会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Techniques for non-disruptive transitioning of CDP/R services
    • CDP / R服务的非破坏性转换技术
    • US08825870B1
    • 2014-09-02
    • US11771608
    • 2007-06-29
    • Deepak TawriAbhay Kumar SinghRaghu KrishnamurthyGopal Sharma
    • Deepak TawriAbhay Kumar SinghRaghu KrishnamurthyGopal Sharma
    • G06F15/16G06F15/173G06F15/177G06F15/167G06F12/00
    • H04L12/56
    • Techniques for CDP/R services are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method of transitioning continuous data protection and replication comprising determining whether a first appliance node connected to a switched fabric contains one or more transactions received from a host node, unregistering a world wide port name of a target port of the first appliance node, registering the world wide port name to a target port of a second appliance node connected to the switched fabric, associating one or more logical unit numbers of the second appliance node with the target port of the second appliance node, exporting the one or more logical unit numbers of the second appliance node, logging the target port of the second appliance node into a switched fabric, and logging the target port of the second appliance node into a remote node port of the host node.
    • 公开了CDP / R服务的技术。 在一个特定的示例性实施例中,可以将技术实现为转换连续数据保护和复制的方法,包括确定连接到交换结构的第一设备节点是否包含从主机节点接收的一个或多个事务,注销全球端口名称 将所述全球端口名称注册到连接到所述交换结构的第二设备节点的目标端口,将所述第二设备节点的一个或多个逻辑单元号与所述第二设备节点的目标端口相关联 导出第二设备节点的一个或多个逻辑单元号,将第二设备节点的目标端口记录到交换结构中,以及将第二设备节点的目标端口记录到主机节点的远程节点端口中 。
    • 2. 发明授权
    • Techniques for reducing data storage needs using CDP/R
    • 使用CDP / R减少数据存储需求的技术
    • US08082406B1
    • 2011-12-20
    • US11862932
    • 2007-09-27
    • Abhay Kumar SinghRaghu KrishnamurthyGopal SharmaDeepak Tawri
    • Abhay Kumar SinghRaghu KrishnamurthyGopal SharmaDeepak Tawri
    • G06F13/00G06F13/28
    • G06F11/2094G06F3/0608G06F3/065G06F3/067G06F11/1471G06F11/2048G06F2201/84
    • Techniques for reducing data storage needs using continuous data protection and replication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for reducing data storage needs using a continuous data protection and replication device comprising creating a master image of material identified by a user, generating a virtual replica of the master image on a storage area network using the continuous data protection and replication device to virtualize physical storage containing the master image, generating a copy of the virtual replica on the storage area network, and providing a virtual logical unit number to access the copy, wherein the access enables a process which requires exclusive access to content of the master image to obtain such access without requiring physical storage for an entire copy of the master image.
    • 公开了使用连续数据保护和复制来减少数据存储需求的技术。 在一个特定的示例性实施例中,这些技术可以被实现为用于使用连续数据保护和复制设备来减少数据存储需求的方法,包括创建由用户标识的材料的主图像,在存储器上生成主图像的虚拟副本 使用所述连续数据保护和复制设备对包含所述主映像的物理存储进行虚拟化,在所述存储区域网络上生成所述虚拟副本的副本,以及提供虚拟逻辑单元号码以访问所述副本,其中所述访问启用进程 这需要对主图像的内容的独占访问以获得这种访问,而不需要主图像的整个副本的物理存储。
    • 8. 发明授权
    • System and method for performing consistent resynchronization between synchronized copies
    • 在同步副本之间执行一致的重新同步的系统和方法
    • US07979396B1
    • 2011-07-12
    • US11167954
    • 2005-06-28
    • Raghu KrishnamurthyArvind Arun PandeDeepak Tawri
    • Raghu KrishnamurthyArvind Arun PandeDeepak Tawri
    • G06F7/00G06F17/00
    • G06F17/30575
    • A method involves detecting that a first storage device is inaccessible. The information stored on the first storage device is a synchronized copy of information stored on a second storage device. In response to detecting that the first storage device is inaccessible, modification logging is initiated. Modification logging involves detecting modifications to information stored on the second storage device and storing information that indicates an order in which the modifications occur to the second storage device. The stored information can indicate the order explicitly (e.g., by including a timestamp or sequence number) or indirectly (e.g., the order of entries stored in a log can indicate the order of the modifications represented by those entries). The stored information can also include the new values generated by the modifications. The stored information can then be used to resynchronize the information stored on the first and second storage devices.
    • 一种方法涉及检测第一存储设备是不可访问的。 存储在第一存储设备上的信息是存储在第二存储设备上的信息的同步副本。 响应于检测到第一存储设备不可访问,修改日志记录被启动。 修改日志记录包括检测对存储在第二存储设备上的信息的修改,并且存储指示修改发生到第二存储设备的顺序的信息。 存储的信息可以明确地指示订单(例如,通过包括时间戳或序列号)或间接地(例如,存储在日志中的条目的顺序可以指示由这些条目表示的修改的顺序)。 存储的信息还可以包括由修改生成的新值。 所存储的信息然后可用于重新同步存储在第一和第二存储设备上的信息。
    • 9. 发明授权
    • Consistency interval marker assisted in-band commands in distributed systems
    • 分布式系统中一致性间隔标记辅助带内命令
    • US08150805B1
    • 2012-04-03
    • US11762605
    • 2007-06-13
    • Deepak TawriRonald S. Karr
    • Deepak TawriRonald S. Karr
    • G06F7/00G06F17/00G06F13/28
    • G06F21/6218G06F11/1456G06F11/1471G06F11/2064G06F11/2071G06F2201/835G06F2221/2101G06F2221/2147H04L67/1095H04L69/40
    • In-band commands may be associated with a particular consistency interval and may indicate requested actions to be performed for that consistency interval. An application may desire to perform actions, such as additional backup, snapshots, etc. on stored data, when that data is in a consistent state from the application's point of view. In order to ensure that the data is in a consistent state, a consistency interval may be created on demand. A node may request a consistency interval by sending a consistency request message to a consistency interval coordinator, which in turn, establishes the consistency interval with all nodes in the distributed environment. After sending all write requests for the consistency interval, the node may then send the command message. Command messages may be stored in consistency logs along with write requests and a replication target, or other device, may read both the write requests and the command message.
    • 带内命令可以与特定的一致性间隔相关联,并且可以指示要为该一致性间隔执行的所请求的动作。 当应用程序的观点来看,当数据处于一致状态时,应用程序可能希望对存储的数据执行诸如附加备份,快照等操作。 为了确保数据处于一致状态,可以根据需要创建一致性间隔。 节点可以通过向一致性间隔协调器发送一致性请求消息来请求一致性间隔,这又一次与分布式环境中的所有节点建立一致性间隔。 发送所有一致性间隔的写入请求后,节点可以发送命令消息。 命令消息可以与写请求一起存储在一致性日志中,并且复制目标或其他设备可以读取写请求和命令消息。