G06F2201/855

Systems and methods for online brand continuity

The present disclosure provides a system and method for online brand continuity. Online brand continuity can include a number of Internet or intranet access points via which one or more network addresses can be advertised. A client can be provided with availability of a business image application via at least one of the Internet or intranet access points.

Storage system and method of creating backup of storage system
09846555 · 2017-12-19 · ·

According to the present invention, a process that requires for creating a backup at a designated time point is executed by sharing among a plurality of storage control apparatuses. An intermediate storage apparatus 2 reads journal data and a JNCB from a primary storage apparatus 1, and stores the journal data and the JNCB in an intermediate journal volume 28. A secondary storage apparatus 3 reads the journal data and the JNCB from the intermediate storage apparatus 2, and stores the journal data and the JNCB in a secondary journal volume 38. After the secondary storage apparatus 3 having a designated generation restores the journal data up to a designated time point into a secondary data volume 37, the secondary storage apparatus 3 splits a copy pair. Another secondary storage apparatus 3 executes a regular restoring process.

Maintaining point-in-time granularity for backup snapshots
09846698 · 2017-12-19 · ·

A method and system for maintaining granular backups is discussed. Backup windows may be defined, and policies may be associated with those windows. Journal and backup files may be retained or deleted in accordance with those policies.

Systems and methods for adding active volumes to existing replication configurations
09836515 · 2017-12-05 · ·

A computer-implemented method for adding active volumes to existing replication configurations may include (1) identifying a new volume to be added to an existing replication configuration that replicates a plurality of volumes to a remote storage device, (2) using interchangeable bitmaps to perform an initial synchronization of the new volume with the remote storage device before replicating the new volume to the remote storage device as part of the existing replication configuration, (3) determining that a replication log associated with the replication configuration is capable of flagging future writes by the application to the new volume without overflowing, and, upon making that determination, (4) replicating the new volume to the remote storage device as part of the existing replication configuration. Various other methods, systems, and computer-readable media are also disclosed.

Optimized copy algorithm selection

A method for increasing the efficiency of copying data is disclosed. In one embodiment, such a method includes receiving a request to copy data from a first location to a second location. The method determines an original copy algorithm associated with the request and determines whether the original copy algorithm is the best copy algorithm available to copy the data. If the original copy algorithm is the best copy algorithm, the method uses the original copy algorithm to copy the data. If, however, the original copy algorithm is not the best copy algorithm available, the method substitutes a more efficient copy algorithm for the original copy algorithm. In certain embodiments, this may be accomplished by looking in a prioritized list of copy algorithms and selecting a more efficient copy algorithm from the list. A corresponding system and computer program product are also disclosed.

Replication based security

A method, system, and computer program product for intercepting IO to a virtual machine file system by a storage based splitter, replicating, via a replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system, and periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor.

CO-LOCATED JOURNALING AND DATA STORAGE FOR WRITE REQUESTS

A method and system for co-locating journaling and data storage based on write requests. A write request that includes metadata and data is received from a client. A logical storage unit for storing the metadata and the data is identified. The logical storage unit is divided into a journal partition and a volume partition. The journal partition includes a first log and a second log. Which of the first log and the second log is an active log and which of the first log and the second log is an inactive log are identified. The metadata is recorded in a first location in the active log and the data is recorded in a second location in the active log during a single I/O operation. A reply is sent to the client after the metadata and the data are recorded in the journal partition.

Packet-based differential backup of network-attached storage device content

A method and system for performing incremental backup of a network attached storage (NAS) device are described. A storage capture instance associated with a first time instance is received from a network attached storage device. At least a portion of metadata of tracked network packets associated with the network attached storage device is also received. At least one changed content item of the network attached storage device that has changed since the first time instance is identified by analyzing the at least the portion of the metadata of the tracked network packets received. An incremental backup of the network attached storage device is performed at a second time instance based at least in part on the at least one changed content item identified.

Mirroring device, control method thereof, and storage medium that maintain difference in remaining writable amounts of data
09779001 · 2017-10-03 · ·

A mirroring device that can improve, even when two storage devices to which an upper limit is set for the number of rewrites of data are used, the fault tolerance of the mirroring device while preventing one of the storage devices from reaching the lifetime thereof early. A mirroring device comprises two storage devices to which an upper limit is set for the number of rewrites of data. Remaining writable amounts of the data in the storage devices are acquired respectively from total amounts of the data written in the respective storage devices. When it is determined that a difference between the respective acquired remaining writable amounts is less than a predetermined value, the respective storage devices are controlled such that the difference becomes equal to or more than the predetermined value.

Application level support for selectively accessing files in cloud-based storage
09753814 · 2017-09-05 · ·

In one example, a method is provided for backing up client data at a datacenter. Initially, an incremental backup is received from a client and stored at the datacenter. Next, a table of contents for the incremental backup is created, and differences identified between the incremental backup and a dataset previously stored at the datacenter. The offsets imposed by any new or modified blocks present in the incremental backup can then be identified and recorded, and used to identify respective data ranges in the incremental backup for any new and modified blocks, which data ranges can then be recorded. Next, a reference block can be created for each block of the previously stored dataset that was not modified in the incremental backup. The reference block can then be stored at the datacenter in association with the incremental backup.