4565 patents
Page 86 of 229
Utility
Techniques for data migration
22 Mar 22
Techniques for data migration may include: copying data of a source logical device of a source system to a target logical device of a target system; during said copying, receiving at the target system an I/O operation directed to a logical address of the target logical device and intercepting the I/O operation on the target system; determining, on the target system, to request from the source system a data page stored at the logical address; responsive to determining to request the data page stored, performing processing including: issuing a request to the source system for the data page stored at the logical address; and responsive to receiving said request, sending information from the source system to the target system, wherein the information includes the data page stored at the logical address and additional logical addresses of the source logical device at which the data page is stored.
Anton Kucherov, David Meiri
Filed: 13 Mar 20
Utility
Method, device, and computer program for migrating backup system
22 Mar 22
The present disclosure relates to a method, a device, and a computer program for migrating a backup system.
Yuting Zhang, Kaikai Jia
Filed: 30 Jun 20
Utility
Storage volume migration scheduling based on storage volume priorities and specified constraints
22 Mar 22
Techniques are provided for scheduling storage volume migrations based on storage volume priorities and specified constraints.
Gil Ben Zeev, Evgeny Katz, Zeev Shusterman, Tamir Segev, Lior Oded Bahat, Nir Brifman, Itai Rosenblatt
Filed: 26 Mar 20
Utility
Verified write command in active-active replication
22 Mar 22
A method is provided, comprising: receiving, at a first storage array, a first request to perform an atomic write operation at a specified address in a volume; placing a read-write lock on a first instance of the volume, and executing the atomic write operation on the first instance of the volume; transmitting, to a second storage array, a second request to perform the atomic write operation on a second instance of the volume; and detecting whether an error condition is present that is associated with the second request; when the error condition is present, comparing a first data item that is stored at the specified address in the first instance of the volume with a second data item that is stored at the specified address in the second instance of the volume, and, when the first data item matches the second data item, transmitting an acknowledgment.
David Meiri, Xiangping Chen
Filed: 23 Sep 20
Utility
Shared memory management
22 Mar 22
Techniques for memory management may include: allocating, from an allocation pool, buffers for logs used by processing cores; recording messages in the logs for the processing cores; responsive to filling a first buffer included in a first log used to record messages for a first of the plurality of processing cores, allocating a second buffer of the allocation pool for the first log; adding the second buffer to the first list of buffers for the first log; and adding the first buffer, that is included in the first list for the first log, to the allocation pool, wherein after adding the first buffer to the allocation pool, the first buffer is included in the first list of buffers for the first log and also included in the allocation pool.
Gabriel Hershkovitz, Arieh Don, Michael R. Barber
Filed: 21 Nov 19
Utility
System and method for resolving error messages in an error message repository
22 Mar 22
A method for managing error messages includes obtaining, by a message resolution manager, a plurality of error messages, performing an error message consecutive deduplication on the plurality of error messages to obtain a plurality of deduplicated error messages, generating a plurality of message sequences using the plurality deduplicated error messages, applying a message sequence frequency algorithm to the plurality of message sequences to obtain a high severity message sequence list, and initiating an error message resolution on at least one message sequence specified in the high severity message sequence list.
Ramakanth Kanagovi, Ankur Gupta, Aurosikha
Filed: 14 Aug 20
Utility
Method and system for data integrity
22 Mar 22
A method is used in ensuring data integrity in data storage.
Xinlei Xu, Yousheng Liu, Philippe Armangau, Vamsi K Vankamamidi, Jian Gao
Filed: 14 Jan 20
Utility
Method, device and computer program product for managing storage system
22 Mar 22
Embodiments of the present disclosure relate to a method, device and a computer program product for managing a storage system.
Jian Gao, Geng Han, Jamin Jianbin Kang, Hongpo Gao, Shaoqin Gong
Filed: 28 Jun 18
Utility
Managing mapped raid extents in data storage systems
22 Mar 22
A technique for use in managing mapped RAID extents is disclosed.
Jian Gao, Ilya Usvyatsky, Weihua Li, Geng Han, Xinlei Xu, Jibing Dong
Filed: 2 Oct 19
Utility
Dynamic snapshot backup in multi-cloud environment
22 Mar 22
A technique for backing up snapshots in a multi-cloud environment includes accessing multiple cloud storage providers and obtaining therefrom respective sets of storage performance data.
Qi Jin, Xuan Tang
Filed: 15 Jan 20
Utility
Remote data forwarding using a nocopy clone of a production volume
22 Mar 22
A remote data facility includes a primary storage volume on a first storage system mirrored to a backup storage volume on a second storage system.
Akshay Kumar Srivastava, Sandeep Chandrashekhara, Michael Ferrari, Deepak Vokaliga, Darren Fernandes
Filed: 30 Jan 20
Utility
System and method for backup generation for deployments
22 Mar 22
A backup manager for providing backup services includes storage and a backup orchestrator.
Sonali Sengupta, Amarendra Behera, Sunil Yadav, Shelesh Chopra, Sapna Chauhan
Filed: 18 Oct 19
Utility
System and method for performing an incremental backup for a persistent storage system that stores data for a node cluster
22 Mar 22
A method for managing a persistent storage system includes obtaining, by a first node in a node cluster, a write request, wherein the node cluster comprises the first node and a second node, processing the write request, storing data associated with the write request in a persistent storage system, updating a block-based change list based on the storing, making a first determination that a synchronization schedule is triggered, and in response to the first determination: initiating a block-based change list synchronization to the second node.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 28 May 20
Utility
2-phase sync replication recovery to optimize recovery point objective (RPO)
22 Mar 22
A method for use in a storage system disclosed, comprising: transitioning the storage system into a first state, the first state including a state in which a source system performs synchronous replication to a target system; detecting a first event while the source system is in the first state; in response to the first event, transitioning the storage system from the first state into a second state, the second state being a state in which the source system performs asynchronous replication; detecting a second event while the storage system is in the second state, transitioning the source system from the second state into a third state, the third state including a state in which the source system performs both synchronous replication and asynchronous replication.
Xiangping Chen, Svetlana Kronrod
Filed: 3 Oct 19
Utility
Disaster recovery specific configurations, management, and application
22 Mar 22
A mechanism for disaster recovery configurations and management in virtual tape applications.
Mikhail Tolstoy, Roman Kupriyanov, Karyn Kelley, Larry McCloskey, Igor Matveevskiy
Filed: 19 Nov 19
Utility
Method, apparatus and computer program product for managing I/O operation using prediction model to predict storage area to be accessed
22 Mar 22
Techniques manage an input/output (I/O) operation.
Lifeng Yang, Ruiyong Jia, Xinlei Xu, Yousheng Liu, Jian Gao
Filed: 12 Sep 19
Utility
Method, device, and computer program product for managing data transfer
22 Mar 22
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing data transfer.
Shuguang Gong, Long Wang, Tao Chen, Bing Liu
Filed: 7 Oct 20
Utility
Method, device and computer program product for data migration
22 Mar 22
The present disclosure provides a solution for migrating data.
Yi Wang, Lei Wang, Qingxiao Zheng, Yongsheng Guo, Haitao Li, Jingrong Zhao
Filed: 17 Jan 19
Utility
Namespace performance acceleration by selective SSD caching
22 Mar 22
In one example, a method includes receiving metadata in the form of a modification to metadata represented by a file system namespace abstraction, wherein the file system namespace abstraction corresponds to less than an entire file system namespace, and the file system namespace abstraction includes one or more pages, and one of the pages corresponds to a particular cached block, updating the file system namespace abstraction based on the received metadata, determining if caching is enabled for the file system namespace abstraction, when caching is enabled for the file system namespace abstraction, caching the updated file system namespace abstraction in SSD storage that includes the cached block, and maintaining a status of the cached block in a Dtable of the SSD storage.
Murthy Mamidi, George Mathew, Pengju Shang
Filed: 2 Jan 20
Utility
Deadlock-free locking for consistent and concurrent server-side file operations in file systems
22 Mar 22
A request is received to copy a file from a source to a target in a file system.
Nishesh Gupta, Julio Lopez
Filed: 19 Aug 19