-
公开(公告)号:US20180074919A1
公开(公告)日:2018-03-15
申请号:US15260943
申请日:2016-09-09
Applicant: SAP SE
Inventor: Juchang Lee , Chang Gyoo Park
CPC classification number: G06F11/1474 , G06F16/128 , G06F16/2343 , G06F16/2358 , G06F16/2379 , G06F2201/80 , G06F2201/82 , G06F2201/835 , G06F2201/84
Abstract: A plurality of database modification statements are received as part of a database transaction that implicates data stored within a database. Thereafter, lock requests are initiated that requesting the database to lock the implicated data. At least one database operation by at least one of the database modification statements is then executed prior to receiving responses from at least a portion of the lock requests. After confirming that prior lock requests made by the transaction are successfully processed, a commit to make changes to the corresponding implicated data permanent is initiated. The implicated data can then be caused to be unlocked after the commit completes. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US09910745B1
公开(公告)日:2018-03-06
申请号:US15658613
申请日:2017-07-25
Applicant: International Business Machines Corporation
Inventor: Anjan G. Lukkoor , James D. Spyker
CPC classification number: G06F11/1469 , G06F11/1451 , G06F2201/80 , G06F2201/84
Abstract: A primary system is established at a first site. The primary system hosts an application and a primary database for remote users that use the application to manage data of the primary database. A unified data layer is established at a remote site. The unified data layer provides access to data of the primary database without providing access to the primary database. A triggering event that impairs the ability of the primary system to host the application is detected. A recovery system is instantiated in response to detecting the triggering event. The recovery system includes both a recovery instance of the application and a recovery database for the data of the application. The recovery database is populated using the unified data layer. The recovery system is activated such that remote users can access the recovery instance of the application to manage data of the recovery database.
-
103.
公开(公告)号:US09904605B2
公开(公告)日:2018-02-27
申请号:US14930751
申请日:2015-11-03
Applicant: HITACHI DATA SYSTEMS CORPORATION
Inventor: Alan G. Bryant , Kevin S. Grimaldi , Trek Palmer , David B. Pinkney
CPC classification number: G06F11/1464 , G06F3/0619 , G06F3/065 , G06F3/067 , G06F11/1425 , G06F11/143 , G06F11/1435 , G06F11/1451 , G06F11/1662 , G06F11/2094 , G06F2201/80 , G06F2201/84
Abstract: An “operate with missing region” feature allows a cluster to continue servicing reads for available regions even when some regions are missing. Upon a given node failure condition, the cluster is placed in an effective read-only mode for all regions. The node failure condition typically is one where there has been a failure of an authoritative region copy and no backup copy is then available. Typically, “read-only” means no client write or update requests succeed while the cluster is in this state. Those requests should fail with an error message that indicates failure because of the read-only status. Preferably, such requests are re-tried. In this mode, regions are only allowed to perform read operations but the cluster continues to operate with missing regions, and missing regions are entered on a region map. The cluster then automatically recovers returning missing regions, after which it leaves the read-only state.
-
公开(公告)号:US09898372B2
公开(公告)日:2018-02-20
申请号:US14029911
申请日:2013-09-18
Applicant: International Business Machines Corporation
Inventor: Billy S. Brewer , Patrick B. Heywood , Bernhard J. Klingenberg , Nagapramod S. Mandagere , Steven Pantridge , Ramani R. Routray
CPC classification number: G06F11/1458 , G06F11/1461 , G06F11/1474 , G06F17/30312 , G06F2201/80
Abstract: A method and associated systems for backing up a target computer application that comprises identifying and backing up databases and other information repositories upon which the target application depends. The target application is identified and related to a backup requirement that specifies a minimum application-backup frequency. The application's “dependencies” are automatically identified from sources that include configuration files, where each dependency identifies one or more databases or other information repositories that store information upon which the application directly or indirectly depends. If any of these databases or repositories is associated with a backup frequency less than the application's minimum backup frequency, the database or repository is flagged. Each flagged entity's backup schedule is then revised so that the flagged entity's backup frequency is equal to or greater than the application's minimum backup frequency.
-
公开(公告)号:US20180039781A1
公开(公告)日:2018-02-08
申请号:US15786862
申请日:2017-10-18
Applicant: International Business Machines Corporation
Inventor: Christian Mueller , Dominic Mueller-Wicke , Erik Rueger
CPC classification number: G06F21/602 , G06F11/1451 , G06F11/1464 , G06F21/6218 , G06F2201/80 , H04L9/0822 , H04L9/0891 , H04L9/0894 , H04L63/0428 , H04L63/06
Abstract: A computer receives a set of objects from a client, whereby at least one of the objects of the set are respectively associated and encrypted with a unique file encryption key (FEK). The computer encrypts each of the FEKs with a common master encryption key, MEK, resulting in respective locked keys. In an initial backup, the encrypted objects together with their associated locked keys are transmitted to a backup server where a first module determines if locked key has changed via referencing an encryption state associated with the encrypted objects. If an MEK has changed, the existing FEKs are re-encrypted with the changed MEK to generate new locked keys, and, in a subsequent backup operation, sending the new locked keys to the backup server to replace the existing locked keys, while avoiding transmitting to the backup server the objects whose associated FEKs are affected by the changed MEK.
-
公开(公告)号:US20180026867A1
公开(公告)日:2018-01-25
申请号:US15724038
申请日:2017-10-03
Applicant: Amazon Technologies, Inc.
Inventor: Grant Alexander MacDonald McAlister , Swaminathan Sivasubramanian , Barry B. Hunter, JR. , Silas M. Brazil
CPC classification number: H04L43/10 , G06F11/2028 , G06F11/203 , G06F11/2035 , G06F11/2069 , G06F11/2076 , G06F11/2082 , G06F11/3006 , G06F11/3055 , G06F2201/80 , G06F2201/86
Abstract: Replicated instances in a distributed computing environment provide for automatic failover and recovery. A component monitors the status of event processors in a set or bucket and handles the failure of an event processor. For a large number of instances, the data environment can be partitioned such that each monitoring component is assigned a partition of the workload. At intervals, each event processor sends a “heartbeat” message to the event processors in the bucket covering the same workload partition, to inform the other event processors of the status of the event processor sending the heartbeat. If it is determined that a heartbeat is received from each event processor in the bucket, a current process can continue. In the event of monitoring component failure, the instances can be repartitioned, and the remaining monitoring components can be assigned to the new partitions to substantially evenly distribute the workload.
-
公开(公告)号:US09842062B2
公开(公告)日:2017-12-12
申请号:US14871484
申请日:2015-09-30
Applicant: Apple Inc.
Inventor: Michael D. Ford , Jerrold V. Hauck , Matthew G. Watson , Mitchell D. Adler , Dallas B. De Atley , James Wilson
CPC classification number: G06F12/1408 , G06F11/1448 , G06F21/6218 , G06F2201/80 , G06F2212/1052 , H04L9/006 , H04L9/0822 , H04L9/0825 , H04L9/088 , H04L9/0894 , H04L9/0897
Abstract: Some embodiments provide, for a particular device in a set of related devices, a method for backing up data synchronized between the devices. The method receives a command to create a backup for a subset of data synchronized between a subset of the devices, which is a subset of all data synchronized between the devices. The method identifies the subset of synchronization data from the set of all synchronization data. The subset of synchronization data is tagged as pertaining to a particular set of criteria for synchronization between only the subset of devices. The method stores a backup of the subset of synchronization data in a backup storage encrypted in such a way that requires a recovery key associated with any one of the devices in the subset of devices to access the backup while preventing access to the backup with recovery keys of any of the other devices.
-
108.
公开(公告)号:US09836361B2
公开(公告)日:2017-12-05
申请号:US14776314
申请日:2013-12-16
Applicant: NEC CORPORATION
Inventor: Ichiro Arai
CPC classification number: G06F11/1469 , G06F11/1451 , G06F11/1471 , G06F17/30368 , G06F17/30575 , G06F2201/80 , G06F2201/84
Abstract: Each node constituting this data replicating system returns a response to a data operation requesting device upon having written, into a temporary storage device of the node itself, a post-update log of a data record for which an operation requested by a data operation request was executed. Furthermore, when a checkpoint is reached, each node updates a data record storage unit of the node itself on the basis of the post-update log of the data record stored in the temporary storage device of the node itself, writes the post-update log of the data record stored in the temporary storage device of the node itself into an update history storage unit of the node itself, and writes, into a shared storage device shared with other nodes, checkpoint information having information for specifying a latest post-update log written into the update history storage unit.
-
公开(公告)号:US20170322871A1
公开(公告)日:2017-11-09
申请号:US15222012
申请日:2016-07-28
Applicant: SAP SE
Inventor: Le-Huan Stefan Tran , Arne Harren , Jonathan Bregler , Alexander Bunte , Andreas Kellner , Daniel Kuntze , Vladislav Leonkev , Simon Lueders , Volker Sauermann , Michael Schnaubelt
CPC classification number: G06F11/1458 , G06F11/1471 , G06F11/3664 , G06F17/30289 , G06F2201/80
Abstract: Systems and techniques for performing a simulated deployment to a database include generating a dependency graph of multiple artifacts contained in a container for deployment to a database and receiving an indication to perform a simulated deployment of the artifacts. In response to receiving the indication, the container is marked for simulated deployment. The artifacts are deployed to the database using the marked container and the generated dependency graph without committing the artifacts to the database. The deployed artifacts are rolled back such that no state changes are made to the database due to the simulated deployment.
-
110.
公开(公告)号:US09811427B2
公开(公告)日:2017-11-07
申请号:US14271302
申请日:2014-05-06
Applicant: CommVault Systems, Inc.
Inventor: Michael Frank Klose
CPC classification number: G06F11/1464 , G06F3/06 , G06F3/0635 , G06F11/00 , G06F11/1456 , G06F11/201 , G06F11/2094 , G06F17/30073 , G06F17/3012 , G06F2201/80 , G06F2201/84
Abstract: A media agent is configured to perform substantially autonomously to initiate, continue, and manage information management operations such as a backup job of a certain client's primary data, manage the operations, and generate and store resultant system-level metadata from the operations, etc. The media agent is configured to do this even when out of communication with the storage manager that manages the information management system. When communications are restored, the media agent reports the relevant metadata to the storage manager such that the storage manager may seamlessly integrate the information into its management information infrastructure.
-
-
-
-
-
-
-
-
-