-
公开(公告)号:US20170286280A1
公开(公告)日:2017-10-05
申请号:US15248772
申请日:2016-08-26
Applicant: International Business Machines Corporation
Inventor: Teague S. Algie , Andrew G. Peake , Mark D. Seaborn , Ilya Volvovski
IPC: G06F11/36
CPC classification number: G06F11/1076 , G06F3/0604 , G06F3/061 , G06F3/0619 , G06F3/0631 , G06F3/0635 , G06F3/064 , G06F3/0644 , G06F3/0647 , G06F3/0653 , G06F3/0659 , G06F3/067 , G06F11/1092 , G06F11/1662 , G06F11/3684 , G06F11/3688 , G06F11/3692 , G06F2201/805 , G06F2201/82 , H03M13/1515 , H03M13/616 , H04L67/1097
Abstract: A dispersed storage network facilitates isolating the introduction of software defects in dispersed storage units. A search strategy is employed whereby after identifying a test failure in a current version of the memory software code, a code version since a previous successfully tested version is identified. An interim version that represents the point at which approximately one half the changes were introduced is then tested. When there is a test failure, the next interim version selected for testing represents the point at which approximately one half the changes were introduced between the first interim version tested and the current version. If no failure, a next interim version is tested that represents the point at which approximately one half the changes were introduced between the previous successfully tested version and the first interim version tested.
-
公开(公告)号:US20170286240A1
公开(公告)日:2017-10-05
申请号:US15625957
申请日:2017-06-16
Applicant: Cray Inc.
Inventor: Laurence S. Kaplan , Preston Pengra Briggs Ill , Miles Arthur Ohlrich , Willard Huston Leslie
CPC classification number: G06F11/1076 , G06F3/0619 , G06F3/064 , G06F3/067 , G06F3/0673 , G06F11/08 , G06F11/10 , G06F11/1004 , G06F11/1008 , G06F11/1016 , G06F11/1068 , G06F11/1088 , G06F11/14 , G06F11/1402 , G06F11/1405 , G06F11/141 , G06F11/1479 , G06F11/1662 , G06F11/202 , G06F11/2023 , G06F11/2035 , G06F2201/805 , G06F2201/82
Abstract: A resiliency system detects and corrects memory errors reported by a memory system of a computing system using previously stored error correction information. When a program stores data into a memory location, the resiliency system executing on the computing system generates and stores error correction information. When the program then executes a load instruction to retrieve the data from the memory location, the load instruction completes normally if there is no memory error. If, however, there is a memory error, the computing system passes control to the resiliency system (e.g., via a trap) to handle the memory error. The resiliency system retrieves the error correction information for the memory location and re-creates the data of the memory location. The resiliency system stores the data as if the load instruction had completed normally and passes control to the next instruction of the program.
-
93.
公开(公告)号:US09760597B2
公开(公告)日:2017-09-12
申请号:US14908892
申请日:2012-11-16
Applicant: UNIVERSIDAD POLITÉCNICA DE MADRID
Inventor: Ricardo Jiménez Peris , Marta Patiño Martínez
CPC classification number: G06F17/30377 , G06F11/1474 , G06F17/30353 , G06F17/30371 , G06F2201/82 , H04L67/42
Abstract: A system and method for decentralized transaction processing that reduce contention by a number of techniques. First, the transactional management system is decomposed in a number of components that can be scaled out and/or scaled up independently and in a composable way. Second, transactions are committed in parallel without blocking each other. Third, applications can progress when the transactions updates are durable even if the writes of the transaction have not yet completed. Fourth, transactional consistency is guaranteed by making readable only gap-free prefixes of committed update transactions, without blocking the commit of new transactions. Fifth, session consistency is guaranteed by delaying the start of a new transaction till the snapshot of any previous update transaction in the same session is readable.
-
公开(公告)号:US09760443B2
公开(公告)日:2017-09-12
申请号:US14752668
申请日:2015-06-26
Applicant: VMware, Inc.
Inventor: Gabriel Tarasuk-Levin , Patrick William Penzias Dirks , Ilia Langouev , Curt Kolovson
CPC classification number: G06F11/1446 , G06F9/45558 , G06F11/1484 , G06F11/1662 , G06F11/202 , G06F2009/4557 , G06F2201/82 , G06F2201/825
Abstract: Examples perform live migration of VMs from a source host to a destination host using destructive consistency breaking operations. The disclosure makes a record of a consistency group of VMs on storage at a source host as a fail-back in the event of failure. The source VMs are live migrated to the destination host, disregarding consistency during live migration, and potentially violating the recovery point objective. After live migration of all of the source VMs, consistency is automatically restored at the destination host and the live migration is declared a success.
-
公开(公告)号:US09753812B2
公开(公告)日:2017-09-05
申请号:US14163533
申请日:2014-01-24
Applicant: CommVault Systems, Inc.
Inventor: Rahul S. Pawar , Jun H. Ahn , Manas Bhikchand Mutha , Henry Wallace Dornemann , Anup Kumar
CPC classification number: G06F11/1448 , G06F11/1451 , G06F11/1456 , G06F11/1458 , G06F11/1469 , G06F17/30088 , G06F2201/82 , G06F2201/84
Abstract: An information management system according certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include first and second data agents associated with first and second applications, respectively. The system may also include a snapshot manager configured to: in response to receiving notifications from the first and second data agents that the first and second applications are in consistent states: obtain a snapshot of the logical volume including data generated by the first and second applications; generate mapping information between the first application and a portion of the snapshot relating to the first application based at least in part on metadata obtained by the first data agent; and generate mapping information between the second application and a portion of the snapshot relating to the second application based at least in part on metadata obtained by the second data agent.
-
公开(公告)号:US20170242769A1
公开(公告)日:2017-08-24
申请号:US15500063
申请日:2015-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Derek Alan SHERLOCK , Harvey RAY , Michael KONTZ
IPC: G06F11/20
CPC classification number: G06F11/2092 , G06F11/0727 , G06F11/0751 , G06F11/1084 , G06F2201/805 , G06F2201/82 , G06F2211/1009
Abstract: According to an example, a failed component in a fault-tolerant memory fabric may be determined by transmitting request packets along a plurality of routes between the redundancy controller and a media controller in periodic cycles. The redundancy controller may determine whether route failures for all of the plurality of routes have occurred within a number of consecutive periodic cycles. In response to determining that route failures for all of the plurality of routes have occurred within a number of consecutive periodic cycles, the media controller is established as failed. In response to determining that route failures for less than all of the plurality of routes have occurred within the number of consecutive periodic cycles, a fabric device is established as failed.
-
97.
公开(公告)号:US20170242599A1
公开(公告)日:2017-08-24
申请号:US15049410
申请日:2016-02-22
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
IPC: G06F3/06
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/067 , G06F11/2076 , G06F11/2082 , G06F2201/82 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US20170235649A1
公开(公告)日:2017-08-17
申请号:US15379455
申请日:2016-12-14
Applicant: JIGNESH KAUSHIK SHAH , SUMEET KEMBHAVI , VENKATRAMAN LAKSHMINARAYANAN , RAHUL RAVULUR , ADITYA VASUDEVAN , ASHISH PURI
Inventor: JIGNESH KAUSHIK SHAH , SUMEET KEMBHAVI , VENKATRAMAN LAKSHMINARAYANAN , RAHUL RAVULUR , ADITYA VASUDEVAN , ASHISH PURI
CPC classification number: G06F11/1469 , G06F9/485 , G06F11/1448 , G06F11/1461 , G06F11/1464 , G06F2201/815 , G06F2201/82 , G06F2201/84
Abstract: In one example aspect, a method for creating one or more consistent snapshots with a CANDL system is provided. The method is implemented in a database application with a plurality of tiers. The method identifies a set of volumes of tiers that are part of a consistent snapshot group. The method implements a process pause of any processes in the set of volumes of tiers in a specific order. The method obtains a snapshot of the set of volumes of tiers. The method restarts the paused processes in the set of volumes.
-
公开(公告)号:US09727424B2
公开(公告)日:2017-08-08
申请号:US14444876
申请日:2014-07-28
Applicant: Cimcor, Inc.
Inventor: Robert E. Johnson, III
CPC classification number: G06F11/1469 , G06F11/00 , G06F11/1456 , G06F11/1464 , G06F11/3034 , G06F11/3055 , G06F11/3409 , G06F21/00 , G06F2201/82 , G06F2201/84
Abstract: The System Integrity Guardian can protect any type of object and repairs and restores the system back to its original state of integrity. The Client component is the user interface for administering the System Integrity Guardian environment. An administrator can determine which servers to protect, which objects to protect, and what actions will be taken when an event that breaches integrity occurs. The Monitor Agent component is the watchdog of the System Integrity Guardian that captures and addresses any event that occurs on any object being protected. The Server component includes the server and the Protected Object Central Repository. The authoritative copies are maintained, digital signatures are created and stored, objects are validated, and communication between the three units is performed.
-
公开(公告)号:US20170220662A1
公开(公告)日:2017-08-03
申请号:US15489615
申请日:2017-04-17
Applicant: Rackspace US, Inc.
Inventor: Michael Barton , Will Reese , John A. Dickinson , Jay B. Payne , Charles B. Thier , Gregory Holt
CPC classification number: G06F17/30581 , G06F1/12 , G06F3/067 , G06F3/0671 , G06F17/30241 , G06F17/30353 , G06F17/30525 , G06F17/30864 , G06F2201/82 , H04L29/0854 , H04L67/1095 , H04L67/1097
Abstract: Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand. In several embodiments, the object storage system includes a ring implementation used to associate object storage commands with particular physical servers such that certain guarantees of consistency, availability, and performance can be met. In other embodiments, the object storage system includes a synchronization protocol used to order operations across a distributed system. In a third set of embodiments, the object storage system includes a metadata management system. In a fourth set of embodiments, the object storage system uses a structured information synchronization system. Features from each set of embodiments can be used to improve the performance and scalability of a cloud computing object storage system.
-
-
-
-
-
-
-
-
-