Patent classifications
G06F11/1469
Selecting restore processes for applications hosted on storage volumes that are part of group replication sessions
An apparatus comprises a processing device configured to receive a request to restore one or more applications, the request specifying one of a set of remote copies of storage volumes that store data of the applications. The processing device is also configured to analyze the applications to identify (i) the storage volumes storing data for the applications and (ii) groups comprising the identified storage volumes. The processing device is also configured, responsive to determining that the identified groups are part of a group replication session, to select one of a set of different types of restore processes for performing the restore of the applications to the specified remote copy based at least in part on whether the identified groups comprise additional storage volumes other than the identified storage volumes and to perform the restore of the applications to the specified remote copy utilizing the selected restore process.
Dynamic updating of query result displays
Described are methods, systems and computer readable media for dynamic updating of query result displays.
SECURE RESTORE OF A COMPUTING SYSTEM
Examples described herein relate to a method and a system, for example, a restore management system for providing secure restore of computing system. In some examples, the restore management system may determine that the computing system is restored. Further, the restore management system may isolate the computing system by restricting access to the computing system for any data traffic other than data traffic associated with a security fix to be applied to the computing system. Furthermore, the restore management system may determine that the security fix has been successfully applied to the computing system and, in response to determining that the security fix has been successfully applied, the restore management system may remove the computing system from isolation.
METHOD AND SYSTEM FOR PERFORMING DATA PROTECTION SERVICES USING A GROUPED SUBSYSTEM LEVEL FEEDBACK MECHANISM
In general, in one aspect, the invention relates to a method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.
Detecting shingled overwrite errors
Systems and methods are disclosed for detecting shingled overwrite errors. When a read error is encountered when reading from shingled recording tracks, a processor may determine whether the read error is an error caused by shingled overwriting. The processor may determine whether the read error is caused by shingled overwriting by determining read signal quality of one or more sectors preceding the read error, such as based on a bit error count or bit error ratio (BER), and comparing the read signal quality to a threshold value. The processor may determine that the read error is caused by shingled overwriting when the read signal quality value is lower than the threshold.
Database with client-controlled encryption key
A distributed database encrypts a table using a table encryption key protected by a client master encryption key. The encrypted table is replicated among a plurality of nodes of the distributed database. The table encryption key is replicated among the plurality of nodes, and is stored on each node in a respective secure memory. In the event of node failure, a copy of the stored key held by another member of the replication group is used to restore a node to operation. The replication group may continue operation in the event of a revocation of authorization to access the client master encryption key.
Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants
An illustrative data storage management system enables a Tenant to retain control over criteria for protecting the Tenant's data, and hides details of the Service Provider's infrastructure. The Service Provider may have many data centers, each one represented within the system by a Resource Pool with attributes that reflect the infrastructure resources of the corresponding data center. A system analysis, which is triggered by the Tenant's choices for data protection, keys in on a suitable Resource Pool. The system analysis identifies suitable system resources within the Resource Pool and associates them to the data source. Subsequent data protection jobs invoke proper system components based on the associations created by the system analysis. In some embodiments, the system will invoke infrastructure resources created on demand when a data protection job is initiated rather than being pre-existing resources.
System and method for ensuring compliance of protection policy requirements using visual representation of backups
A backup manager for managing backup services includes persistent storage and a backup analyzer. The persistent storage includes a backup data repository and protection policies. The backup analyzer identifies a new backup stored in backup storage; performs a backup compatibility analysis on the new backup to determine inter-backup compatibility of the identified new backup; updates the backup data repository based on the inter-backup compatibility to obtain an updated backup data repository; and modifies a backup schedule using the updated backup data repository to meet a requirement of a protection policy of the protection policies.
Composable edge device platforms
Techniques discussed herein relate to providing composable edge devices. In some embodiments, a user request specifying a set of services to be executed at a cloud-computing edge device may be received by a computing device operated by a cloud computing provider. A manifest may be generated in accordance with the user request. The manifest may specify a configuration for the cloud-computing edge device. Another request can be received specifying the same or a different set of services to be executed at another edge device. Another manifest which specifies the configuration for that edge device may be generated and subsequently used to provision the request set of services on that device. In this manner, manifests can be used to compose the platform to be utilized at any given edge device.
Recreating electronic content
Concepts for recreating electronic content are presented. One example comprises identifying one or more content references in one or more content sources, wherein each of the one or more content references is associated with a content item. The method then comprises, for each of the one or more identified content references, retrieving the associated content item, then normalizing the one or more retrieved content items to obtain one or more normalized content items. The method then comprises recreating electronic content by combining the one or more normalized content items.