摘要:
Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
摘要:
Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
摘要:
The invention provides a method, apparatus and system for reducing power consumption involving data storage devices. One embodiment involves storing data in a first memory; in response to the first memory exceeding a first threshold, migrating the data from the first memory to a second memory; in response to the second memory exceeding a second threshold, then activating a third memory if the third memory is in active; and in response to the second memory exceeding a third threshold greater than the second threshold, migrating the data from the second memory to a third memory; wherein the second memory is sized and configured to store data targeted for the third memory to intelligently maintain a portion of the third memory in an inactive state.
摘要:
A method, system, and article are provided for processing solicited electronic mail messages responsive to a set of rules. Each received message is processed through the rules to determine if it meets at least one protocol in the set of rules, wherein the rules pertain to a method of communicating the message to the recipient. Upon a match of the message to at least one rule, the message is conveyed to the recipient in conformance with the rule.
摘要:
Embodiments of the invention relate to co-migration in a shared pool of resources with similarity across data sets of a migrating application. The data sets are processed and profiled. Metadata is reviewed to remove duplicate elements and to distribute the processing load across available nodes. At the same time, a ranking may be assigned to select metadata to support a prioritized migration. Non-duplicate data chunks are migrated across the shared pool of resources responsive to the assigned prioritization.
摘要:
A system to protect data including a processor and a memory coupled to the processor to store instructions executable by a digital processing apparatus. The memory is operable to perform operations to protect stored data. The operations include receiving a write request for a current data input comprising input to be written to at least one monitored region of a storage volume, determining whether the current data input is a complete managed object and whether the current data input completes a previously deferred I/O operation and writing the current data input to a deferred storage device based on the determinations. Therefore, the system writes complete managed objects to the physical disk storage medium.
摘要:
A method, system, and article for resolving a silent error is disclosed. A primary program copy runs on a primary host, and a secondary program copy runs on a secondary host. The primary and secondary copies communicate to maintain synchronized execution. A third copy of the data is stored on a storage device as a write operations log and maintained in memory on the primary host while the program is running. The primary copy is synchronized with the secondary copy by computing a first checksum of data on the primary host in response to a read operation local to the primary host, computing a second checksum of data on the secondary host in response to a read operation local to the secondary host, and periodically communicating the first checksum to the secondary host, and resolving any discrepancies between the first and second checksum of data reflecting a silent data error.
摘要:
A method, system, and article for resolving a silent error is disclosed. A primary program copy runs on a primary host, and a secondary program copy runs on a secondary host. The primary and secondary copies communicate to maintain synchronized execution. A third copy of the data is stored on a storage device as a write operations log and maintained in memory on the primary host while the program is running. The primary copy is synchronized with the secondary copy by computing a first checksum of data on the primary host in response to a read operation local to the primary host, computing a second checksum of data on the secondary host in response to a read operation local to the secondary host, and periodically communicating the first checksum to the secondary host, and resolving any discrepancies between the first and second checksum of data reflecting a silent data error.
摘要:
A system to protect data including a processor and a memory coupled to the processor to store instructions executable by a digital processing apparatus. The memory is operable to perform operations to protect stored data. The operations include receiving a write request for a current data input comprising input to be written to at least one monitored region of a storage volume, determining whether the current data input is a complete managed object and whether the current data input completes a previously deferred I/O operation and writing the current data input to a deferred storage device based on the determinations. Therefore, the system writes complete managed objects to the physical disk storage medium.
摘要:
A method, system, and article are provided for processing solicited electronic mail messages responsive to a set of rules. Each received message is processed through the rules to determine if it meets at least one protocol in the set of rules, wherein the rules pertain to a method of communicating the message to the recipient. Upon a match of the message to at least one rule, the message is conveyed to the recipient in conformance with the rule.