-
公开(公告)号:US11677718B1
公开(公告)日:2023-06-13
申请号:US17459122
申请日:2021-08-27
Applicant: PARALLELS INTERNATIONAL GmbH
Inventor: Alexey Petrukhin , Grigory Nikolaenko , Nikolay Dobrovolskiy , Serguei Beloussov
CPC classification number: H04L63/0254 , G06F11/1402 , H04L63/0281 , H04L63/04 , H04L63/061 , H04L63/166 , H04L67/01 , H04L67/06 , H04L67/1097 , H04L67/56 , G06F2201/805
Abstract: Systems and methods for file sharing over secure connections. An example method comprises: receiving a client request identifying a file sharing host and a file residing on the file sharing host; establishing a secure client connection; responsive to identifying a management connection with the file sharing host, transmitting an identifier and a parameter of the secure client connection via the management connection; receiving a host request to establish a secure host connection, the host request comprising the identifier of the secure client connection; establishing the secure host connection using the parameter of the secure client connection identified by the received identifier; forwarding, over the secure host connection, a first data packet received over the secure client connection, the first data packet comprising at least part of the client request; and forwarding, over the secure client connection, a second data packet received over the secure host connection, the second data packet comprising at least part of the file identified by the client request.
-
公开(公告)号:US11663083B2
公开(公告)日:2023-05-30
申请号:US17514000
申请日:2021-10-29
Applicant: Dell Products L.P.
Inventor: Brett Quinn , Doug Lecrone
CPC classification number: G06F11/1448 , G06F1/12 , G06F11/1456 , G06F2201/805
Abstract: Embodiments of the present disclosure include receiving one or more input/output (IO) requests at a storage array from a host device. Furthermore, the IO requests can include at least one data replication and recovery operation. In addition, the host device's connectivity access to a recovery storage array can be determined. Data replication and recovery operations can be performed based on the host device's connectivity to the recovery storage array.
-
公开(公告)号:US11657068B2
公开(公告)日:2023-05-23
申请号:US15842887
申请日:2017-12-15
Applicant: International Business Machines Corporation
Inventor: Joshua J. Crawford , Gregory E. McBride , Warren K. Stanley , Matthew J. Ward
CPC classification number: G06F16/273 , G06F11/2074 , G06F11/2094 , G06F16/2365 , G06F2201/805 , G06F2201/82 , G06F2201/855
Abstract: A method for converting from one asynchronous data replication technology to another is disclosed herein. In one embodiment, such a method includes utilizing a first asynchronous data replication technology to asynchronously replicate data from a primary volume to a secondary volume. The method initiates, at time T1, tracking of post-T1 changes to the primary volume and waits for all pre-T1 changes to the primary volume to be propagated to the secondary volume. When all pre-T1 changes have been propagated to the secondary volume, the method suspends operation of the first asynchronous data replication technology and replicates all post-T1 changes from the primary volume to the secondary volume. The method further sets up and initiates a second asynchronous data replication technology to asynchronously replicate data from the primary volume to the secondary volume. A corresponding system and computer program product are also disclosed herein.
-
公开(公告)号:US11650891B2
公开(公告)日:2023-05-16
申请号:US17341446
申请日:2021-06-08
Applicant: NetApp Inc.
Inventor: Yong Cho , Prachi Deshmukh
CPC classification number: G06F11/2094 , G06F3/067 , G06F3/0619 , G06F3/0622 , G06F3/0634 , G06F3/0635 , G06F3/0659 , G06F11/1451 , G06F11/1464 , G06F11/1469 , G06F11/1662 , G06F11/20 , G06F11/2035 , G06F11/2069 , G06F11/2071 , H04L65/40 , H04L67/1097 , H04L69/40 , G06F11/2046 , G06F11/2097 , G06F2201/805 , G06F2201/82 , G06F2212/1032 , G06F2212/163 , G06F2212/263
Abstract: Methods, systems, and computer program products for preventing non-detectable data loss during site switchover are disclosed. A computer-implemented method may include receiving a request to perform a switchover from a first node to a second node, determining whether to place a storage volume involved in the switchover in a suspended state, setting the storage volume in the suspended state based on determining that the storage volume is to be placed in the suspended state, and maintaining the storage volume in the suspended state after completing the switchover. In an example, the storage volume may be placed in a suspended state based on examining a volume-specific attribute indicating whether the storage volume is to be suspended when involved in a switchover. In one example, each storage volume involved in a switchover may be placed in a suspended state when indicated as part of a switchover request.
-
公开(公告)号:US11645172B1
公开(公告)日:2023-05-09
申请号:US17729639
申请日:2022-04-26
Applicant: Wells Fargo Bank, N.A.
CPC classification number: G06F11/2023 , G06F11/3006 , G06F11/328 , G06F11/3495 , G06F2201/805
Abstract: Managing data center recovery from failure events can include a failure event platform having aspects provided via a user interface that integrates multiple failure and recovery management and execution features. The features can include, among others, application drift monitoring between production and recovery environments, real-time health checks of system components, user-modifiable scripting for prioritizing and customizing data center recovery actions, and a recovery execution tool.
-
公开(公告)号:US20190220374A1
公开(公告)日:2019-07-18
申请号:US16331159
申请日:2016-09-16
Applicant: Siemens Aktiengesellschaft
Inventor: Dong Wei , Lingyun Wang , Leandro Pfleger de Aguiar
CPC classification number: G06F11/2023 , G05B19/058 , G05B2219/13107 , G05B2219/24169 , G05B2219/24211 , G06F11/1479 , G06F11/16 , G06F21/74 , G06F2201/805 , H04L9/3247 , H04L63/123 , H04L63/1416 , H04L67/12
Abstract: A method for performing security failover in an industrial production environment includes a programmable logic controller (PLC) receiving notification that a function block (FB) or a function (FC) on the programmable logic controller has been maliciously revised. The PLC next determines whether the function block or the function is also maliciously revised on a failover computing device. If the failover computing device is not maliciously revised, a failover operation is performed by the PLC. This operation includes sending a data block comprising one or more input parameters to the function block or the function and receiving an output data resulting from executing the function block or the function with the data block on the failover computing device.
-
47.
公开(公告)号:US20190213094A1
公开(公告)日:2019-07-11
申请号:US16352743
申请日:2019-03-13
Applicant: Micron Technology, Inc.
Inventor: Masashi Ogasawara
IPC: G06F11/20
CPC classification number: G06F11/2094 , G06F2201/805
Abstract: Apparatuses and methods for repairing memory devices including a plurality of memory die and an interface are disclosed. An example apparatus includes a first stack that includes a plurality of first dies stacked with one another, the first dies include a plurality of first channels, at least one of which is designated as a first defective channel, and further includes a second stack stacked with the first stack and including a plurality of second dies stacked with one another, the second dies, including a plurality of second channels, at least one of which is designated as a second defective channel. A control circuit is configured, responsive to a command for accessing the first defective channel, to access one of the plurality of second channels in place of accessing the first defective channel, wherein the one of the plurality of second channels corresponds to the first defective channel and is not designated as the second defective channel.
-
48.
公开(公告)号:US20190213083A1
公开(公告)日:2019-07-11
申请号:US16355731
申请日:2019-03-16
Applicant: International Business Machines Corporation
Inventor: Alexander Cook , Manuel Orozco , Christopher R. Sabotta , John M. Santosuosso
IPC: G06F11/14 , G06F16/901 , G06F16/2455
CPC classification number: G06F11/1461 , G06F11/1438 , G06F11/1474 , G06F16/24568 , G06F16/9024 , G06F2201/805 , G06F2201/84
Abstract: A variable checkpoint mechanism in a streams manager checkpoints a streaming application based on periodic time periods for checkpoints. The variable checkpoint mechanism can take a checkpoint before a periodic time period ends when a spike is coming, or can take a checkpoint after the periodic time period ends when there is backpressure in a consistent region of the streaming application. When there is no anticipated spike coming and when there is no backpressure in a consistent region of the streaming application, the checkpoint is performed at the normal end of the periodic time period for checkpoints. In this manner the checkpoint timing of the variable checkpoint mechanism can be adjusted real-time to minimize the negative impact of checkpointing on the performance of the streaming application.
-
49.
公开(公告)号:US20190205180A1
公开(公告)日:2019-07-04
申请号:US16312331
申请日:2017-06-23
Applicant: SCHNEIDER ELECTRIC SYSTEMS USA, INC.
Inventor: Raja Ramana MACHA , Andrew Lee David KLING , Frans MIDDELDORP , Nestor Jesus CAMINO, JR. , James Gerard LUTH , James P. MCINTYRE
IPC: G06F9/50 , G06F11/20 , G05B19/4155
CPC classification number: G06F9/5083 , G05B19/4155 , G05B2219/31449 , G06F11/203 , G06F11/3006 , G06F11/3055 , G06F2201/805 , G06F2209/5011
Abstract: In a Boundaryless Control High Availability (“BCHA”) system (e.g., industrial control system) comprising multiple computing resources (or computational engines) running on multiple machines, technology for computing in real time the overall system availability based upon the capabilities/characteristics of the available computing resources, applications to execute and the distribution of the applications across those resources is disclosed. In some embodiments, the disclosed technology can dynamically manage, coordinate recommend certain actions to system operators to maintain availability of the overall system at a desired level. High Availability features may be implemented across a variety of different computing resources distributed across various aspects of a BCHA system and/or computing resources. Two example implementations of BCHA systems described involve an M:N working configuration and M:N+R working configuration.
-
公开(公告)号:US20190146948A1
公开(公告)日:2019-05-16
申请号:US16233851
申请日:2018-12-27
Applicant: Commvault Systems, Inc.
CPC classification number: G06F16/128 , G06F11/00 , G06F11/1448 , G06F11/1458 , G06F2201/805 , G06F2201/84
Abstract: An information management system according to certain aspects may determine whether storage operations will work prior to executing them. The system may check various factors or parameters relating to a storage policy to verify whether the storage policy will work at runtime without actually executing the policy. Some examples of factors can include: availability of primary storage devices, availability of secondary storage devices, license availability for performing that operation, user credentials for connecting to primary and/or second storage devices, available storage capacity, connectivity to storage devices, etc. The system may also check whether a particular system configuration is supported in connection with storage operations. The result of the determination can be provided in the form of a report summarizing any problems found with the storage policy. The report can include recommended courses of action or solutions for resolving any identified issues.
-
-
-
-
-
-
-
-
-