. The first addresses and first pointers are stored in a first data structure. Then the method assigns a first restore point identifier to the first restore point, then stores the first restore point identifier in a first entry of a second data structure of the computer. Finally the method associates, in the first data structure, the first addresses to second pointers to contents in a second group of memory locations. Thereby redirecting writing operations into the first group of memory locations to the second group of memory locations after the first restore point determination.
-
公开(公告)号:GB2518452A
公开(公告)日:2015-03-25
申请号:GB201316953
申请日:2013-09-24
Applicant: IBM
Inventor: HAMBORG FELIX , NEEF ALEXANDER
IPC: G06F11/14
Abstract: Disclosed is a method of file recovery. The files are generated by an application 5 running on a client server system 1 with a client 100 with a client back-up tool 110 and a server 200 with a server back-up tool 210. The application files are backed-up as data in the back-up server, the files are restored from the back-up server to the back-up client based on the file usage behaviour of the application. If the file priority class information is missing, then all the files of the back-up data are restored. If the file priority class information exists, then files of a highest priority class are restored at the back-up client and file stubs of all remaining files of the back-up data are created on the back-up client. Control is then returned to the application, and the file usage behaviour of the application is monitored and analyzed. The files are classified into different priority classes based on file usage behaviour. The file stubs at the back-up client are replaced with corresponding file content from the back-up server during runtime of the application based on certain criteria.
-