Abstract:
Disclosed is a data processing and/or storage system. The data processing and/or storage system includes at least two interfaces, wherein each of the at least two interfaces includes a non-dedicated communication port for communicating data to and form external data systems or clients based on a rule base.
Abstract:
Exemplary embodiments provide techniques of managing storage systems including remote copy systems and improving the manageability by automating complicated operations. In one embodiment, a computer comprises a memory and a controller. The controller is operable to: manage a virtual volume to be provided for a server; manage a plurality of logical volumes provided from a plurality of storage systems; manage a condition to be required of the virtual volume, the condition relating to a location in which data to be sent to the virtual volume is stored; manage location information of each of the plurality of logical volumes, the location information of a logical volume being defined based on a location of the logical volume; and control to map the virtual volume to a logical volume of the plurality of logical volumes, based on the condition of the virtual volume and the location information of the logical volumes.
Abstract:
An “erasure code” is an encoding of multiple different sets of data. Redundant copies of data are maintained in such erasure codes, thereby utilizing only a fraction of the storage capacity of unencoded copies. Erasure codes are efficiently generated, with a minimum of processing resources utilizing XOR functionality. Additionally, erasure codes are generated from local data, thereby avoiding the consumption of network resources. At least one unencoded copy of a set of data is maintained, while the remaining, redundant copies are encoded into erasure codes. Requests for data are provided from the unencoded copy. Should it fail, a new unencoded copy can be generated by another computing device having access to both an erasure code as well as unencoded copies of the other data that was also pressed into that erasure code. Multiple failures can be survived through recursive application of such a decoding of encoded data.
Abstract:
The invention relates to apparatus for managing data swap in a migration of virtual memory data of a virtual machine. In one embodiment, an apparatus comprises a receiving unit configured to receive a migration instruction and the second site information; a copying unit configured to copy memory data to a sub-logical unit in the first storage device; and a notifying unit configured to send a notification to instruct the second host to read the memory data from a mirror logical unit of a sub-logical unit in the second storage device. The apparatus modifies a mirror direction between the first and second storage devices and modifies a path table related to the first and second storage devices. Data of the virtual machine can be migrated and swapped in a metro mirror manner, thereby the virtual machine data can be migrated across sites without affecting system operation.
Abstract:
A system implements a method to non-disruptive restoration of storage services provided by a storage volume of the system. Upon detecting a disruption of storage services at the storage volume, the method freezes the input/output (I/O) operations of applications that are accessing the storage volume. The disrupted storage services are restored. And the configurations of the storage volume are maintained during restoration of the disrupted storage services. Afterward, the frozen I/O operations are activated, allowing the applications to continue their accessing of the storage volume.
Abstract:
In a storage system, at least three storage sites are arranged in a full mirroring relationship using a virtual connection between instances of a storage group on two of the sites whereby no user data is transmitted.
Abstract:
In one aspect of the present description, handling multiple backup processes comprises detecting that a defined storage volume is present in a first cascade of storage volumes; detecting that the defined storage volume is present in a second cascade of storage volumes; receiving a data write for a last storage volume in the first cascade of storage volumes; and performing a cleaning data write on the defined storage volume in the second cascade of storage volumes, wherein the cleaning data write corresponds to the received data write. Other aspects may be utilized, depending upon the particular application.
Abstract:
Methods, systems, and configured storage media are provided for flexible data mirroring. In particular, the invention provides many-to-one data mirroring, including mirroring from local servers running the same or different operating systems and/or file systems at two or more geographically dispersed locations. The invention also provides one-to-many data mirroring, mirroring with or without a dedicated private telecommunications link, and mirroring with or without a dedicated server or another server at the destination(s) to assist the remote mirroring unit(s). In addition, the invention provides flexibility by permitting the use of various combinations of one or more external storage units and/or RAID units to hold mirrored data. Spoofing, SCSI and other bus emulations, and further tools and techniques are used in various embodiments of the invention.
Abstract:
Apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second memory to the first memory, and the copied software stack is executed by the first computer.
Abstract:
A data storage system can scan one or more information stores of primary storage and analyze the metadata of files stored in the one or more information stores of primary storage to identify multiple, possibly relevant, secondary copy operations that can be performed on the files. The storage system can also identify primary storage usage information of each file during the scan and use that information to generate reports regarding the usage of the primary storage.