Patent classifications
G06F3/0671
COMPREHENSIVE DATA PROTECTION BACKUP
An inventory of computer resources requiring backup data protection including an estimate of future growth of storage resources along with a set of data retention policies, rules, and outcomes in conformance with business requirements, is created. An architecture for initial ingest of protected data and a backup execution approach is created, based on the resource inventory, a sizing and assumptions of resources and data, and the set of data retention policies, rules, and outcomes. An initial ingest copies the protected data to the backup storage. The initial ingest architecture is transformed to a steady-state ingest phase, by incrementally adjusting the resources based on progress of the initial ingest. Responsive to completing the initial ingest of protected data, a steady-state backup ingest is performed. A validity of the sizing and assumptions of architecture resources is determined and an adjustment to the resources is performed based on the validity determination.
REDUCING MEMORY USAGE IN STORING METADATA
Data is ingested from a source system including by storing a plurality of data chunks in one or more chunk files and storing corresponding chunk identifiers associated with the plurality of data chunks in a first data structure. After data ingestion is complete, one or more duplicate data chunks that were stored during the data ingestion are determined and a second data structure is updated to include one or more entries corresponding to one or more determined duplicate data chunks.
Data backup method, storage medium, and computing device
A data backup method includes querying a first block of a first blockchain for unused transaction output information based on a first condition being met, the first block including each block of all blocks included in the first blockchain; generating transaction information according to the unused transaction output information obtained based on the querying, the transaction information indicating a transaction operation based on an account address to which the unused transaction output information belongs; recording the transaction information in a second block and releasing the second block, and recording the second block on which a consensus is reached on a second blockchain; and backing up the first blockchain into a storage system, and deleting the first blockchain. Counterpart apparatus, terminal, server, and/or non-transitory computer-readable medium are also contemplated.
Method and system for data processing
A method for data processing, comprising updating intermediate storage information according to data to be processed and address information of the data to be processed in a first storage space, until the intermediate storage information has reached a preset size; and performing, in the first storage space, an operation corresponding to the data to be processed using the intermediate storage information, when the intermediate storage information reaches the preset size. By the above method, the computing cost for performing an operation corresponding to the data to be processed in the first storage space can be reduced, the efficiency in performing the corresponding operation can be improved, and with intermediate storage information adapted to the first storage spaces of different sizes, the number of operations on the first storage spaces can be reduced.
Virtual machine backup and restoration
Reversing deletion of a virtual machine including managing, by a storage system, a repository of virtual machine snapshots on a datastore; receiving, by the storage system, a request to recover a deleted virtual machine from the datastore; accessing, by the storage system, the repository of virtual machine snapshots on the datastore to generate a list of deleted virtual machines associated with virtual machine snapshots in the repository of virtual machine snapshots; receiving, by the storage system, a selection of one of the deleted virtual machines in the list of deleted virtual machines; and recovering, by the storage system, the selected deleted virtual machine using a virtual machine snapshot for the selected deleted virtual machine.
COMPUTING RESOURCE MANAGEMENT METHOD, ELECTRONIC EQUIPMENT AND PROGRAM PRODUCT
A technique for computing resource management involves determining a first resource request frequency based on the number of trigger signals received from a storage device during a first period. The trigger signals are generated when a data amount of modified metadata stored in the storage device reaches a threshold data amount. The technique further involves determining a second resource request frequency based on the number of trigger signals received from the storage device during a second period subsequent to the first period. The technique further involves adjusting computing resources for performing an operation of copying the modified metadata in the storage device to a storage medium based on a comparison of the first resource request frequency and the second resource request frequency. Accordingly, computing resources can be fully utilized, and an operation of copying modified metadata to a magnetic disk can be timely performed.
IN-LINE DATA FLOW FOR COMPUTATIONAL STORAGE
A system includes a storage device and a computational storage processor. The storage device includes media. The computational storage processor is configured to, after issuance of a single command from a host device, receive data corresponding to the command, process the data as the data is received using a filter program and provide results data from the processed data.
METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MANAGING STORAGE SYSTEM
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage system. The method includes: based on respective task types of a plurality of tasks to be executed, allocating the plurality of tasks to a plurality of accelerator resources in a storage system for processing; at least for a first accelerator resource in the plurality of accelerator resources, determining a first polling interval based on an average task size of a first group of tasks allocated to the first accelerator resource; and scheduling the execution of the first group of tasks at the first accelerator resource at the first polling interval. The embodiments of the present disclosure can optimize the scheduling of the tasks to be executed on the plurality of accelerator resources, thereby optimizing system performance.
Data set overlay protection
A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
Mobile storage manager control application for managing a storage manager of an information management system
A storage manager control application facilitates interactions with, and configurations of, a storage manager that manages one or more client computing devices of an information management system. The storage manager control application may be implemented using a variety of modules that allow a user to interact with the storage manager in various ways. Using the storage manager control application, a user may view a backup status of the information management system, and view the backup status of specific client computing devices that are managed by the storage manager. The user may also search for various entities and/or objects within the information management system using the storage manager control application. In addition, a user may view the status of one or more backup jobs configured within the information management system, as well as backup plans that have been established for one or more of the client computing devices.