Patent classifications
G06F3/0671
METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT FOR COPYING DATA
Techniques for replicating data involve: determining overwritten probabilities of a plurality of data blocks of a source storage device. The techniques further involve: classifying the plurality of data blocks as cold data blocks or hot data blocks based on the overwritten probabilities in the plurality of data blocks. The techniques further involve: replicating at least a portion of the cold data blocks to a target storage device prior to the hot data blocks. Accordingly, transmission resources used to re-replicate overwritten data during an initial replication period can be reduced, thereby achieving efficient data replication.
AUTHENTICATED MODIFICATION OF MEMORY SYSTEM DATA
Methods, systems, and devices for authenticated modification of memory system data are described. A host system may transmit a command to program data to a protection region of a memory system, and the host system may sign the command using a key associated with the protection region. In some examples, the host system may transmit the data associated with the command, or the command may include instructions to move the data from another region of the memory system. Upon receiving the command, the memory system may verify the signature to determine whether the host is authorized to modify the protection region, and may program the data as requested by the host system. In some cases, the protection regions of the memory system may be updated, for example by adjusting the size or address range of the protection regions, in response to a command from the host system.
STORAGE SYSTEM
A bandwidth between a second processor and a second memory is higher than a bandwidth between a first processor and a first memory. The first memory stores a read command from a host computer. The first processor analyzes a content of the read command, and in accordance with a result of the analysis, requests read data from the second processor. In response to the request from the first processor, the second processor reads the read data from one or more storage drives and stores the read data in the second memory. The second processor notifies the first processor that the read data is stored in the second memory. The first processor transfers the read data read from the second memory, to the host computer without storing the read data in the first memory.
Method, apparatus, device and storage medium for managing access request
A method, an apparatus, a device, and a storage medium for managing an access request are provided. The method includes acquiring a group of access requests for performing data access to a storage device in a computing system, the group of access requests indicating access operations for a group of addresses in the storage device respectively; arranging an order of the group of addresses based on address ranges of the addresses of the group of addresses in the storage device; generating a merged request based on at least one part of the access requests with consecutive addresses among the group of access requests with the arranged addresses; and executing a data access operation on the storage device based on the merged request, the method being implemented in a driver of the storage device, and the driver being implemented in a user state of the computing system.
Determining capacity consumption in a deduplicating storage system
Determining effective space utilization in a storage system, including: identifying an amount of data stored within the storage system that is associated with a user-visible entity; identifying an amount of data stored within the storage system that is associated with all snapshots of the user-visible entity; and reporting, in dependence upon the an amount of data stored within the storage system that is associated with the user-visible entity and the amount of data stored within the storage system that is associated with all snapshots of the user-visible entity, a total capacity utilization associated with the user-visible entity.
RESOURCE ISOLATION IN COMPUTATIONAL STORAGE DEVICES
A method includes receiving, at a controller of a computational storage (CS) device, a request to allocate computational storage to an application of a host device. The request includes a resource set ID associated with the application. The method further includes identifying a memory range within a memory region of the CS device. The method further includes storing, in a data structure associated with the resource set ID, an association between a memory range identifier (ID) of the memory range, the memory region, and an offset within the memory region. The method further includes sending the memory range ID to the host device.
Writing data using references to previously stored data
A system and method comprising: receiving a request to write data stored at a first range of a first volume to a second range of a second volume, where first metadata for the first range of the first volume is associated with a range of physical addresses where the data is stored in the storage system; and responsive to receiving the request: creating second metadata for the second range of the second volume, wherein the second metadata is associated with the range of physical addresses where the data is stored in the storage system; and associating the second volume with the second metadata.
Data compression/decompression system, and data compression/decompression method
To provide a data compression/decompression system that can appropriately decompress compressed data. A first computer generates first identification information that can identify a first execution environment; and stores the first identification information on a storage device in association with compressed data of data. A second computer generates second identification information that can identify a second execution environment; and determines whether or not the first identification information, and the second identification information match. In a case that it is determined that the first identification information, and the second identification information do not match, the second computer requests a third computer that is capable of decompression of the compressed data to decompress the compressed data, the third computer decompresses the compressed data, and transmits decompressed data to the second computer, and the second computer completes the decompression of the compressed data by receiving the decompressed data from the third computer.
Block-based protection from ransomware
A technique of protecting data from ransomware attacks identifies a set of blocks written to a data object between first and second points in time, determines a set of attributes of the set of blocks, and, in response to the set of attributes indicating a likelihood of a ransomware attack, secures a state of the data object as of the first point in time.
Copying data based on overwritten probabilities
Techniques for replicating data involve: determining overwritten probabilities of a plurality of data blocks of a source storage device. The techniques further involve: classifying the plurality of data blocks as cold data blocks or hot data blocks based on the overwritten probabilities in the plurality of data blocks. The techniques further involve: replicating at least a portion of the cold data blocks to a target storage device prior to the hot data blocks. Accordingly, transmission resources used to re-replicate overwritten data during an initial replication period can be reduced, thereby achieving efficient data replication.