Abstract:
A method, apparatus and program storage device for providing web services-based data replication for heterogeneous storage systems. A web services interface is provided in a storage subsystem to provide access of replication functions of the storage subsystem by a remote requesting agent. The web services interface may also authenticate a remote requesting agent and data encryption to ensure privacy. The web services interface may also break the volume being replicated into junks of a predetermined size for later merging to form the volume at the remote requesting agent.
Abstract:
PROBLEM TO BE SOLVED: To perform data migration between different local file systems so that migration during normal business hours is possible. SOLUTION: A proxy component is constituted between an application and a source file system being a migration source and a file system being a migration destination. The proxy component is interoperated with the source file system and the migration destination file system and migrates data from the source file system to the migration destination file system and is transparent to the application. The proxy component converts the source file system and the migration destination file system to standard file system protocols represented by the application. The application does not need to cope with different file systems and makes data migration process completely transparent. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a system and a product for performing determination that an archive including at least one file exists according to an operating system file system. SOLUTION: In order to access the archive, an additional file system is generated. The generated additional file system is incorporated in the operating system file system. An application becomes possible to access at least one file via the generated additional file system. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To facilitate curtailment of complicatedness and duration time of high availability/failover implementation under heterogeneous server environment. SOLUTION: This heterogeneous high availability cluster manager implements a method including reception of a first cluster management command in a first cluster management protocol, conversion of the first cluster management command into a second cluster management command in a second cluster management protocol and transmission of the second cluster management command to a first node in a heterogeneous cluster management group. In order to facilitate the conversion of the first cluster management command into the second cluster management command, a second cluster management protocol is registered in the manager and thus, the first cluster management command is mapped to the second management command. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
A network attached storage device stores files and directories. In addition to data files, special files exist within the file system. Accesses to the special files cause the device to execute management functions. Some management functions may apply to the device itself. Other functions may apply to objects stored on the device. The special files may be identified by their extension. There may be a special file in the root of a file system or in every directory. The special file may contain a list of available management functions, a list of file properties or a list of active management functions. The list of active functions may give the status, progress or result of the active functions. A write to the file may invoke one of the functions.
Abstract:
A network attached storage system (1A) includes a storage system (100A) connected to at least one external device (180) via an external network (190), wherein the storage system (100A) includes at least one storage media and at least one controller (110A) presenting storage capacity of the storage system (100A) to the at least one external device (180). Wherein the at least one external device (180) sends a request (172) to the storage system (100A), the at least one controller (110A) receives and serves the request (172) and sends a response (174) to the requesting external device (180) after serving the request (172); wherein the at least one controller (110A) includes a delay functionality (112A), which introduces a variable length delay to an execution process of the request (172) based on a current input/output load of the storage system (100A), a maximum allowed request response time, a request completion time, and a measured current request execution time.
Abstract:
Ein verbessertes Verfahren für den Umgang mit Dateien in einer hierarchischen Speicherumgebung (1), das Mittel zum Inhaltabtasten (100), Inhaltabrufen (300) und Inhaltarchivieren (400) aufweist; weist die Schritte auf: ein Empfangen eines neuen Dokumentes zur Speicherung löst einen neuen Benachrichtigungsprozess für ein neues Dokument aus, der das empfangene neue Dokument nach einem Satz von Schlüsselwörtern und Bezügen abtastet; verbesserte Metadaten für das neue Dokument einschließlich des Abtastergebnisses erzeugt; die Metadaten in einem Dateisystem speichert; und die verbesserten Metadaten durch einen Beziehungsanalyseprozess bewertet, der zu einer Prioritätsliste führt, die eine Wahrscheinlichkeit möglichen Zugriffs definiert; Speichern des neuen Dokuments auf der Grundlage eines Ergebnisses der Prioritätsliste in einer Speicherschicht (22, 24, 26, 28) der hierarchischen Speicherumgebung (1).
Abstract:
A storage system 30 contains one or more primary storage devices 130. It also contains a secondary storage device 220, such as a cache. When the system receives a write request it creates two threads to handle the request. The first thread issues a write to one of the primary storage devices. If the write completes within a predetermined timeout, then the first thread sends a completion response to the originator of the request. If the write does not complete within the time limit, then the second thread sends a write request to the secondary device. When this request completes the second thread sends a completion response to the originator of the request. In this case, when the request sent by the first thread completes, the data written to the secondary storage device is deleted. The storage system may be connected via a network 20 to several external devices 10.
Abstract:
A method for modifying communication controllers 110 of a clustered file storage system 200, wherein each controller provides network connections with external computer systems using protocols of both or one of the following types: a first failover tolerant type (stateless) and a second failover non-tolerant type (stateful). The controllers are split into first and second pools providing connections of the first and second types respectively. A portion of the controllers of the first pool are modified or upgraded, wherein for the special case that the portion consists of all controllers of the first pool concurrently, at least one controller of the second pool provides connections of at least the first type before the modification takes place. The next portion of the controllers are then modified and if this includes a controller providing connections of the second type, its connections are re-established using one or more already modified controllers. The invention limits the number of failovers experienced during the upgrade to just one.
Abstract:
An improved method for file handling in a hierarchical storage environment (1) comprising means for content scanning (100), content retrieving (300) and content archiving (400); comprises the steps of: Receiving a new document for storage which triggers a new document notification process (S100) which scans the received new document for a set of keywords and references, creates enhanced metadata for the new document including the scan result, and stores the metadata in a file system. The enhanced metadata is then evaluated by a relationship analyzing process, for example to create relations to other documents, which results in a priority list which defines a likelihood of possible access for the document. The new document is then stored based on a result of the priority list in a storage tier (22, 24, 26, 28) of the hierarchical storage environment (1).