Abstract:
PROBLEM TO BE SOLVED: To perform data migration between different local file systems so that migration during normal business hours is possible. SOLUTION: A proxy component is constituted between an application and a source file system being a migration source and a file system being a migration destination. The proxy component is interoperated with the source file system and the migration destination file system and migrates data from the source file system to the migration destination file system and is transparent to the application. The proxy component converts the source file system and the migration destination file system to standard file system protocols represented by the application. The application does not need to cope with different file systems and makes data migration process completely transparent. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for selecting an overlap exclusion protocol for a data storage library including a plurality of data storage devices that is constituted as RAID array.SOLUTION: The method sets a regular overlap exclusion protocol, an overlap exclusion protocol for RAID failure, and an overlap exclusion protocol for failures of a plurality of storage devices. The method receives host data including a plurality of interleaved data blocks. When a system operates without any storage device failure, the method processes the host data by using the regular overlap exclusion protocol. When the system is operating with a storage device failure, the method processes the host data by using the overlap exclusion protocol for the RAID failure. When the system is operating with failures occurring in the plurality of storage devices, the method processes the host data by using the overlap exclusion protocol for the failures of the plurality of storage devices.
Abstract:
An approach for managing a data package is provided. Network throughput is determined to exceed a threshold. A sender computer determines a hash digest of the data package by using a hash function selected based on central processing unit utilization. If the hash digest is in a sender hash table, then without sending the data package, the sender computer sends the hash digest and an index referring to the hash digest so that a recipient computer can use the index to locate a matching hash digest and the data package in a recipient hash table. If the hash digest is not in the sender hash table, then the sender computer adds the data package and the hash digest to the sender hash table and sends the data package and the hash digest to the second computer to check the integrity of the data package based on the hash digest.