摘要:
A method for preserving volatile memory across a computer system disruption includes identifying a set of volatile memory. The set of volatile memory represents a portion of data in volatile memory to preserve during a system disruption. The method includes receiving a system event. The system event indicates that a computer system disruption will occur and that the set of volatile memory is to be written to a stable storage device. The method includes writing the set of volatile memory to the stable storage device to create a stored data set.
摘要:
A method for data storage includes sending write commands to a first storage node (28A), for storing data in a data volume (56A) on the first storage node. In response to a decision to create a copy (56B) of the data volume on a second storage node (28B), (i) the write commands are sent both to the first storage node and to the second storage node, and (ii) a snapshot of the data volume is created and sent from the first storage node to the second storage node. The copy of the data volume is created by the second storage node based on the snapshot and on one or more of the write commands received at the second storage node.
摘要:
The present invention discloses a metadata recovery method and apparatus, relates to the field of data storage, and is used to resolve a problem that virtual data reading fails when both a primary file and a secondary file are damaged. The method includes: searching for a target node, where the target node has been damaged or index information recorded in the target node has been lost; and recovering the index information in the target node according to index information recorded in a related node, where the related node includes a parent node and a child node that are of the target node and an adjacent node belonging to a same layer as the node, and the index information includes brother index information pointing to the adjacent node belonging to the same layer as the node, parent index information pointing to the parent node of the node, and child index information pointing to the child node of the node. The present invention is mainly applied to a process of virtual data recovery.
摘要:
Embodiments manage data transfer requests representing backup operations and update operations from a computing device using a centralized data transfer service. The data transfer service selects the data transfer requests for performance based at least on data usage statistics associated with a data usage plan and available network connections on the computing device. For the backup operations, the data transfer requests are also selected based on priority information associated with each of the backup operations. In some embodiments, the data transfer service selects and initiates the data transfer requests without incurring excess data transfer costs for the user.
摘要:
Apparatus and method of storing, retrieving, transmitting and receiving data comprising a) separating the data into a plurality of data elements, b) matching the position of each data element according to its position in the data with a storage location, c) storing each data element at its matched storage location, d) generating parity data from groups of data elements such that any one or more of the data elements within a group may be recreated from the remaining data elements within the group and the parity data for that group, e) generating further parity data from further groups of data elements formed from the same data elements used in step d) in different combinations and f) storing the parity data and further parity data in separate storage locations.
摘要:
High-performance, enterprise-level data protection system and method provides efficient block level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an "An Enterprise Image Destination" (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing "Fast Application Restore" (FAR) with the use of the invention are also provided.
摘要:
To provide a semiconductor device that can predict wear-out failure with high accuracy based on an accumulated value of degradation stress, such as a power-source voltage or an environmental temperature, imposed to the semiconductor device, the semiconductor device includes a first circuit that holds a first accumulated degradation stress count value, a second circuit that holds a second accumulated degradation stress count value, a third circuit that holds a count value of an accumulated operating time or a value corresponding thereto, and a fourth circuit or an operating unit that receives the first accumulated degradation stress count value, the second accumulated degradation stress count value, and the count value of the accumulated operating time or the value corresponding to the value of the accumulated operating time.
摘要:
Provided is a method of securing a safe state of a vehicle transmission and avoiding deterioration of drivability without restricting a function of the vehicle transmission when a ROM failure is detected in a controller for a vehicle transmission. A software program is duplicated in a unit of control with identical contents, and when a ROM failure is detected, same control as a normal operation is performed by alternative control of control at the ROM failure site.
摘要:
Image forming apparatus 1 that shortens warm-up time is provided. Accordingly, image forming apparatus 1 is an asymmetrical multiprocessing configuration provided with auxiliary memory part 21 shared between main control part 10 and sub control part 11. Use area 300 is an area accessed by main control part 10. Use area 301 is an area accessed by sub control part 11. Use area specifying part 100 specifies for use area 300 and use area specifying part 101 specifies for use area 301, respectively, by use area specifying table 210. Defective area table making part 110 makes defective area table 200 by searching whether or not a defective area only for use area 300 and set as a defective area for the other area. Defective area table making part 111 makes defective area table 201 by searching use area 301, similarly, and set as the defective area for the other area.