Storage policy matching using difference-based scoring

    公开(公告)号:US11435913B2

    公开(公告)日:2022-09-06

    申请号:US16685741

    申请日:2019-11-15

    Applicant: VMware, Inc.

    Abstract: Certain embodiments described herein are generally directed to selecting a target storage profile for comparison to a recovered storage profile in support of a data recovery operation. In some embodiments, a method includes comparing a first plurality of fields of the reference storage profile with a second plurality of fields of a first target storage profile of the one or more target storage profiles to determine a degree to which the first target storage profile matches the reference storage profile, the first plurality of fields comprising a first plurality of storage requirements, and the second plurality of fields comprising a second plurality of storage requirements.

    DATA REPLICATION IN SITE RECOVERY ENVIRONMENT
    2.
    发明申请
    DATA REPLICATION IN SITE RECOVERY ENVIRONMENT 审中-公开
    数据在现场恢复环境中的复制

    公开(公告)号:US20150379038A1

    公开(公告)日:2015-12-31

    申请号:US14315091

    申请日:2014-06-25

    Applicant: VMware, Inc.

    Inventor: Dian Nikolov

    Abstract: Techniques disclosed herein relate to synchronizing a first database with a second database. Embodiments include detecting a write operation modifying properties of a data object in the first database. While the data object is locked, embodiments write object change data to a journal table. Embodiments query the journal table of the recovery database to retrieve a portion of the object change data corresponding to a first window of time and comprising a plurality of entries. The retrieved portion of object change data is processed to create processed object data by collapsing duplicate entries within the plurality of entries. Embodiments retrieve object data from the first database, corresponding to properties of data objects specified in the processed object change data. The retrieved object data is pushed to the second database, whereby the second database is synchronized with the first database.

    Abstract translation: 本文公开的技术涉及使第一数据库与第二数据库同步。 实施例包括检测在第一数据库中修改数据对象的属性的写操作。 当数据对象被锁定时,实施例将对象改变数据写入日志表。 实施例查询恢复数据库的日志表以检索对应于第一时间窗口的对象改变数据的一部分并且包括多个条目。 处理对象改变数据的检索部分,以通过折叠多个条目中的重复条目来创建处理对象数据。 实施例从第一数据库检索对象数据,对应于在处理对象改变数据中指定的数据对象的属性。 检索到的对象数据被推送到第二数据库,由此第二数据库与第一数据库同步。

    Data replication in site recovery environment

    公开(公告)号:US10949401B2

    公开(公告)日:2021-03-16

    申请号:US14315091

    申请日:2014-06-25

    Applicant: VMware, Inc.

    Inventor: Dian Nikolov

    Abstract: Techniques disclosed herein relate to synchronizing a first database with a second database. Embodiments include detecting a write operation modifying properties of a data object in the first database. While the data object is locked, embodiments write object change data to a journal table. Embodiments query the journal table of the recovery database to retrieve a portion of the object change data corresponding to a first window of time and comprising a plurality of entries. The retrieved portion of object change data is processed to create processed object data by collapsing duplicate entries within the plurality of entries. Embodiments retrieve object data from the first database, corresponding to properties of data objects specified in the processed object change data. The retrieved object data is pushed to the second database, whereby the second database is synchronized with the first database.

    Adaptive Token Cache Management
    4.
    发明申请

    公开(公告)号:US20180139192A1

    公开(公告)日:2018-05-17

    申请号:US15351905

    申请日:2016-11-15

    Applicant: VMware, Inc.

    CPC classification number: H04L63/108 H04L63/0815

    Abstract: Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a token and an acquisition duration. Upon expiration of the token renewal request interval, and in the event that the token is requested by at least one client application, the authentication module renews the token with a secure token service. Renewal may also occur in the absence of a request for the token by any client application if the cached token has been kept valid for less than a threshold time. In some examples, the tokens are associated with credentials for single sign-on during site recovery management.

Patent Agency Ranking