Patent classifications
G06F11/2056
Optimized copy algorithm selection
A method for increasing the efficiency of copying data is disclosed. In one embodiment, such a method includes receiving a request to copy data from a first location to a second location. The method determines an original copy algorithm associated with the request and determines whether the original copy algorithm is the best copy algorithm available to copy the data. If the original copy algorithm is the best copy algorithm, the method uses the original copy algorithm to copy the data. If, however, the original copy algorithm is not the best copy algorithm available, the method substitutes a more efficient copy algorithm for the original copy algorithm. In certain embodiments, this may be accomplished by looking in a prioritized list of copy algorithms and selecting a more efficient copy algorithm from the list. A corresponding system and computer program product are also disclosed.
Managing memory sector swapping using write transaction counts
A method can be used for managing a memory circuit that includes memory sectors having respective positions in the memory circuit as well as respective addresses for data transfer transactions. The method includes maintaining a record of coupling pairs of the positions and the addresses. Each coupling pair includes a memory sector in the plurality of memory sectors and an address coupled with the memory sector for data transfer transactions with respect to the memory sector. The method also includes keeping counts of the data transfer transactions involving the memory sectors in the plurality of memory sectors and replacing a first memory sector included in a coupling pair and having a first count of transactions with a second memory sector having a second count of transactions as a result of a condition being met.
Using inode entries to mirror data operations across data storage sites
A computer-implemented method, according to one approach, includes: receiving a data operation request which includes an activated compound operation flag. The data operation request is added to a queue in a gateway node, and the data operation request is eventually transmitted to a disaster recovery site. An inode entry which corresponds to the portion of data is locked, and metadata associated with the inode entry is updated to indicate that the data operation request has been performed at the disaster recovery site. Supplemental data operation requests which correspond to the portion of data are also identified by evaluating the metadata associated with the inode entry. These supplemental data operation requests are transmitted to the disaster recovery site, and the metadata associated with the inode entry is updated to indicate that the supplemental data operation requests have been performed at the disaster recovery site. Furthermore, the inode entry is unlocked.
SYSTEM FOR COMPUTING SYSTEM CONFIGURATION FILE STATE MIRRORING ON PEER COMPUTING DEVICES
A system is provided for computing system configuration file state minoring on peer computing devices. In particular, the system may identify and select a computing device containing a configuration file to be protected by the system. The system may then store various portions of the configuration file across a plurality of trusted peer computing devices. Once the baseline values for the configuration file have been established, the system may, upon detecting any unintentional or unauthorized changes to the configuration file, initiate a reconstruction process to restore the configuration file to its baseline values. In this way, the system provides a way to maintain the integrity of protected configuration files of computing devices within the network.
Changing Storage Volume Ownership Using Cache Memory
A method, a computing device, and a non-transitory machine-readable medium for changing ownership of a storage volume from a first controller to a second controller without flushing data, is provided. In the system, the first controller is associated with a first DRAM cache comprising a primary partition that stores data associated with the first controller and a mirror partition that stores data associated with the second controller. The second controller in the system is associated with a second DRAM cache comprising a primary partition that stores data associated with the second controller and the mirror partition associated with the first controller. Further, the mirror partition in the second DRAM cache stores a copy of a data in the primary partition of the first DRAM cache and the mirror partition in the first DRAM cache stores a copy of a data in the primary partition of the second DRAM cache.
Communicating health status when a management console is unavailable for a server in a mirror storage environment
Provided are a computer program product, system, and method for communicating health status when a management console is unavailable for a server in a mirror storage environment. A determination at a first server is made that a management console is unavailable over the console network. The first server determines a health status at the first server and the first storage in response to determining that the management console cannot be reached over the console network. The health status indicates whether there are errors or no errors at the first server and the first storage. The first server transmits the determined health status to the second server over a mirroring network mirroring data between the first storage and a second storage managed by the second server. The determined health status is forwarded to an administrator.
Method and system to perform non-intrusive online disk firmware upgrades
Embodiments are directed to a method of online storage device firmware upgrades by suspending input/output (I/O) operations to the storage device upon notification of a firmware upgrade to the storage device, maintaining a stripe log that contains data stripes updated by I/O operations issued to the storage device during suspension of the storage device, triggering the firmware upgrade to the storage device while the storage device is in suspension, reactivating the disk and new firmware upon completion of the firmware upgrade, and reconstructing the updated data stripes from the stripe log on the storage device after the reactivating step.
ONLINE DISK ENCRYPTION USING MIRROR DRIVER
Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.
Data Cloning System and Process
A data cloning system and process is disclosed. A device receives files via a network from a remotely disposed computing device and partitions the received files into data objects. The device creates hash values for the data objects and stores the data objects on remotely disposed storage systems at location addresses. The device stores in records of a storage table, for each of the data objects, the hash values and corresponding location addresses. The device receives an indication to clone a portion of the received files and performs the clone operation by storing in records of a second storage table, a key for each cloned file referring to the same set of hash values and location addresses as the corresponding original file. This has the effect of cloning the original received files without needing to copy the corresponding data objects.
External dynamic virtual machine synchronization
Embodiments disclosed herein include systems and processes for replicating one or more user computing systems of an information management system at an external resource system to create a backup or fallback of the user computing systems. Replicating the user computing systems may include replicating data as well as the applications, operating systems and configuration of the user computing systems. This replicated or fallback user computing system may be implemented on a virtual machine at the external resource system. Thus, if a user computing system becomes inaccessible, a new user computing system can be generated based on the backup copy of the user computing system at the external resource system. Further, in some embodiments, the copy of the user computing system may be interacted with at the external resource system. Thus, certain embodiments disclosed herein can be used to transition an information management system to an external resource system.