G06F3/0646

SYSTEMS AND METHODS FOR SECURELY SHARING DATA IN A MULTI-PORT MEMORY STORAGE DEVICE
20220197529 · 2022-06-23 ·

Example implementations include a method, a device, and a system for providing, by a device via a first port communicatively coupled with a first memory controller, read and write access to a shared namespace of a plurality of namespaces. A non-volatile memory storage of the device comprises the plurality of namespaces, the first memory controller being communicatively coupled with a non-volatile memory storage comprising the plurality of namespaces. The method further includes providing, by the device via a second port communicatively coupled with a second memory controller, read-only access to the shared namespace, the second memory controller being communicatively coupled with the non-volatile memory storage.

TRANSFERRING AN OPERATING IMAGE INTO A MULTI-TENANT ENVIRONMENT

A partition function is transferred from a source system to a multi-tenant target environment. The transfer is executed from a source system to a multi-tenant target environment. Physical and logical input/output (I/O) configuration settings of a partition image are separated on the source system, moving logical I/O configuration settings from the source system to a remote multi-tenant target environment. A dedicated target system of the remote multi-tenant target environment is selected. Physical information about hardware and connections of the dedicated target system are added to the logical I/O configuration settings. The logical I/O configuration settings combined with the physical information in the target system are activated. An operating system with the activated logical I/O configuration is started such that the partition function is transferred.

COMPRESSION DEVICE AND CONTROL METHOD

According to one embodiment, a compression device includes a first storage unit, a second storage unit, a calculation unit, and a comparison unit. The first storage unit stores addresses associated with hash values, respectively. The second storage unit includes storage areas specified by the addresses, respectively. The calculation unit determines a hash function to be used for first data in accordance with at least a part of the first data, and calculates a hash value using the hash function and at least a part of second data included in the first data. The comparison unit acquires third data from a storage area in the second storage unit specified by a first address, and compares the second data with the third data. The first address is stored in the first storage unit and is associated with the hash value.

Network attached device for accessing removable storage media

Embodiments disclosed herein provide systems, methods, and computer readable media to access data on removable storage media via a network attached access device. In a particular embodiment, a method provides receiving one or more user provided, in the removable storage media access device, receiving data over a packet communication network for storage on a removable storage medium. After receiving the data, the method provides preparing the data for storage on the removable storage medium. After preparing the data, the method provides writing the data to the removable storage medium.

Reconciliation of data in a distributed system
11360944 · 2022-06-14 · ·

Methods and systems are presented for providing data consistency in a distributed data storage system using an eventual consistency model. The distributed data storage system may store data across multiple data servers. To process a request for writing a first data value for a data field, a first data server may generate, for the first data value, a first causality chain representing a data replacement history for the data field leading to the first data value. The first data server may insert the first data value without deleting pre-existing data values from the data field. To process a data read request, multiple data values corresponding to the data field may be retrieved. The first data server may then select one data value based on the causality chains associated with the multiple data values for responding to the data read request.

SYSTEM AND METHOD FOR BACKUP GENERATION USING COMPOSED SYSTEMS

A system for managing composed information handling systems includes information handling systems and a composed information handling system of the composed information handling systems, which includes at least one compute resource set, at least one control resource set, and at least one hardware resource set. The system also includes a system control processor that obtains a bare metal communication from a compute resource set indicating a write of data, writes a first copy of the data in a storage resource of the at least one hardware resource set, writes a second copy of the data in a trace volume, generates a backup of the data using the trace volume, and stores the backup in a storage.

Predictive data orchestration in multi-tier memory systems

A computing system having memory components of different tiers. The computing system further includes a controller, operatively coupled between a processing device and the memory components, to: receive from the processing device first data access requests that cause first data movements across the tiers in the memory components; service the first data access requests after the first data movements; predict, by applying data usage information received from the processing device in a prediction model trained via machine learning, second data movements across the tiers in the memory components; and perform the second data movements before receiving second data access requests, where the second data movements reduce third data movements across the tiers caused by the second data access requests.

METHOD AND SYSTEM FOR LOW LATENCY DATA MANAGEMENT
20220171550 · 2022-06-02 ·

A method at a computing device for data management between a publisher and at least one subscriber, the method including receiving, at a system element, memory requirements from the publisher; creating a memory allocation of a pool of data objects for the publisher based on the received memory requirements; receiving, at the system element, consumption criteria from each of the at least one subscriber; and adjusting the memory allocation of the pool of data objects based on the consumption criteria received from the at least one subscriber.

Systems and Methods for Resource Lifecycle Management
20220171663 · 2022-06-02 ·

Systems, methods, and machine-readable media for monitoring a storage system and correcting demand imbalances among nodes in a cluster are disclosed. A performance manager for the storage system may detect performance imbalances that occur over a period of time. When operating below an optimal performance capacity, the manager may cause a volume to be moved from a node with a high load to a node with a lower load to achieve a preventive result. When operating at or near optimal performance capacity, the manager may cause a QOS limit to be imposed to prevent the workload from exceeding the performance capacity, to achieve a proactive result. When operating abnormally, the manager may cause a QOS limit to be imposed to throttle the workload to bring the node back within the optimal performance capacity of the node, to achieve a reactive result. These actions may be performed independently, or in cooperation.

Traffic Priority Based Creation of a Storage Volume within a Cluster of Storage Nodes
20230275964 · 2023-08-31 ·

An illustrative method includes receiving a request to create a storage volume; identifying, based on the request and on a configuration file propagated among a plurality of storage nodes in a cluster, status indicators of the storage nodes; identifying, based on the request, a size of the storage volume; identifying, based on the request, a replication factor representing a number of storage nodes that are to be replicated within a cluster for the storage volume; identifying, based on one or more characteristics associated with the storage volume, a traffic priority for the storage volume, the traffic priority representing a hierarchy that determines and prioritizes which traffic is allocated to available hardware and network resources in a particular order; creating, based on the status indicators, the size, the replication factor, and the traffic priority, the storage volume on one or more of the plurality of storage nodes.