-
公开(公告)号:US20190205229A1
公开(公告)日:2019-07-04
申请号:US16352012
申请日:2019-03-13
Applicant: International Business Machines Corporation
Inventor: Robert B. Basham , John Lewars , Christopher J. Tan , Oleksandr Safonov
IPC: G06F11/20
CPC classification number: G06F11/2094 , G06F11/2023 , G06F11/3051 , G06F2201/805 , G06F2201/815 , G06F2201/82
Abstract: Software and resources, pre-deployed in accordance with a disaster recovery policy, are placed in a standby state to provide rapid disaster recovery in a cloud storage environment. When a disaster recovery situation is detected, (for example a loss of access to primary data), the pre-deployed resources are immediately activated according to the disaster recovery policy to provision and re-configure adequate resources and rapidly restore access to the data (such as restoring data from cloud backup storage). A disaster recovery situation may involve, for example, loss of hardware availability, network bandwidth interruption, or a sudden and large unforeseen jump in storage retrieval request volume (for example a recall storm).
-
公开(公告)号:US20190205220A1
公开(公告)日:2019-07-04
申请号:US16294876
申请日:2019-03-06
Applicant: ALIBABA GROUP HOLDING LIMITED
Inventor: Chao ZHANG
CPC classification number: G06F11/1469 , G06F9/455 , G06F9/45558 , G06F11/07 , G06F2009/4557 , G06F2009/45583 , G06F2201/82
Abstract: Systems and methods for live migration of a virtual machine are provided. The methods include: copying, by a destination physical machine according to a recorded dirty page table, dirty memory pages corresponding to dirty memory page identifiers in the dirty page table to a source physical machine when live migration of a virtual machine fails in a delayed-copy mode, and updating and storing, by the source physical machine, the copied dirty memory pages. When live migration of a virtual machine fails, dirty memory pages corresponding to dirty memory page identifiers in a dirty page table are copied to a source physical machine to be updated and stored, so that the source physical machine has complete and the latest memory pages, and the virtual machine can roll back to and run independently on the source physical machine.
-
公开(公告)号:US20190188380A1
公开(公告)日:2019-06-20
申请号:US15844453
申请日:2017-12-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Gowtham R. ANIMIREDDYGARI , Karthik SELVARAJ , Adrian M. MARINESCU , Catalin D. SANDU
CPC classification number: G06F21/564 , G06F11/1451 , G06F11/1464 , G06F11/1469 , G06F21/568 , G06F2201/80 , G06F2201/805 , G06F2201/82 , G06F2221/034
Abstract: A system for operating system remediation intercepts input/output (I/O) requests to write to one or more files and stores, as file restore data, (i) a restore copy of the one or more files to the system cache prior to performing write operations of the I/O requests and (ii) identification information for one or more processes or entities making the corresponding I/O requests in the system cache. The system reverts to the restore copy of the one or more files using the file restore data and based at least on a later determination that one or more processes making the corresponding I/O requests was malware. A current version of the one or more files is thereby replaced with the restore copy of the one or more files with improved automatic remediation support and a greater likelihood that data can be restored from the cache in the case of malware attacks.
-
公开(公告)号:US20190188101A1
公开(公告)日:2019-06-20
申请号:US16033849
申请日:2018-07-12
Applicant: SK hynix Inc.
Inventor: Chi Eun KIM , Soo Nyun KIM
IPC: G06F11/20
CPC classification number: G06F11/2094 , G06F2201/82
Abstract: A memory system includes: a nonvolatile memory device including a plurality of memory blocks and spare blocks; and a memory controller configured to control the nonvolatile memory device. The nonvolatile memory device may store spare information to any one block of the memory blocks or the spare blocks. When a bad block is detected from the memory blocks, the nonvolatile memory device replaces the bad block with any one of the spare blocks according to the spare information.
-
公开(公告)号:US20190188099A1
公开(公告)日:2019-06-20
申请号:US15843486
申请日:2017-12-15
Applicant: Western Digital Technologies, Inc.
Inventor: Adam Roberts , Sivakumar Munnangi
CPC classification number: G06F11/2094 , G06F11/1092 , G06F2201/805 , G06F2201/82
Abstract: When rebuilding a RAID (Redundant Array of Independent Disks) array in which a drive has failed, if another RAID array contains a mirror copy of the of the rebuilding RAID array content, this mirroring RAID array can be used to more rapidly rebuild the RAID array with the failed drive. Data requests to the rebuilding RAID array can be redirected to the mirroring RAID array; data can be transferred from the mirroring RAID array; or a combination of these can be used to finish rebuilding more quickly. When transferring data to the rebuilding array from the mirroring array, the transfer can be performed as a direct memory access (DMA) process independently of the RAID module of either array.
-
公开(公告)号:US20190188080A1
公开(公告)日:2019-06-20
申请号:US16278257
申请日:2019-02-18
Applicant: IEX Group, Inc.
Inventor: James Michael Cape , Robert Park , Allen Zhang , Zoran Perkov , Lieting Yu , Prerak Pukhraj Sanghvi , Beau Tateyama , Constantine Sokoloff , Eric Quinlan
CPC classification number: G06F11/1415 , G06F9/4843 , G06F2201/82
Abstract: A Data Synchronization and Failover Management (DSFM) system monitors simultaneous execution of non-identical instances of a software application and may label as a particular result of the software application the earliest output corresponding to that result produced by one of the instances. The DSFM may label one of the instances as a primary instance and the other instances as secondary instances and, if the primary instance fails, may re-label one of the secondary instances that computed all of the operations associated with the last result produced prior to the failure of the primary instance, as a new primary instance.
-
公开(公告)号:US20190114238A1
公开(公告)日:2019-04-18
申请号:US15784786
申请日:2017-10-16
Applicant: Dell Products L.P.
Inventor: Chandrashekar NELOGAL , Deepu Syam Sreedhar M , Sandeep AGARWAL , Amit Pratap SINGH
CPC classification number: G06F11/2094 , G06F3/0619 , G06F3/065 , G06F3/0665 , G06F3/0689 , G06F11/1076 , G06F2201/805 , G06F2201/82
Abstract: In accordance with embodiments of the present disclosure, a method may be implemented to respond to receiving data A to be stored in a storage system that includes a plurality of N spans, each including a plurality of M drives. The method may include performing data storing operations. The data storing operations may include storing the data A in N portions across the plurality of spans, generating a Za parity based on an XOR operation applied to the N portions of the data A, storing the Za parity in N-1 portions across a subset of the plurality of spans, determining a Zap parity based on an XOR operation applied to the N-1 portions of the Za parity, and storing the Zap parity.
-
公开(公告)号:US20190095263A1
公开(公告)日:2019-03-28
申请号:US15719279
申请日:2017-09-28
Applicant: PayPal, Inc.
Inventor: Omri Moshe Lahav , Raoul Christopher Johnson , David Tolpin
CPC classification number: G06F11/004 , G06F2201/82 , G06F2201/83 , G06Q20/405 , G07F9/026
Abstract: Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.
-
49.
公开(公告)号:US20190034293A1
公开(公告)日:2019-01-31
申请号:US15662144
申请日:2017-07-27
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Theresa M. Brown , Nicolas M. Clayton , Nedlaya Y. Francisco , Theodore T. Harris, JR. , Kevin Lin , Gregory E. McBride , Carol S. Mellgren , Raul E. Saba , Matthew Sanchez
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F11/1446 , G06F11/1451 , G06F11/1464 , G06F11/2064 , G06F11/2074 , G06F2201/805 , G06F2201/82 , G06F2201/84
Abstract: Consistency groups are asynchronously copied to a remote computational device, from a local computational device, wherein point in time copy operations are performed at the local computational device while the consistency groups are being asynchronously copied to the remote computational device. Indicators are stored at the remote computational device to identify those point in time copy operations that are to be restored as part of a recovery operation performed at the remote computational device in response to a failure of the local computational device.
-
公开(公告)号:US20190026183A1
公开(公告)日:2019-01-24
申请号:US16145290
申请日:2018-09-28
Applicant: International Business Machines Corporation
Inventor: Greg R. Dhuse , Wesley B. Leggette , Jason K. Resch , Trevor J. Vossberg
IPC: G06F11/10 , H04L9/08 , G06F12/06 , H04L29/06 , G06F3/06 , H03M13/15 , H04L29/08 , H04L9/14 , G06F9/48 , G06F11/20 , H03M13/37 , H04L12/927 , H04L12/24
CPC classification number: G06F11/1076 , G06F3/061 , G06F3/0619 , G06F3/0622 , G06F3/0623 , G06F3/0635 , G06F3/064 , G06F3/0659 , G06F3/067 , G06F9/4856 , G06F11/1092 , G06F11/1096 , G06F11/2094 , G06F12/0646 , G06F2201/805 , G06F2201/82 , G06F2212/1008 , G06F2212/657 , H03M13/1515 , H03M13/3761 , H04L9/0861 , H04L9/14 , H04L41/0816 , H04L47/803 , H04L63/0428 , H04L63/0457 , H04L63/06 , H04L63/068 , H04L63/08 , H04L63/101 , H04L67/1097
Abstract: A method includes identifying an encoded slice for rebuilding. The method further includes determining whether the set of encoded slices is stored in an encrypted section of a vault or within an unencrypted section of the vault. The method further includes, when the set of encoded slices is stored in the unencrypted section of the vault, determining whether the set of storage units have viewing rights. The method further includes, when the set of storage units does not have the viewing rights, enabling a restricted rebuilding process to rebuild the encoded slice. The method further includes, when the set or storage units does have the viewing rights, enable an unrestricted rebuilding process to rebuild the encoded slice.
-
-
-
-
-
-
-
-
-