Abstract:
A method for data protection includes accepting data for storage from one or more data sources (24). The data is sent for storage in a primary storage device (28) and in a secondary storage device (32). While awaiting an indication of successful storage of the data in the secondary storage device, a record associated with the data is temporarily stored in a disaster-proof storage unit (48) adjacent to the primary storage device. When an event damaging at least some of the data in the primary storage device occurs, the data is reconstructed using the record stored in the disaster-proof storage unit and at least part of the data stored in the secondary storage device.
Abstract:
A data processing method includes receiving data objects for storage by a primary storage device. A first instance of each of at least some of the received data objects is cached in a disaster-proof storage unit. A second instance of each received data object is sent for storage in a secondary storage device.A list of identifiers of the data objects that are cached in the disaster-proof storage unit at a given point in time is sent from the disaster-proof storage unit to the secondary storage device. Following an event that renders at least some of the data objects on the primary storage device inaccessible, a request sent to the secondary storage device to access a given data object is received. A selection is made, responsively to the list, to serve the cached first instance or the stored second instance of the given data object in response to the request.
Abstract:
A computer is disclosed having a semiconductor memory; a disk data storage device of the type which automatically switches to a low power consumption mode when disk access is not required; and means for associating an application program with a plurality of data files which are usable by the application. The computer is arranged to load the plurality of data files from the disk data storage device into the semiconductor memory before use of the application and to save at least any modified ones of the plurality of files back to the disk data storage device after use of the application. In this way, access to the disk data storage device is not required during use of the application program, thereby reducing power consumption of the device.
Abstract:
A method is provided for accessing data in an external virtual memory. A host receives from a storage manager a created handle for autonomous access of a volume. The volume forms part of accessible volumes in the virtual memory. The host autonomously provisions the handle to a selected volume from among the accessible volumes, and the host accesses the selected volume through the handle.
Abstract:
A storage device includes a memory and a wireless transmitter, both contained in a disaster-proof enclosure. The memory is configured to receive and store data, and the wireless transmitter is coupled to read and transmit the data from the memory. The disaster-proof enclosure is surrounded by a thermally-insulating layer, and is configured to protect the memory and the transmitter from environmental conditions caused by a disaster event, such that the memory and the wireless transmitter remain functional during and after the disaster event and the transmitter is able to transmit at least a portion of the data to a receiver from within the disaster-proof enclosure after the disaster event.
Abstract:
A recovery unit (90) for recovering data, including an antenna (102) and a first wireless transceiver (100). The first wireless transceiver is configured to communicate via the antenna only with a second wireless transceiver (76) of a storage unit (48) that holds records associated with the data. When an event damaging at least some of the data occurs and the recovery unit is brought into proximity with the storage unit, the recovery unit receives the records from the storage unit for recovery of the data.
Abstract:
There are provided a storage system, storage control unit and method of operating thereof. A storage system comprises a permanent storage subsystem comprising a first cache memory and a non-volatile storage medium, and a storage control unit operatively coupled to said subsystem and to a second cache memory operable to cache “dirty” data pending to be written to the permanent storage subsystem and to enable, responsive to at least one command by the control storage unit, destaging said “dirty” data or part thereof to the permanent storage subsystem. The storage control unit is operable to determine achievement of a “writing criterion”, to provide, upon achieving, at least one command to the permanent storage subsystem requiring flushing destaged data or part thereof from the first cache memory to the non-volatile storage medium, and to provide at least one command to the second cache memory requiring reclassification of the “washed” data or a respective part thereof into the “clean” data, wherein the storage control unit is further operable to configure the “writing criterion” responsive to indicating one or more predefined events during an operation of the storage system.
Abstract:
A network appliance (40) includes a processor (48) and a Host Bus Adapter (HBA-44). The processor is configured to execute storage commands in one or more storage devices (28A, 28B). The HBA is coupled to a network (32) so as to receive communication frames sent over the network to the network appliance, and is configured to filter the received communication frames so as to pass through to the processor only a subset of the received communication frames, which correspond to the storage commands that have been sent by one or more applications for processing by the network appliance.
Abstract:
A system of managing remote resources that includes a local storage associated with a local storage manager constituting a local storage system. A remote storage associated with a remote storage manager constituting a local storage system. The local storage system is associated with a remote storage system by means of a first link. The local storage system is configured to send through the first link I/O remote commands complying with the SCSI protocol, for execution in the remote storage system. The system includes a second link associating the local storage system and the remote storage system. The local storage manager being responsive to remote storage management commands and being configured to send through the second link corresponding cross-storage-remote management commands that comply with the SCSI protocol, for execution in the remote storage.
Abstract:
A method for data protection includes accepting data for storage from one or more data sources (24). The data is sent for storage in a primary storage device (28) and in a secondary storage device (32). While awaiting an indication of successful storage of the data in the secondary storage device, a record associated with the data is temporarily stored in a disaster-proof storage unit (48) adjacent to the primary storage device. When an event damaging at least some of the data in the primary storage device occurs, the data is reconstructed using the record stored in the disaster-proof storage unit and at least part of the data stored in the secondary storage device.