G06F11/1415

OPTIMIZED ALARM STATE RESTORATION THROUGH CATEGORIZATION
20230168966 · 2023-06-01 ·

The disclosure provides an approach for alarm state restoration. Embodiments include determining a plurality of alarm definitions applicable to an inventory of a plurality of entities in a computing environment. Embodiments include assigning each given alarm definition of the plurality of alarm definitions to a given alarm category of a plurality of alarm categories. Embodiments include restoring declared states of the plurality of alarms definition on the inventory based on the assigning, wherein the restoring comprises, for each given alarm category of the plurality of alarm categories, performing a single traversal of the inventory to identify all respective entities of the plurality of entities that correspond to one or more alarm definitions assigned to the given alarm category.

Data recovery of guest virtual machines

A method of performing data recovery of a first virtual machine (VM) hosted on a first hypervisor to a second hypervisor that is different from the first hypervisor is provided. The method identifies information indicating format of a first virtual disk in a backup of the first VM, and creates a second virtual disk using the information indicating format of the first virtual disk. The method also accesses information indicating configuration of the first VM and metadata of the first virtual disk, and creates a second VM hosted on the second hypervisor using the information indicating configuration of the first VM and the metadata of the first virtual disk. The method further attaches the second virtual disk to the second VM.

Recovering dynamic system data

Aspects of the invention include creating a collection of control blocks associated with one or more catalogs, each control block including an eye catcher value and a plurality of pointers, creating a collection of recovery control blocks based the collection of control blocks, each recovery control block including a corresponding copy of the eye catcher value and the plurality of pointers, storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table, analyzing the collection of control blocks to determine that a corruption exists, determining a corruption type, the corruption type comprises an infrastructure corruption and or a control block corruption, and initiating a remedial action for the collection of control blocks based at least in part on the corruption type.

Dynamically selecting optimal instance type for disaster recovery in the cloud

The selection of an optimal restore instance type based on a customer's speed/cost tradeoff resolution is disclosed. Aspects of the anticipated completion time to complete the recovery and completion cost to perform the recovery may be extrapolated based on a baseline or test recovery and/or actual recovery times and costs. An automated restore activity may be performed on a baseline test VM of a predefined size using different restore instance types. An optimal restore instance type is used to form worker VMs that perform the recovery operations.

Method and system for recovering an image error using data hiding
09804924 · 2017-10-31 · ·

Described embodiments provide for recovering an error, which has occurred in video contents, by using hidden data. A video content providing server generates video contents, into which information for video error recovery is inserted. The server includes: a block segmentation unit that segments an original image into at least one block having a pre-set size; a block description information (BDI) generation unit that generates block description information (BDI) for each of the at least one block, each BDI including information necessary to recover each of the segmented blocks; a BDI insertion unit that inserts each of the generated BDI into a block that is different from a block to be recovered by using the generated BDI; and a provisional video generation unit that generates provision video contents by combining at least one block, into which the BDI has been inserted.

System for Data Retention and Method of Operating System
20170308439 · 2017-10-26 ·

A system having a first mode, a second mode and a system bus comprises a peripheral circuit, a power management unit (PMU), an additional wire and a control module. The peripheral circuit has a configuration information representing a circuit state thereof. The power management unit (PMU) generates an interrupt signal. The additional wire transmits therethrough the interrupt signal. The control module, in response to the interrupt signal, stores the configuration information via the system bus when the system is in the first mode and restores the configuration information via the system bus when the system is in the second mode.

SYSTEM FAILURE EVENT-BASED APPROACH TO ADDRESSING SECURITY BREACHES

A method includes: detecting a potential security breach associated with at least one component of a network environment; in response to detecting the potential security breach, determining a restorable state of the at least one component, wherein the restorable state is a state prior to the potential security breach; restoring the at least one component to the restorable state; and resuming operation of the at least one component of the network. Corresponding systems and computer program products are also disclosed.

Fast protection path activation using control plane messages

A method, performed in a network that includes a group of nodes, includes identifying a path through a set of the nodes, where each node, in the set of nodes, has a data plane and a control plane; establishing a control plane tunnel, associated with the path, within the control plane of the nodes in the set of nodes; establishing a data plane tunnel, associated with the path, within the data plane of the nodes in the set of nodes, where the data plane tunnel is associated with the control plane tunnel and established through the same set of nodes; and transmitting a control message through the control plane tunnel to change a state of the data plane tunnel.

Dynamic discovery of storage resource topology
09798736 · 2017-10-24 · ·

In one aspect, dynamic determination generates a storage resource graph corresponding to a storage topology. The generating may comprise iterating through storage resources in the storage topology and using a discovery handler to generate a node in the storage resource graph corresponding to each of the iterated storage resources. Dynamic determination generates an operation graph by iterating through nodes in the storage resource graph and using an operating handler to generate operation-specific metadata corresponding to each iterated node of the storage resource graph. Dynamic generating executes the operation graph in a way specific to the operation.

Using cache to manage errors in primary storage

An occurrence of at least one storage error is determined in an addressable portion of a primary storage storing a block of data. In response to determining the occurrence of the at least one storage error, it is determined whether the block of data is available in cache storage. In response to determining the block of data is cached, the cached block of data is used rather than the block of data from the addressable portion of the primary storage.