Abstract:
When the redundant system operates the second node in place of the first node in the primary system and transmits, to the secondary system, data update information generated according to a data update in the second node, the fourth node the data update information generated according to the data update in the second node from the second node using the second inter-system transfer path. The fourth node changes by changing a direction of the second intra-system transfer, a configuration by which the data update information acquired by the fourth node is acquired by the third node using the second inter-system transfer path.
Abstract:
A plurality of storage nodes in a single chassis is provided. The plurality of storage nodes in the single chassis is configured to communicate together as a storage cluster. Each of the plurality of storage nodes includes nonvolatile solid-state memory for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes such that the plurality of storage nodes maintain the ability to read the user data, using erasure coding, despite a loss of two of the plurality of storage nodes. The plurality of storage nodes configured to initiate an action based on the redundant copies of the metadata, responsive to achieving a level of redundancy for the redundant copies of the metadata. A method for accessing user data in a plurality of storage nodes having nonvolatile solid-state memory is also provided.
Abstract:
Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.
Abstract:
The MANAGEMENT OF DATA REPLICATION AND STORAGE APPARATUSES, METHODS AND SYSTEMS (“BDR”) transform machine datasets using BDR components into replications over a network distributing redundant ready-to-use backup files. In some implementations, the disclosure provides a processor-implemented method for managing the replication and storage of data sets.
Abstract:
A touch panel includes a dummy electrode capable of protecting a circuit included in the touch panel for shielding against static electricity.
Abstract:
Methods, systems, and computer program products for preventing non-detectable data loss during site switchover are disclosed. A computer-implemented method may include receiving a request to perform a switchover from a first node to a second node, determining whether to place a storage volume involved in the switchover in a suspended state, setting the storage volume in the suspended state based on determining that the storage volume is to be placed in the suspended state, and maintaining the storage volume in the suspended state after completing the switchover. In an example, the storage volume may be placed in a suspended state based on examining a volume-specific attribute indicating whether the storage volume is to be suspended when involved in a switchover. In one example, each storage volume involved in a switchover may be placed in a suspended state when indicated as part of a switchover request.
Abstract:
When the mirrored point in time copy fails, at that point in time all the data for making the source and target of the point in time copy consistent is available on secondary volumes at disaster recovery site. The data for the source and target of the failed point in time copy are logically and physically equal at that point in time. This logical relationship can be maintained, and protected against ongoing physical updates to the affected tracks on the source secondary volume, by first reading the affected tracks from the source secondary volume, copying the data to the target secondary volume, and then writing the updated track to the source secondary volume.
Abstract:
A data synchronization method for a multi-level associative storage architecture includes: receiving, by a master module, a request of an external write operation, writing data into a write buffer of the master module, and recording a digit sequence according to the write operation on the write buffer of the master module; flushing data from the write buffer to solid-state disk (SSD) files when a data amount in the write buffer of the master module reaches a threshold; recording, by the master module, a digit sequence for a flush operation; separately synchronizing, by the master module, the write operation and the flush operation to a slave module according to orders of digits in different digit sequences; and receiving, by the slave module, the synchronous write operation and synchronous flush operation, and separately synchronizing the data of the master module to corresponding locations of a local write buffer and local SSD files.
Abstract:
A method of handling multiple served backup processes comprising creating a cascade of target storage volumes from a plurality of target storage volumes by inserting each most recent target storage volumes between a last added target storage volume and a source storage volume, the most recent target storage volumes each having a copy rate faster than the last added target storage volume, such that each added target storage volume has a faster copy rate than an immediately prior added target storage volume, and a most recent target storage volume added to the cascade of target storage volumes has a fastest copy rate; and receiving one or more instructions initiating a plurality of served backup processes from the source storage volume to a plurality of target storage volumes.
Abstract:
Techniques for restoring point-in-time and transaction consistency across consistency groups between a first and a second independent database management system (DBMS) for a disaster recovery. Several consistency groups (CGs) are defined for replication. For each CG in the first DBMS data changes are transmitted to a second DBMS. A timestamp representing a most recently received commit log record or a heartbeat during periods of inactivity for a CG is stored in a database table at regular intervals. At regular intervals, the timestamp is compared with timestamps for other CGs to identify a common time at which data to be applied to the CGs in the second DBMS have been received into a recoverable data store. The received data is applied to the CGs in the second DBMS up to the common time.