MULTILEVEL DISASTER RECOVERY
    62.
    发明申请

    公开(公告)号:US20180349238A1

    公开(公告)日:2018-12-06

    申请号:US15610609

    申请日:2017-05-31

    Applicant: SAP SE

    Abstract: Account data comprising metadata for primary application instances running at a primary active cloud environment instance (ACEI) is stored. Application data associated with the primary application instances is stored at primary databases (DBs). The account and application data are transferred to secondary DBs at a secondary ACEI. The secondary ACEI may be a backup instance to substitute services provided by the primary ACEI in case of unavailability. For example, the location where the primary ACEI is hosted may be affected by a disaster. To failover a primary data center hosting the primary ACEI, a database takeover to the secondary DBs is performed. The secondary ACEI is configured correspondingly to the primary ACEI based on the transferred account data. Secondary application instances corresponding to the primary application instances are started at the secondary ACEI. Requests directed to the primary application instances are redirected to the secondary application instances.

    DISASTER RECOVERY SERVICE
    63.
    发明申请

    公开(公告)号:US20180322022A1

    公开(公告)日:2018-11-08

    申请号:US16036679

    申请日:2018-07-16

    Abstract: A customer may use a disaster recovery service to generate a disaster recovery scenario in order to make certain resources available to the customer in the event of a data region failure. The customer may specify a recovery point objective, a recovery time objective and a recovery data region for the scenario. Accordingly, the disaster recovery service may coordinate with one or more other services provided by the computing resource service provider to reproduce the customer resources and other resources necessary to support the customer resources. These reproduced resources may be transferred to the recovery data region based at least in part on the parameters specified by the customer. In the event of a data region failure, the disaster recovery service may update the domain name system to resolve any customer requests for the customer resources to the recovery data region.

    SERVICE PROCESSOR TRAPS FOR COMMUNICATING STORAGE CONTROLLER FAILURE

    公开(公告)号:US20180267874A1

    公开(公告)日:2018-09-20

    申请号:US15988345

    申请日:2018-05-24

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for communicating storage controller failures utilizing service processor traps. A first storage controller, of a first storage cluster, has a disaster recovery relationship with a second storage controller of a second storage cluster. The first storage controller comprise a first service processor configured to monitor health of the first storage controller. Responsive to identifying a failure of the first storage controller, the first service processor uses stored communication configuration of a second service processor of the second storage controller to send a service processor trap to the second service processor. In this way, the second service processor initiates a switchover operation by the second storage controller to provide clients with failover access to data previously available through the first storage controller before the failure. Proactive notification of storage controller failures utilizing service processor traps reduces client data access disruptions.

    FAST SYSTEM STATE CLONING
    68.
    发明申请

    公开(公告)号:US20180267865A1

    公开(公告)日:2018-09-20

    申请号:US15957591

    申请日:2018-04-19

    Abstract: A system and method to create a clone of a source computing system, the system including the steps of selecting a memory space coupled to the source computing system, retrieving uncoded data from the selected memory space, encoding the uncoded data by use of a bit-marker-based encoding process executing on a backup server, storing encoded data in a protected memory coupled to the backup server, wherein the protected memory is protected from a power interruption, retrieving the encoded data from the protected memory; and decoding, the encoded data onto a target computing system, wherein the target computing system is separate from the source computing system.

Patent Agency Ranking