-
公开(公告)号:US20180157697A1
公开(公告)日:2018-06-07
申请号:US15372163
申请日:2016-12-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Theresa M. Brown , Nedlaya Y. Francisco , Suguang Li , Mark L. Lipets , Gregory E. McBride , Carol S. Mellgren , Raul E. Saba
IPC: G06F17/30
CPC classification number: G06F16/2358 , G06F11/1448 , G06F16/128 , G06F16/178 , G06F16/2477 , G06F16/27 , G06F2201/84
Abstract: Provided are a computer program product, system, and method for updating change information for current copy relationships when establishing a new copy relationship having overlapping data with the current copy relationships. A first copy relationship indicates changed first source data to copy to first target data. An establish request is processed to create a second copy relationship to copy second source data in to second target data. A second copy relationship is generated, in response to the establish request, indicating data in the second source data to copy to the second target data. A determination is made of overlapping data units in the first source data also in the second target data. Indication is made in the first copy relationship to copy the overlapping data units. The first source data indicated in the first copy relationship is copied to the first target data, including data for the overlapping data units.
-
公开(公告)号:US20180157605A1
公开(公告)日:2018-06-07
申请号:US15577895
申请日:2015-11-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Nigel Edwards , Chris I. Dalton , Keith Mathew McAuliffe
CPC classification number: G06F13/1668 , G06F13/16 , G06F21/577 , G06F21/79 , G06F2201/84
Abstract: Examples include configuration of a memory controller for copy-on-write. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a management subsystem configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component.
-
公开(公告)号:US09990257B2
公开(公告)日:2018-06-05
申请号:US14846955
申请日:2015-09-07
Applicant: NetApp Inc.
CPC classification number: G06F11/1484 , G06F11/1435 , G06F11/1451 , G06F11/1469 , G06F11/1471 , G06F11/203 , G06F11/2035 , G06F11/2048 , G06F2201/815 , G06F2201/84
Abstract: One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein.
-
公开(公告)号:US09990255B2
公开(公告)日:2018-06-05
申请号:US14780981
申请日:2013-04-23
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Valiuddin Y Ali , Boris Balacheff
CPC classification number: G06F11/1469 , G06F3/0619 , G06F3/0629 , G06F3/0683 , G06F11/1417 , G06F11/1456 , G06F11/1458 , G06F11/1612 , G06F2201/83 , G06F2201/84
Abstract: A first non-volatile memory stores a redundant copy of system data that relates to a configuration of at least one physical component of a system, where the first non-volatile memory is accessible by a controller in the system and inaccessible to a processor in the system. It is determined whether system data in a second non-volatile memory accessible by the processor is compromised. In response to determining that the system data in the second non-volatile memory is compromised, the compromised system data in the second non-volatile memory is repaired.
-
公开(公告)号:US09983958B2
公开(公告)日:2018-05-29
申请号:US14341068
申请日:2014-07-25
Applicant: NETAPP, INC.
Inventor: Onkar Bhat , Ravi Budhia , Rajesh Desai , Abhishek Naidu
CPC classification number: G06F11/2035 , G06F11/1461 , G06F11/2048 , G06F11/2097 , G06F2201/84
Abstract: Various embodiments are generally directed an apparatus and method for receiving a recovery point objective for a workload, the recovery point objective comprising an amount of time in which information for the workload will be lost if a failure occurs, and determining a service level objective for a replication transfer based on the recovery point objective, the replication transfer to replicate information on a destination node to maintain the recovery point objective. Various embodiments include dynamically controlling one or more resources to replicate the information on the destination node based on the service level objective and communicating information for the replication transfer from the source node to the destination node.
-
公开(公告)号:US09983957B2
公开(公告)日:2018-05-29
申请号:US15152769
申请日:2016-05-12
Applicant: Facebook, Inc.
Inventor: Liyin Tang , Rishit Manit Shroff , Amitanand S. Aiyer , Arjen Roodselaar
CPC classification number: G06F11/2033 , G06F11/1471 , G06F11/2028 , G06F11/2046 , G06F11/2097 , G06F2201/805 , G06F2201/84 , H04L67/1095 , H04L67/1097
Abstract: The disclosure is directed to failover mechanisms in a distributed computing system. A region of data is managed by multiple region servers. One of the region servers is elected as a “leader” and the remaining are “followers.” The leader serves the read/write requests from a client. The leader writes the data received from the client into the in-memory store and a local write-ahead log (“WAL”), and synchronously replicates the WAL to the followers. A region server designated as an “active” region server synchronizes a distributed data store with the data from the WAL. Active witness followers apply the data from the WAL to their in-memory store while shadow witness followers do not. Different types of servers provide failover mechanisms with different characteristics. A leader is elected based on their associated ranks—higher the rank, higher the likelihood of electing itself as a leader.
-
公开(公告)号:US09983941B2
公开(公告)日:2018-05-29
申请号:US14639657
申请日:2015-03-05
Applicant: Huawei Technologies Co., Ltd.
Inventor: Feng Zhang , Fengtao Teng
CPC classification number: G06F11/1451 , G06F11/1435 , G06F11/1448 , G06F11/2058 , G06F17/30073 , G06F17/30194 , G06F2201/84
Abstract: In a data recovery method, there are a server and a plurality of storage devices each storing a copy of a data block. The server divides each copy of the data block into N segments corresponding to a sequence of N partitions. And then, the server constructs a plurality of different trial data blocks each including N segments corresponding to the sequence of N partitions. After that, the server calculates a check code for each trial data block, and continues to identify a trial data block having a check code identical to a pre-stored standard check code of the data block. At last, the server replaces at least one of the copies of the data block with the identified trial data block having the check code identical to the pre-stored standard check code.
-
公开(公告)号:US09983934B2
公开(公告)日:2018-05-29
申请号:US15069257
申请日:2016-03-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Deborah A. Furman , Andrew C. M. Hicks
CPC classification number: G06F11/1415 , G06F11/0706 , G06F11/0715 , G06F11/0751 , G06F11/0778 , G06F11/1446 , G06F11/1471 , G06F2201/805 , G06F2201/84
Abstract: Embodiments include accelerating capture of a system dump at system failure in a computer system. A method includes capturing a system snapshot that includes data from real memory frames of the computer system and storing the system snapshot in a storage. The method also includes monitoring periodically a change between the data in the system snapshot and a current state of the real memory frames of the computer system and updating the system snapshot according to the changed real memory frames based on a rate of change of the real memory frames. Further, in response to encountering the system failure, the snapshot is updated based on a delta between the system snapshot and the current state of the real memory frames. The snapshot on the storage is used as the system dump. The present document further describes examples of other aspects such as systems, computer products.
-
公开(公告)号:US20180143883A1
公开(公告)日:2018-05-24
申请号:US15358401
申请日:2016-11-22
Applicant: International Business Machines Corporation
Inventor: Jay S. Bryant , James E. Carey , Zachary A. Hill , Kendall J. Nelson , Lucas A. Palm
CPC classification number: G06F9/5077 , G06F11/1438 , G06F2201/84
Abstract: A snapshot of data is generated by receiving a plurality of respective file system information sets from a corresponding plurality of virtual machines. Each of the plurality of virtual machines includes one or more storage volumes configured for receiving and storing data to thereby provide stored data. Each of the plurality of respective file information sets comprises file system information for the stored data. A first snapshot is created that includes the file system information for all of the virtual machines of the plurality of virtual machines.
-
公开(公告)号:US09971994B2
公开(公告)日:2018-05-15
申请号:US14809493
申请日:2015-07-27
Applicant: International Business Machines Corporation
Inventor: Ilse M. Breedvelt-Schouten , Jana H. Jenkins , Jeffrey A. Kusnitz , John A. Lyons
IPC: G06F17/30 , G06Q10/10 , G06F11/14 , G06F3/0484 , G06Q40/00 , G06Q10/06 , G06F3/0482
CPC classification number: G06Q10/103 , G06F3/0482 , G06F3/0484 , G06F11/1446 , G06F17/30395 , G06F17/30451 , G06F17/30867 , G06F2201/84 , G06Q10/063 , G06Q40/12
Abstract: A method for using an undo stack to explore past actions and apply new actions to previous states in a data view. The method includes detecting a change in an application data view. The application then displays an undo stack and stores the data change in the application data view to the undo stack. Upon detecting a selection of the undo stack entry for undo, the application returns the application data view to the state represented by the undo stack entry. The method further includes providing a user interface allowing a user to perform operations on undo stack entries. Responsive to the user utilizing the user interface and making selections, the application then adjusts the application data view state based on the performed actions.
-
-
-
-
-
-
-
-
-