摘要:
A technique is provided to restore a target object such as a volume, directory or a pre-defined collection of files to a particular time by restoring the last full backup embodying the backup target, the last computed cumulative backup embodying the backup target and possibly the incremental backups after the last computed cumulative backup, if there are any that relate to change in the backup target. Restore operations in a bounded amount of time are accommodated by effectively managing the generation of full, incremental and cumulative backup files. Advantageously, the technique may be performed off-line for the analysis, collection and management of backup file subsets for different types of restore operations. Aspects of system restore operations are monitored and analyzed so that in response, off-line management and selection of efficient sets of backup files can be performed to correct inefficiencies that may be detected and to efficiently tailor restore operations to the system characteristics and patterns. If an application has a condition of bounded restore time, a set of cumulative backups may be efficiently tailored to meet the condition of bounded restore time.
摘要:
A method of reducing bandwidth limitations to send events to a set of interested clients within a pre-defined time period as quickly and fairly as possible. The clients can be re-distributed among the servers in a network such that the delay due to server overloading is minimized by moving clients from an overloaded server to a server with available bandwidth. In addition, the latency of client-server communications can be incorporated into an estimation of download times, and the servers can then initiate delivery to respective clients based on those download times. By staggering the send times to account for heterogeneous latencies, more clients can receive the event at the same time, and a fairness of distribution can be achieved.
摘要:
Embodiments provided herein support large messages by formatting at least a portion of the message in the form of a transport stream. More specifically, embodiments provide a SOAP model that can stream an object for a message without loading the entire message into an intermediate buffer. Accordingly, one embodiment supports loading SOAP headers into memory, yet streaming the body. This would allow, for example, large attachments (e.g., a video file) to accompany the SOAP message in the body, while still supporting random access to message headers. Accordingly, embodiments provide a SOAP data model that allows a developer to create an object and specify whether or not portions of the message should be buffered or streamed.
摘要:
A technique is provided whereby a stream of data located in a first storage location is registered for migration administration and according to preset criteria, portion(s) of the stream of data that are suited to another storage location are migrated to maximize system storage efficiencies. The file system may have use of facilities that enable the monitoring of files/streams that have been registered for migration administration or files/streams may be polled according to preset criteria. If the stream of data has portions to migrate to another storage location, the hierarchical storage management (HSM) system migrates the data to the other storage location, such as to long term or off-line storage, and preserves the data relationships of the stream via metadata. The technique allows for multiple volumes to be spanned by the migration target location, and multiple file systems may service the source and target.
摘要:
Fault-recovery information for transactional operations between computer systems and the outcome of those operations is logged at the originating point of the units of work, such as source-computer systems, which may include client computers in a client/server system. By using these distributed logs of fault-recovery information, a target-computer system, which may include a server computer, can reconstruct the target-computer system's previous interaction with various source-computer systems. Source-computer systems may use a proxy server for logging fault-recovery information to persistent storage. A target-computer system may digitally sign the fault-recovery information it sends to a source-computer system thereby making the fault-recovery information's authenticity verifiable. Similarly, the target-computer system may encrypt the fault-recovery information before sending it to the source-computer system to preserve the privacy of the fault-recovery information.
摘要:
A storage management system in which a volume provider incorporates an application programming interface (API) for receiving storage access information that characterizes high-level input/output (I/O) attributes of the storage volume such as intended access patterns, a desired level of fault handling and optimization preferences. The volume provider and the underlying storage devices conform to the specified attributes as best as possible and resolve any conflicts with the communicated attributes. The volume providers monitor the storage volumes and may reconfigure the storage volumes in order to accomplish the desired attributes.
摘要:
A mount manager and supporting data structures enable automatic identification and re-establishment of logical volumes on non-removable storage devices in a computer system across multiple reboots and reconfigurations. The mount manager generates a redirected name for a new logical volume when a unique volume identifier is presented to the mount manager by the operating system. The mount manager stores the unique volume identifier and the associated redirected name in a persistent mount manager data structure The mount manager establishes a symbolic link between the persistent redirected name, which is used by higher layers of the operating system and user applications to address the logical volume, and a non-persistent device name used by the operating system. During the boot process, the mount manager uses the data structure entries identified by the unique volume identifiers of the arriving logical volumes to reconstruct the symbolic links so that references to the redirected name will resolve to the correct non-persistent device name. When the system undergoes physical reconfiguration, the mount manager associates an existing redirected name to a different non-persistent device name if the unique volume identifier is present in the data structure. In this fashion, logical volumes can be removed and restored in the computer without the knowledge of higher layers of the operating system and user applications. Optionally, the mount manager builds an in-memory data structure from the persistent data structure to increase the speed of the identification process.
摘要:
The present invention is directed to systems and methods for hierarchical storage management. A system manager specifies policies used to migrate and recall data from between the local and a remote storage while the system itself is afforded latitude in complying or violating these policies. As a violation of the migration policy, the system of the present invention pre-migrates data from local storage to remote storage prior to the time that a given file will become eligible for migration thereto. During pre-migration, data resides in both local and remote storage. Once the time for migration has arrived, local storage space may be freed bv simply deleting the data stored locally and retaining the data stored remotely. As part of the recall policy, data is delayed from returning to local storage from the remote storage unless an access request or a write command specifically requires that the data be returned. Mechanisms are disclosed to detect if I/O requests that occur after data has been pre-migrated but before the data has been migrated invalidate the pre-migration.
摘要:
A system and method are provided for preserving spacial and temporal locality of sets of related objects when moving the sets within a storage hierarchy via a common server. The appropriate meta data is gathered to track the spacial and temporal locality of the sets of objects being moved within the storage hierarchy and the algorithm uses the meta data to preserve the spacial and temporal locality when moving the objects. A collection of logically clustered data objects is identified. The logical cluster is then moved down through the storage hierarchy together to be stored in less costly storage devices. The logical cluster of data objects is then retrievable more efficiently as a whole when requested.
摘要:
Techniques are described for facilitating performance of tasks involving human review of media data (e.g., images, audio clips, video clips, etc.), such as to identify one or more targets of interest. The media data review may be performed for various reasons, such as to assist in locating one or more target objects in a large geographical area (e.g., one or more missing people or vehicles) based on human review of large quantities of images that each correspond to a small subset of the geographical area. When one or more of the reviewed media data pieces are identified as being relevant, information about those identified media data pieces may be used in various ways. Furthermore, in at least some situations, the media data review may be part of a charitable effort that uses human volunteers to review the media data without monetary payment or other compensation.