Abstract:
In a backup method, a source storage device sends data to a backup storage device. The source storage device contains a processor and a cache. The processor receives a write data request which includes target data. And then, the processor reads a first period ID recorded in a period ID table, wherein the first period ID is corresponding to a first period. Next, the processor modifies the write data request by attaching the first period ID to the target data and writes the modified write data request into the cache. After a backup task corresponding to the first period is triggered, the processor identifies a second period ID. The second period ID corresponds to a previous period up to which data received by the source storage device have been duplicated to the backup storage device. And then, the processor obtains data received after the period corresponding to the second period ID and up to the first period and sends the obtained data to the backup storage device.
Abstract:
Systems and methods for intelligent data replication are provided, which may include the identification and use of consistency points in application data, such that one or more replication volumes may be created using an “application aware” replication process that allows the system to intelligently replicate data or other information (e.g., metadata) relating to a particular process, application or specified set of data.
Abstract:
A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein.
Abstract:
The present invention relates to the field of the management of memory writes to an information processing device and more precisely to a method of writing a set of data in a unitary and coherent manner. The invention, although of more general scope, applies more particularly in the field of chip cards.There is described a method of writing one or more data to the memory of an information processing device which comprises a step of copying a so-called original memory block comprising the data to be written to a so-called backup memory block. The data writing step is then carried out in the original memory block or in the backup memory block. It is then always possible to return if necessary to the values of the original data if the writing phase fails.
Abstract:
Aspects of the subject matter described herein relate to error detection for files. In aspects, before allowing updates to a clean file, a flag marking the file as dirty is written to non-volatile storage. Thereafter, the file may be updated as long as desired. Periodically or at some other time, the file may be marked as clean after all outstanding updates to the file and error codes associated with the file are written to storage. While waiting for outstanding updates and error codes to be written to storage, if additional requests to update the file are received, the file may be marked as dirty again prior to allowing the additional requests to update the file. The request to write a clean flag regarding the file may be done lazily.
Abstract:
An application programming interface is provided that allows applications to assign multiple service-level agreements to their data transactions. The service-level agreements include latency bounds and consistency guarantees. The applications may assign utility values to each of the service-level agreements. A monitor component monitors the various replica nodes in a cloud storage system for latency and consistency, and when a transaction is received from an application, the monitor determines which of the replica nodes can likely fulfill the transaction in satisfaction of any of the service-level agreements. Where multiple service-level agreements can be satisfied, the replica node that can fulfill the transaction according to the service-level agreement with the greatest utility is selected. The application may be charged for the transaction based on the utility of the service-level agreement that was satisfied.
Abstract:
For handling multiple backup processes, computer-readable program code is described for receiving one or more instructions initiating a plurality of backup processes from a single source storage volume to a plurality of target storage volumes, adding each target storage volume to a cascade of target storage volumes from the source storage volume, the target storage volumes added to the cascade in an order inversely proportional to the copy rate of the respective backup process, and starting each backup process in turn, the backup processes started in an order from the most recent target storage volume added to cascade to the first target storage volume added to cascade.
Abstract:
Machines, systems and methods for backing up data, the method comprising retrieving identifying information about target data storage volumes from which target data is to be backed up; communicating the identifying information to a proxy application installed on a backup computing system utilized to backup the target data stored on the target data storage volumes, wherein the proxy application uses the identifying information to place the target data storage volumes in a first state in which write operations may not be performed to the target data storage volumes, wherein the proxy application causes snapshots to be taken of the target data storage volumes of a first type and a second type, in response to determining that the target data storage volumes are placed in the first state.
Abstract:
An approach is provided for providing information consistency in distributed computing environments. An information consistency platform determines one or more finite state machines based, at least in part, on one or more states of one or more respective steps of at least one update operation operating on one or more data items, wherein the one or more finite state machines executes, at least in part, the at least one update operation, one or more other operations, or a combination thereof on the one or more data items.
Abstract:
Techniques, including systems and methods, take frequent captures of data sets for the purpose of forensic analysis. The data set captures are taken at the block level in various embodiments. Data set captures are used to instantiate forensic storage volumes that are attached to computing instances. The computing instances can access data in the forensic storage volumes at a state corresponding to a specified capture time. A user can select different capture times to re-instantiate the forensic storage volume to see how the forensic storage volume changed between captures.