Abstract:
A fault-tolerant failsafe computer voting system includes a switch module that generates a first copy of a first data packet and a second copy of the first data packet and that communicates the first copy and the second copy. The system also includes a first voting module that generates a first packet signature based on the first copy and communicates the first packet signature. The system further includes a second voting module that generates a second packet signature based on the second copy and communicates the second packet signature.
Abstract:
Gathering diagnostics during a transactional execution in a transactional memory environment, a transactional memory environment for performing transactional executions is provided. Included is identifying a first indicator, by a computer system, signaling a beginning instruction of a transaction comprising a plurality of instructions; generating, by the computer system, a computed digest based on the execution of at least one of the plurality of instructions; accumulating, by the computer system, a diagnostic data of the transaction based on the execution of the plurality of instructions; identifying, by the computer system, a second indicator associated with the plurality of instructions signaling an ending instruction of the transaction comprising the plurality of instructions; and based on an abort of the transaction, not saving the memory store data of the transaction to memory.
Abstract:
A system for backup replication comprises a processor and a memory. The processor is configured to determine data present in a most recent backup not present in a previous backup; transmit an extent specification; and transmit data segment fingerprints of the one or more data segments. The memory is coupled to the processor and is configured to provide the processor with instructions.
Abstract:
A method for byzantine fault tolerant data replication with a plurality of 2f+1 data servers and one or more clients includes storing data in at least f+1 different data servers out of the 2f+1 data servers, and storing metadata of the stored data under a metadata-identifier in a metadata-service (MDS). The stored metadata includes a unique identifier of the stored data, a fingerprint of the stored data, and a list of the at least f+1 different data servers which have stored the data.
Abstract:
A data recovery system includes a plurality of customer computers to be backed-up, each customer computer running a client software to communicate back-up data files; a system management platform coupled to the client software over the Internet, the system management platform receiving inputs from a web user portal to control operations of the client software and the system management platform to back up the customer computer; and two or more data storage silos, each including: a plurality of storage directors communicating with the client software; and a clustered data storage array.
Abstract:
A system, method and computer program product to execute a first and a second work-group, and compare the signature variables of the first work-group to the signature variables of the second work-group via a synchronization mechanism. The first and the second work-group are mapped to an identifier via software. This mapping ensures that the first and second work-groups execute exactly the same data for exactly the same code without changes to the underlying hardware. By executing the first and second work-groups independently, the underlying computation of the first and second work-groups can be verified. Moreover, system performance is not substantially affected because the execution results of the first and second work-groups are compared only at specified comparison points.
Abstract:
A system and method for verifying consistency of data in a recovery system, the method including: protecting data in the recovery system, the recovery system includes a target disk configured to store a replica of a protected storage system from before a time window and a journal including data and metadata of write operations to the protected storage system that occurred during the time window; verifying consistency of the replicated data, concurrently with the protecting by: copying data of a selected chunk of the protected storage system at a specified time point, while monitoring write operations to the protected system; generating a replica of the selected chunk in the recovery system from the target disk and the journal, from the specified time point; comparing the copied data of the selected chunk with the replica of the selected chunk and repeating the copying, generating and comparing for a plurality of chunks.
Abstract:
A system and method for identifying optimal system architectures for a reference application are provided. The system and method comprise executing a reference application and a plurality of test applications on a current system architecture and sampling performance data for each of the applications. The performance data is used to compute an application signature for each application. A similarity element is derived from the application signatures that illustrates the similarity between each application and every other application. Using a similarity threshold and an algorithm, a subset of test applications that are similar to the reference application are derived.
Abstract:
The present disclosure describes systems and methods for hierarchical, iterative backup and restoration of files in a hierarchy. Upon backup of a new or modified file, an identification file is created with entries identifying the new or modified file and current versions of all other files in the same directory. The identification file may be stored on the local system and marked for backup. This triggers standard backup routines, such that the identification file is then backed up as if it were a new file in the parent directory. Accordingly, a second identification file is created with entries identifying the first identification file (and thus the child directory) as well as any other current versions of files in the parent directory and identification files for other child directories. This process is iteratively repeated, climbing through the directory structure, until reaching a top-most or root folder.
Abstract:
A system for processing data comprises a deduplicating system, an interface, and a processor. The deduplicating system stores a copy of data stored in a data storage system by storing a set of segments that is able to reconstruct the data stored in the data storage system. The interface receives an indication to revert data stored in the data storage system to a state of data at a snapshot time stored in the deduplicating system. The processor is configured to determine a subset of the data stored in the data storage system that has changed between the data stored in the data storage system and the state of data at the snapshot time stored in the deduplicating system using a first list of fingerprints associated with the data stored on the data storage system and a second list of fingerprints associated with the state of data at the snapshot time stored in the deduplicating system.