G06F2201/845

Method for controlling process based on network operation mode and apparatus therefor

Disclosed are a method of controlling a process based on a network operation mode and an apparatus therefor. A process controlling method performed in a network device includes determining an operation mode for an operating system of the network device, determining an entity for controlling a process based on the determined operation mode, and controlling the process through the determined entity. According to the present invention, it is possible to control a process lifecycle through the same interface regardless of the network operation mode.

Systems and Methods for Overlapping Parity Sectors

An apparatus for processing data includes a data detector configured to detect data values in data sectors to yield detected data, a data decoder configured to decode the detected data, wherein the data detector and the data decoder are configured to process the data sectors in a series of global iterations, a memory configured to store parity sector soft information, and a scheduler configured to control overlapping reprocessing of a failed sector in the data detector and the data decoder based on the parity sector soft information with processing of another data sector in the data detector and the data decoder.

AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE
20170140157 · 2017-05-18 ·

Avoiding encryption in a deduplication vault. In one example embodiment, a method for avoiding encryption during a backup of a source storage into a deduplication storage may include analyzing an allocated plain text block stored in the source storage at the point in time to determine if the allocated plain text block is already duplicated in the deduplication storage, in response to the allocated plain text block already being duplicated in the deduplication storage, avoiding encryption of the allocated plain text block by skipping an encryption of the allocated plain text block and instead associating the location of the allocated plain text block in the source storage with the location of the duplicate block already duplicated in the deduplication storage.

METHOD AND APPARATUS FOR MANAGING DATA RECOVERY OF DISTRIBUTED STORAGE SYSTEM
20170109247 · 2017-04-20 ·

Exemplary embodiments provide a way to manage data recovery in a distributed system having multiple data store nodes. A storage system comprises: a first node including a first processor; and a plurality of second nodes coupled to the first node, each of the plurality of second nodes including a second processor and one or more second storage devices. The first processor is configured to control to store data and replication of the data in the second storage devices of two or more second nodes. If at least one of the second nodes has failed and a storage capacity of the plurality of second nodes is below a given threshold, one of the second nodes is configured to receive a first data, which is replication of data stored in a failed second node, from another of the second nodes, and create parity data based on the received first data.

Avoiding encryption in a deduplication storage

Avoiding encryption in a deduplication vault. In one example embodiment, a method may include analyzing an allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block not being stored, encrypting the allocated plain text block and analyzing the encrypted block to determine if the encrypted block is already stored in the deduplication storage, analyzing a second allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block already being stored, avoiding encryption of the second allocated plain text block by not encrypting the second allocated plain text block and instead associating the location of the second allocated plain text block in the source storage with the location of the duplicate block already stored.

STORAGE SYSTEM ARCHITECTURE
20170093980 · 2017-03-30 ·

A storage system is provided. The storage system includes a plurality of storage units, each of the plurality of storage units having storage memory for user data and a plurality of storage nodes, each of the plurality of storage nodes configured to have ownership of a portion of the user data. The storage system includes a first pathway, coupling the plurality of storage units such that each of the plurality of storage units can communicate with at least one other of the plurality of storage units via the first pathway without assistance from the plurality of storage nodes.

MULTI STREAM DEDUPLICATED BACKUP OF COLLABORATION SERVER DATA
20170083407 · 2017-03-23 ·

Techniques to backup collaboration server data are disclosed. A plurality of separate threads are used to back up a prescribed number of subsets of a dataset. Each subset of the prescribed number of subsets was determined by walking an associated directory in the prescribed order at a prior time with which a prior backup is associated. A separate thread is spawned to backup transaction logs associated with the dataset. A first pass backup of the transaction logs is performed in parallel with the backup of the prescribed number of subsets.

SYSTEM AND METHOD FOR ERROR DETECTION IN A CRITICAL SYSTEM
20170083392 · 2017-03-23 ·

A system includes a processor having first and second processing units and a memory coupled to the processor. The memory includes processor executable code to implement an application to execute a first process to provide first application output information and to execute a second process to provide second application output information, a selector to provide a first indication that the first process is a critical process and a second indication that the second process is a non-critical process, and an application program interface (API) to run on the first processing unit. The API directs the processor to run the application on the second processing unit, executes the first process to provide first API output information in response to the first indication; determines if the first application output information matches the first API output information, and determines to not execute the second process in response to the second indication.

SYSTEMS AND METHODS FOR PRE-GENERATION AND PRE-STORAGE OF REPAIR FRAGMENTS IN STORAGE SYSTEMS
20170083416 · 2017-03-23 ·

Systems and methods utilizing available storage space within a storage system (e.g., as supplemental storage) and/or implement less physical storage space in the storage system (e.g., reduced storage overhead) through operation of fragment pre-storage techniques are disclosed. Such fragment pre-storage utilization of the aforementioned available storage space may provide operation emulating larger storage overhead than is actually provided in the storage system, facilitate improved repair rates, and/or facilitate reduced repair bandwidth in the storage system according to embodiments. A fragment pre-storage repair policy may implement source object repair whereby additional fragments for the source object are pre-generated and pre-stored in the storage system as transient fragments, whereby the transient fragments are moved to corresponding storage nodes when those storage nodes become physically present in the storage system.

Efficient mechanism to replicate data for multiple controllers

An information handling system and method allows implementation of fault-tolerant storage subsystems using multiple storage controllers not themselves originally designed to support the redundancy of such fault-tolerant storage subsystems. In accordance with one embodiment, uncommitted data is efficiently and rapidly replicated across multiple commodity storage controllers, enabling faster and less expensive fault-tolerant storage subsystems. A redundant storage controller system can improve the efficiency of data replication while providing failure protection against controller failure. A redundant storage controller system using shared memory commonly accessible to the storage controllers can be enhanced to replicate data within host memory regions to protect against non-volatile memory failure. In accordance with at least one embodiment, an efficient data replication mechanism can be provided between storage controllers using off-the-shelf hardware.