Abstract:
Disclosed is a system, method, and program for distributing computer software from a first computer system. The first computer system receives a request for software from a second computer system. In response, the first computer system generates a message, encrypts the generated message, and transmits the encrypted message to the second computer system. The first computer system later receives an encrypted response from the second computer system and processes the encrypted response to determine whether the second computer system is authorized to access the software. The second computer system is permitted access to the software after determining that the second computer system is authorized to access the software. To access the computer software with the second computer system, the second computer system transmits a request for the software to the first computer system. The second computer system receives an encrypted message from the first computer system and processes the encrypted message to generate a response message. The response message is transmitted to the first computer system. In response, the second computer system is permitted access to the requested software.
Abstract:
Techniques are provided for resolving a collision between two copy services. A policy associated with a new copy service request is retrieved. Characteristics of an existing copy service request are determined. The effects of the new copy service request are determined. A resolution for the collision is identified based on the policy, the determined characteristics, and the determined effects.
Abstract:
Provided are a method, system, and article of manufacture for copying storage, wherein a first unit receives data updates from a second unit. The data updates are stored in a plurality of physical storage locations associated with the first unit. Links are generated to at least one of the plurality of physical storage locations to achieve consistent data between the first unit and the second unit.
Abstract:
Provided are a method, system, and program for processing a transaction. Transaction data is transmitted from one primary storage site to a plurality of secondary storage sites. A transaction request is received at one secondary storage site and processed to include transaction data from the secondary storage site that was transmitted from the primary storage site. The processed transaction request including transaction data is transmitted from the secondary storage site to the primary storage site to approve the transaction. The transaction request at the primary storage site is approved if the transaction data included in the received transaction request is consistent with the transaction data maintained at the primary storage site.
Abstract:
Techniques are provided for locating data. Mapping information for blocks associated with a file is provided. It is determined that a copy service has copied source blocks to target blocks. It is determined whether the mapping information should be updated to refer to the target blocks. Then, updated mapping information is provided in response to determining that the mapping information should be updated to refer to the target blocks. Techniques are also provided for accessing a copy of data when a source of the data is inaccessible. It is determined that source blocks are unavailable. Target blocks that are a copy of the unavailable source blocks are located using data in a metadata store. Indicators pointing to the source blocks are switched to point to the target blocks. Mapping information is updated at one or more client computers to access the target blocks instead of the source blocks.
Abstract:
Techniques are provided for processing a request. When the request is to read a data unit, information regarding the closest physical block locations is returned. When the request is to write to the data unit, information regarding one or more source block locations is returned, wherein the write is applied to one or more source blocks of the data unit. When a number of requests for the data unit exceed a threshold level and at least one quality of a service policy is not being met, a copy of the one or more source blocks of the data unit is created at a location selected based on proximity to at least one client computer from which the number of requests are high.
Abstract:
A computer program for automatically pairing target resources 20 such as volumes or logical units to source resources 20 containing data to be copied. Available target pools 48, 50, 52, 54 of target volumes are determined eligible for copying based on a technical compatibility and a user-defined metric such as recovery point or recovery time. User defined metrics and a policy to implement the metrics may be stored in a medium and selected by a user. The source volumes are prioritized, and progressively larger segments of the eligible target pools are searched for a target volume that satisfies the technical compatibility and user-defined metric. Where subgroups such as nested volumes are present in the source volumes, subgroups are also prioritized for searching. Where no target volume can be paired, the corresponding source volume is marked as processed and a search begins for the next source volume. An output report includes pairings of source to target volumes and source volumes for which no pairing was made.
Abstract:
An apparatus, system, and method are disclosed for continuously protecting data. A mirror module mirrors a primary record set to a base record set. A log module accumulates each record change to the primary record set in a log. A change selection module selects a record change from the log. A change application module applies the selected record change to the base record set to form a recovered record set.
Abstract:
Provider are a method, system, and program for maintaining data in a distributed computing environment. Data is stored at a primary storage site. A data structure is processed indicating an association of data sets in the stored data, secondary storage sites, and update frequencies. In response to processing the data structure, a determination is made of one of a plurality of secondary storage sites and a determination is made of at least one data set to transmit to the determined secondary storage site at an update frequency. The determined data set is transmitted to the determined secondary storage site according to the update frequency.