G06F3/0629

FILE JOURNAL INTERFACE FOR SYNCHRONIZING CONTENT
20230101958 · 2023-03-30 ·

In some embodiments, a system for synchronizing content with client devices receives a request from a client device to synchronize operations pertaining to content items associated with a user account registered at the system. The request can include the operations and a cursor identifying a current position of the client in a journal of revisions on the system. Based on the operations, the system generates linearized operations associated with the content items. The linearized operations can include a respective operation derived for each of the content items from one or more of the operations. The system converts each respective operation in the linearized operations to a respective revision for the journal of revisions and, based on the cursor, determines whether the respective revision conflicts with revisions in the journal. When the respective revision does not conflict with revisions in the journal, the system adds the respective revision to the journal.

Object migration method, device, and system

A storage system includes an object storage server and a storage client, the object storage server obtains an object migration policy of a source bucket, where the object migration policy indicates a condition for migrating an object from the source bucket to a destination bucket in a plurality of buckets, and the object storage server migrates a first object in the source bucket to the destination bucket according to the policy migration policy when determining that the first object meets the object migration policy of the source bucket.

Fail-safe redundancy in aggregated and virtualized solid state drives

A solid state drive having at least one component solid state drive, a spare solid state drive, and a drive aggregator. The drive aggregator has at least one host interface, at least one drive interface connected to the at least one component solid state drive, and an interface connected to the spare solid state drive. The drive aggregator is configured to maintain, in the spare solid state drive, a copy of a dataset that is stored in the component solid state drive. In response to a failure of the component solid state drive, the drive aggregator is configured to substitute a function of the component solid state drive with respect to the dataset with a corresponding function of the spare solid state drive, based on the copy of the dataset maintained in the spare solid state drive.

Managing host connectivity to a data storage system

Techniques are provided for managing host connectivity to a data storage system. A host connectivity management system receives a request from a host system to connect to a data storage system. The data storage system includes storage nodes which include storage volumes, and each storage node includes multiple ports to enable connection to the storage node. The host connectivity management system determines a subset of ports, among all available ports of the storage nodes, to assign to the host system for use by the host system for connecting to the storage nodes of the data storage system to access the storage volumes. The host connectivity management system sends connection information to the host system to enable the host system to connect to the data storage system, wherein the connection information includes port identifiers associated with the subset of ports assigned to the host system.

DATA ENCRYPTION AND DECRYPTION IN DISK DEVICE AND STORAGE DEVICE
20230097610 · 2023-03-30 ·

A disk device includes a volatile memory, a nonvolatile memory, and a controller. The controller is configured to receive, from a host, a key setting request that includes a cryptographic key, a key ID thereof, and tag information of the cryptographic key and generate generation information of the cryptographic key. The controller is also configured to store a first entry including the tag information, the cryptographic key, and the generation information associated with each other in the volatile memory, and store a second entry including the key ID and the generation information associated with each other in the nonvolatile memory.

ELECTRONIC DEVICE AND METHOD FOR MONITORING HARD DISKS
20230101977 · 2023-03-30 ·

A method for monitoring hard disks, implemented in an electronic device, includes sequentially detecting a number of hard disk codes of hard disks recorded by a host bus adapter, and determining whether each hard disk code has a drive letter assigned; if one hard disk code is determined to not have a drive letter assigned, writing a first mark corresponding to the hard disk code in a register of the host bus adapter. When detection of all hard disk codes is completed, transmitting the first marks written in the register to a CPLD interface and detecting whether each hard disk corresponding to the first mark is in place. If one hard disk corresponding to the first mark is found to be in place, controlling the hard disk to output an alarm based on the first mark.

SMART STORAGE SERVICES DEVICE

A storage services device includes: a first processor that provides first server services for a server having a second processor that is coupled to a second storage and that provides second server services of the server and a storage controller coupled to a first storage of the server that transmits information about the first storage to the first processor. The storage services device is disposed in the server and disaggregates, within the server, the first server services from the second server services

INTEGRATION OF DATABASE WITH DISTRIBUTED STORAGE SYSTEM
20230097109 · 2023-03-30 ·

Methods, systems, and computer programs are presented for providing backup recoverable ranges in a database system. One method includes an operation for determining if a backup chain is within a recoverable range. The recoverable range defines a time interval in which data from a database system is recoverable to a point in time within the time interval. The method further includes an operation for preserving the backup chain when the backup chain is within the recoverable range. When the backup chain is not within the recoverable range, the method includes operations for checking a retention policy for the backup chain, determining whether to preserve or expire the backup chain based on the retention policy, and preserving the backup chain based on the determination on the retention policy.

METHOD OF POWER MANAGEMENT
20230102777 · 2023-03-30 ·

A method of power management includes steps of: in response to receiving from a server host a sleep command, an expander first outputting a predetermined register value to a processing unit in a normal state, and then switching to a power-saving state and outputting an interrupt signal to the processing unit; the processing unit determining whether both the predetermined register value and the interrupt signal are received; and when it is determined that both the predetermined register value and the interrupt signal have been received, the processing unit controlling a power supply to output standby electricity, making the expander and the processing unit operate based on the standby electricity.

EXECUTION OF COMMANDS ADDRESSED TO A LOGICAL BLOCK
20230036621 · 2023-02-02 ·

A controller of a memory sub-system can, responsive to providing a command completion signal to a host, mark a portion of a plurality of commands that are addressed to a same logical block of the memory devices, reorder the marked portion of the plurality of commands, wherein write commands from the marked portion of the plurality of commands are given priority over read commands from the marked portion of the plurality of commands, execute a newest write command from the marked portion of the plurality of commands prior to executing read commands, addressed to the same logical block, from the marked portion of the plurality of commands, and execute read commands from the marked portion of the plurality of commands in on an order in which the read commands were received and after the execution of the newest write command, wherein the read commands are executed responsive to an execution of the newest write command.