G06F11/1489

METHODS FOR DATA WRITING AND FOR DATA RECOVERY, ELECTRONIC DEVICES, AND PROGRAM PRODUCTS
20210133029 · 2021-05-06 ·

Techniques for data recovery involve: reading target data corresponding to a first logical block from a first data block of a stripe of a RAID system, the target data being a compressed version of data in the first logical block; in accordance with a determination that an error occurs in the target data, reading data from a plurality of second data blocks of the stripe and first parity information from a first parity block of the stripe; comparing respective checksums of the data read from the plurality of second data blocks with a first predetermined checksum and a checksum of the first parity information with a second predetermined checksum; and determining recoverability of the target data based on a result of the comparison. Accordingly, it is possible to simplify the data recovery process, reduce the calculation and time costs in the data recovery, and improve the data recovery efficiency.

METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR PROCESSING DATA
20210117258 · 2021-04-22 ·

Techniques involve in response to receiving, from a failure analysis device, a request for obtaining a to-be-analyzed data block in a set of raw data blocks in a data file related to a failure of an operating system, determining a position of the to-be-analyzed data block in a compressed file for the data file, the request comprising a position of the to-be-analyzed data block in the data file. The techniques further involve determining, based on the position of the to-be-analyzed data block in the compressed file, a compressed data block in the compressed file corresponding to the to-be-analyzed data block. The techniques further involve sending the compressed data block to the failure analysis device for analyzing the failure. Accordingly, the time for analyzing the failure may be saved, the amount of data transmission and the resources occupied by decompression may be reduced, and the processing efficiency may be improved.

System and Method for Tier Recovery

A method, computer program product, and computer system for identifying, by a computing device, a pattern in a super block of a logger tier. it may be determined that the pattern in the super block of the logger tier is a known pattern, wherein the known pattern indicates invalid data in the logger tier. The logger tier may be booted up by storing an unknown pattern in the super block into the logger tier, wherein the unknown pattern indicates valid data in the logger tier.

RECOVERING DYNAMIC SYSTEM DATA
20210089412 · 2021-03-25 ·

Aspects of the invention include creating a collection of control blocks associated with one or more catalogs, each control block including an eye catcher value and a plurality of pointers, creating a collection of recovery control blocks based the collection of control blocks, each recovery control block including a corresponding copy of the eye catcher value and the plurality of pointers, storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table, analyzing the collection of control blocks to determine that a corruption exists, determining a corruption type, the corruption type comprises an infrastructure corruption and or a control block corruption, and initiating a remedial action for the collection of control blocks based at least in part on the corruption type.

Recovering dynamic system data

Aspects of the invention include creating a collection of control blocks associated with one or more catalogs, each control block including an eye catcher value and a plurality of pointers, creating a collection of recovery control blocks based the collection of control blocks, each recovery control block including a corresponding copy of the eye catcher value and the plurality of pointers, storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table, analyzing the collection of control blocks to determine that a corruption exists, determining a corruption type, the corruption type comprises an infrastructure corruption and or a control block corruption, and initiating a remedial action for the collection of control blocks based at least in part on the corruption type.

Data Recovery in a Geographically Diverse Storage System Employing Erasure Coding Technology and Data Convolution Technology
20210218420 · 2021-07-15 ·

Data convolution for geographically diverse storage is disclosed. Data and corresponding convolutions of data can employ erasure coding to improve robustness of access to information represented in the data. For a peer group of chunks employing a given erasure coding scheme, access to the information represented in the data can be via accessible chunks and/or recovery of a less-accessible chunk, e.g., via a deconvolution operation, via a decoding operation, via a mix of deconvolution and decoding operations. The mix of deconvolution and decoding operations can enable recovery of a less-accessible chunk that cannot be recovered by either a deconvolution or decoding operation alone. This can improve access to information represented in less-available data.

RECOVERING DYNAMIC SYSTEM DATA
20210019239 · 2021-01-21 ·

Aspects of the invention include creating a collection of control blocks associated with one or more catalogs, each control block including an eye catcher value and a plurality of pointers, creating a collection of recovery control blocks based the collection of control blocks, each recovery control block including a corresponding copy of the eye catcher value and the plurality of pointers, storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table, analyzing the collection of control blocks to determine that a corruption exists, determining a corruption type, the corruption type comprises an infrastructure corruption and or a control block corruption, and initiating a remedial action for the collection of control blocks based at least in part on the corruption type.

Data protection automatic optimization system and method

A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions in a computer network, under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network, detect that one of a condition and an event has occurred in the computer network, automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, collect the second level of data from the at least one hardware device, and store the second level of data obtained from the at least one hardware device.

READ RETRY SCRATCH SPAC
20200371876 · 2020-11-26 ·

Devices and techniques to recover data from a memory device using a custom Read Retry feature are disclosed herein. A memory device can receive a first read request, read data from the memory array corresponding to the read request, and determine if the read data corresponding to the first read request includes a detectable error. In response to a detected error in the received data corresponding to the first read request, the memory device can recover data corresponding to the first read request using one of a set of read retry features, and load the one of the set of read retry features used to recover data corresponding to the first read request as a custom read retry feature in the memory device for a second read request subsequent to the first read request.

Manager election for erasure coding groups

To ensure that there is an elected manager among storage nodes of an erasure coding group (ECG), an ECG manager (ECGM) election process is periodically performed among available storage nodes that are configured with the software to perform the services of an ECGM. When a storage node is activated, an ECGM process of the storage node begins executing and is assigned a process identifier (PID). A storage node can utilize a service query framework to identify other available storage nodes and retrieve their ECGM PIDs. The storage node then selects a PID according to a criterion and elects the storage node corresponding to the selected PID to be the acting ECGM. This process is performed periodically, so even if the acting ECGM storage node fails, a new ECGM is eventually selected from the available storage nodes.