摘要:
Systems and methods for determining impact of a backup job on virtual storage resources are disclosed. An exemplary method includes determining an estimated performance and logical/physical capacity for the backup job on a virtual library storage (VLS). The method also includes determining an actual performance and logical/physical capacity without the backup job. The method also includes determining a simulated performance and logical/physical capacity based on the estimated and actual performance and logical/physical capacity. The method also includes comparing the simulated performance and logical/physical capacity to a threshold.
摘要:
Systems and methods of mitigating resource usage during virtual storage replication are disclosed. An exemplary method comprises detecting quality of a link between virtual storage libraries used for replicating data. The method also comprises determining a number of concurrent jobs needed to saturate the link. The method also comprises dynamically adjusting the number of concurrent jobs to saturate the link and thereby mitigate resource usage during virtual storage replication.
摘要:
Data management systems, articles of manufacture, and data storage methods are described. According to one aspect, a data management system provides a data storage system configured to store data of a plurality of client protected computer systems, wherein the data storage system comprises a plurality of storage devices individually having a respective capacity, and a quantity of the data of the protected computer systems to be stored exceeds capacities of individual ones of the storage devices and storage control circuitry coupled with the data storage system and configured to assign individual ones of the individual storage devices to store data for respective ones of the protected computer systems.
摘要:
A headless computer entity having a plurality of disk drives self-restores to a known state upon failure of either a system disk drive containing an operating system of the computer entity or failure of a data disk drive containing application data. Depending upon whether the system disk and/or data disk are replaced by a replacement disk, the computer entity configures itself with either deletion of application data on the data disk or deletion of application data on both the system and data disks. The computer entity determines whether a new replacement disk has been installed by comparing a signature of the system disk with a signature of the data disk. If a replacement disk is detected, the computer entity sets the digital signatures such that the system and data disks have a self-consistent set of hardware-specific digital signatures. Application data is returned to a known good state after deletion.
摘要:
The present invention in at least some embodiments relates to improved methods and systems for governing access to SAN data storage devices (or simply “SAN devices”) employed in SAN systems. In some embodiments, the method involves storing a list at a SAN device. The list can be an exclusion list identifying devices that are not allowed to access the SAN device. During normal operation, the SAN device automatically contacts the SAN (or a component of the SAN, such as a SAN switch) to determine the identities of new devices that have entered into communication with the SAN. The SAN device then automatically updates the exclusion list to include those new devices such that, without further instructions, the SAN device is not accessible by those new devices. The method further can relate to the setup and failure recovery of SAN devices employed in SAN systems.
摘要:
Data management systems, articles of manufacture, and data storage methods are described. According to one aspect, a data management system provides a data storage system configured to store data of a plurality of client protected computer systems, wherein the data storage system comprises a plurality of storage devices individually having a respective capacity, and a quantity of the data of the protected computer systems to be stored exceeds capacities of individual ones of the storage devices and storage control circuitry coupled with the data storage system and configured to assign individual ones of the individual storage devices to store data for respective ones of the protected computer systems.
摘要:
A storage structure comprises at least one storage unit having plural locations. Each location has a bay to store an item carrying machine readable information. Each bay has an associated unit that reads the machine readable information from an item stored in that bay.
摘要:
A hand-held portable reader and labeling device for interrogating data storage cartridges of the type containing an in-built memory chip having information stored describing details of data contained on the data storage medium is disclosed. The reader-labeling device comprises a processor, random access memory, printer, display, keypad, operating system, transponder, receiver and battery power supply. By scrolling a menu display, key parameters describing a data cartridge can be accessed quickly and efficiently without the need to access the data storage medium itself. A cartridge media specific label may be rapidly printed for attachment to a data storage cartridge.
摘要:
A continuous force, replaceable spring appliance which connects to the orthodontic archwires of the upper and lower jaws and teeth. The replaceable spring fits into a hollow telescoping cylinder assembly by unscrewing end caps. The spring can be made to exert a pushing force, pushing the telescoping cylinders apart as it works, or it can exert a pulling force, pulling the ends of the telescoping cylinders together. The telescoping assembly has end caps that have bars with balls attached. The balls fit into a socket assembly that is screw locked to the archwires. The ball and socket assembly allows a free range of motion, and prevents the appliance from pinching the cheeks and gums or being chewed by the teeth.
摘要:
Systems and methods relating to making a physical copy at a remote storage device of data on a local storage device in response to a command from a backup application operatively associated with the local storage device are disclosed. An exemplary method comprises replicating the data from the local storage device on the remote storage device. The method also comprises copying the data replicated at the remote storage device to a physical medium operatively associated with the remote storage device in response to a command from the backup application operatively associated with the local storage device.