Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

53 results about "Replication (computing)" patented technology

Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility.

Replication systems and methods for a virtual computing environment

Hybrid replication systems and methods for a virtual computing environment utilize snapshot rotation and differential replication. During snapshot rotation, data modifications intended for a source virtual machine disk (VMDK) are captured by a primary snapshot. Once a particular criterion is satisfied, the data modifications are redirected to a secondary snapshot while the primary snapshot is committed to both source and target VMDKs. The secondary snapshot is then promoted to primary, and a new secondary snapshot is created with writes redirected thereto. If the VMDKs become out-of-sync, disclosed systems can automatically perform a differential scan of the source data and send only the required changes to the target server. Once the two data sets are synchronized, snapshot replication can begin at the previously configured intervals. Certain systems further provide for planned failover copy operations and / or account for migration of a virtual machine during the copying of multiple VMDKs.
Owner:QUEST SOFTWARE INC

Method and system for automated integrated server-network-storage disaster recovery planning

ActiveUS20090307166A1Knowledge representationInference methodsReplication (computing)Disaster recovery plan
An automated disaster recovery (DR) planning system for a computing environment is provided. A discovery module discovers servers, networks, and storage devices in a computing environment. An expert knowledge base module captures best practices in planning, and capabilities, interoperability, limitation and boundary values for different DR technologies. A match-making module determines multiple DR plans as combinations of one or more replication technologies that can be used to satisfy DR requirements. And, an optimizer configured for assessing a feasible DR plan from said multiple DR plans, to deploy for DR planning of a primary computing environment.
Owner:DAEDALUS BLUE LLC

Systems and methods for selective data replication

Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file. Such attributes can be obtained from, for example, metadata. In certain situations, an additional assessment of the source and replicated files can be beneficial. For example, if integrity of an existing replicated file's content is maintained, one may not want to re-replicate the corresponding source file. For large source files, such a decision can provide substantial reductions in expenditures of available computing and network resources. In certain embodiments, a threshold for identifying such large files can be based on one or more operating parameters such as network type and available bandwidth. In certain embodiments, replication file's integrity can be checked by calculating and comparing checksums for the replication file and its corresponding source file.
Owner:COMMVAULT SYST INC

Balancing response times for synchronous I/O requests having different priorities

A computing environment, such as an data mirroring or replication storage system, may need to process synchronous I / O requests having different priorities in addition to handling I / O requests on the basis of synchronous or asynchronous groupings. The system described herein provides a data storage system that addresses issues involving efficient balancing of response times for servicing synchronous I / O requests having different priorities. Accordingly, the system described herein provides for maintaining an optimal response time for the host-synchronous I / O requests and the optimal throughput of non-host-synchronous I / O requests using a host-synchronous request time window within which processing of non-host-synchronous I / O requests is throttled. The host-synchronous request time window may be selected to enable the optimal response time for the host-synchronous I / O and also to minimize the impact on the overall throughput of the I / O processor of the storage device.
Owner:EMC IP HLDG CO LLC

Data network and execution environment replication for network automation and network applications

Network replica systems and methods include, via a server, a group of servers, or in a cloud computing environment, communicating with one or more management systems and one or more networks associated with the one or more management systems via one or more Application Programming Interfaces (APIs); obtaining data from the one or more management systems and / or the one or more networks; storing the data in a database of record which defines a detailed model of a current state of the networks; and applying one or more assertions to data of interest in the database of record to emulate behavior in the one or more networks, wherein the assertions map actual device, process, business, architecture, and technology behaviors onto the data of interest from the database of record to emulate the behavior, wherein the database of record and the applied one or more assertions include a network replica of the networks.
Owner:CIENA

Network intrusion detection method, device and system and storage medium

PendingCN111049849AImprove securityOvercome technical issues that reduce detection efficiencyTransmissionData streamConcurrent computation
The invention discloses a network intrusion detection method, device and system and a storage medium, and the method comprises the steps: initializing a distributed computing system, and enabling a detection node to report node information to a management and control node; distributing a feature rule base to detection nodes of corresponding detection groups, and copying the same service data mirror image traffic to different distributed detection groups by using a stream copying technology; according to the flow copied to the detection group by the flow copying technology, controlling the service data to be shunted to a single detection node or a detection node of the detection group of the same feature rule base; and enabling the detection node to receive the to-be-detected message, perform matching detection according to the feature rule base and output a detection result to the management and control node. Through a technical means of adopting a distributed and parallel computing architecture and shunting a network data stream to a plurality of detection nodes by utilizing distributed and sdn switch stream replication, the technical problem of low detection efficiency during large-flow data in the prior art is solved, and the effect of improving the system detection efficiency is achieved.
Owner:SHENZHEN Y& D ELECTRONICS CO LTD

Consistent replication of virtual computing instance data

Virtual computing instance data that are stored across multiple storage volumes are replicated in a manner such that the write order is maintained. The frequency of the replication is set so that the recovery point objective defined for the VM data can be satisfied. The replication includes the steps of determining a set of logical storage volumes across which the virtual computing instance issues dependent write IOs, issuing a first command to the virtual computing instance to block new IOs and to block receipt of IO acknowledgements, issuing a command to create replicas of all the logical storage volumes in the set, and then issuing a second command to the virtual computing instance to unblock new IOs and unblock receipt of IO acknowledgements.
Owner:VMWARE INC

Risk-based dynamic geo-location based replication of services in cloud computing

InactiveUS20130339204A1Improve service resiliencyCost of disruptionFinanceDigital computer detailsCloud computingRisk profile
Dynamic provisioning of resources is employed to replicate capabilities and / or services in a distributed computing infrastructure to overcome potential disruptions in the capabilities and / or services. Predictive tools for weather forecasts, risk profile analysis based on geographical location of data / service centers, and historical data are employed to improve service resiliency. Further, for each local computing service that is considered for replication, the cost of disruption is compared with the total cost of replication to ensure that a computing infrastructure service provider is selected in a cost-efficient manner.
Owner:IBM CORP

Data replication method

To ensure data consistency for a new data replica created for a computing system, the transmission and receipt of messages altering the data are monitored and replication of the data is permitted when all changes to the data that have been transmitted to the data have been received.
Owner:GOPIVOTAL

Risk-based dynamic geo-location based replication of services in cloud computing

InactiveUS20130339203A1FinanceDigital computer detailsRisk profilingDistributed computing infrastructure
Dynamic provisioning of resources is employed to replicate capabilities and / or services in a distributed computing infrastructure to overcome potential disruptions in the capabilities and / or services. Predictive tools for weather forecasts, risk profile analysis based on geographical location of data / service centers, and historical data are employed to improve service resiliency. Further, for each local computing service that is considered for replication, the cost of disruption is compared with the total cost of replication to ensure that a computing infrastructure service provider is selected in a cost-efficient manner.
Owner:IBM CORP

Block chain system for energy transaction based on V-raft consensus algorithm

The invention provides a block chain system for energy transaction based on a V-raft consensus algorithm, and belongs to the field of computer software assembly programs and data security. A V-raft consensus algorithm is used in a consensus layer of the system, and according to the improved consensus algorithm, a node state table is added on the basis of an original Raft consensus algorithm to optimize collapse fault tolerance, and the improved consensus algorithm acts on a leader node election stage and a log copying stage respectively; the condition that the state rotation of the following node becomes a candidate due to unstable network to disturb the node log replication process is reduced, and the time of waiting for the following node to reply a day-ahead replication result by the leading node is shortened. Compared with an existing energy block chain network, the method abandons POW and other consensus algorithms which consume computing power and PBFT and other consensus algorithms which cannot dynamically add and delete nodes, and the improved V-raft consensus algorithm is used on the basis of network access auditing of the alliance block chain to accelerate the consensus efficiency of energy transaction and the concurrent processing speed of the transaction.
Owner:SOUTHWEST PETROLEUM UNIV

Transaction identifier-based multi-computer-room synchronization method, computing equipment and storage medium

The invention discloses a transaction identifier-based multi-computer-room synchronization method, computing equipment and a storage medium. The method comprises the following steps: reading a first write data log record in a log file of a first machine room, and judging whether a domain identifier contained in a transaction identifier of the first write data log record is consistent with a domain identifier corresponding to the first machine room or not; if yes, performing synchronous data writing operation in a second machine room according to the first data writing log record, and recording a second data writing log record of the synchronous data writing operation and a transaction identifier of the second data writing log record in a log file of the second machine room, wherein the domain identifier contained in the transaction identifier of the second write data log record is set as the domain identifier corresponding to the first computer room; if not, neglecting the synchronization of the first write data log record, so that loop replication is broken, the problem of replication loopback in multi-machine-room bidirectional synchronization is solved, and the data synchronization efficiency is further improved due to the fact that the judgment process is simple.
Owner:ZHANGYUE TECH CO LTD

Webpage component replication system and method

A method, computer program product, and computing system device for receiving a selection of at least a portion of a webpage. Code associated with the selected portion of the webpage may be extracted. Network traffic associated with the selected portion of the webpage may be monitored. One or more webpage components may be generated based upon, at least in part, the extracted code and the monitored network traffic associated with the selected portion of the webpage.
Owner:IBM CORP

Risk detection of data loss for 5G-enabled devices

A computer system, computer program product, and method are provided that include: collecting data replicable from a computing device; detecting a risk of the computing device, wherein detecting the risk includes detecting a surrounding environment, a location, a speed, and a condition of the computing device; upon determining that the risk reaches a predetermined threshold, initiating data replication on the computing device; and storing the copied data in a cloud storage system using a 5G network.
Owner:IBM CORP

Remote health monitoring in data replication environments

A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.
Owner:IBM CORP

Message cross-cluster routing forwarding method and system

The invention discloses a message cross-cluster routing forwarding method and system, and the method comprises the steps that a server obtains a routing rule configuration record written in a distributed coordination system; the server converts the routing rule configuration record into a corresponding routing rule executor by using a routing rule analyzer in the Topic; the server performs routingrule matching on messages needing to be routed in the Topic by utilizing the routing rule executor to obtain a routing cluster list corresponding to the messages; and the server forwards the messageto the corresponding cluster according to the routing cluster list by using a routing duplicator in the Topic. According to the message cross-cluster routing forwarding system provided by the invention, the message cross-cluster routing forwarding method is adopted, and the cross-cluster routing replication forwarding of the message is realized by relying on the distributed coordination system atthe server to perform routing rule configuration, so that the consumption of additional computing resources is avoided, and the maintenance cost is reduced.
Owner:SUNING CLOUD COMPUTING CO LTD

Threading of replication based on data type

Replication of data from a primary computing system to a secondary computing system. The replication is single-threaded or multi-threaded depending on one or more characteristics of the data to be replicated. As an example, the characteristics could include the type of data being replicated and / or the variability on that data. Also, the multi-threading capabilities of the primary and secondary computing systems are determined. Then, based on the identified one or more characteristics of the data, the primary computing system decides whether to perform multi-threaded replication and the multi-threading parameters of the replication based on the one or more characteristics of that data, as well as on the multi-threading capabilities of the primary and secondary computing system.
Owner:MICROSOFT TECH LICENSING LLC

Data consistency during reverse replication

Disclosed herein are methods, systems, and processes to provide and maintain data consistency during reverse replication. It is determined that a migrate operation or a reverse replication operation has been requested. Upon determining that the migrate operation or the reverse replication operation has been requested, a resynchronization identifier is set in a dirty region log (DRL) associated with a computing device that is subject to the migrate operation or the reverse replication operation. In response to the operation being the reverse replication operation, a master boot record (MBR) sector of a boot disk associated with the computing device is overwritten.
Owner:VERITAS TECH

Dynamic task replication method, device and system in edge computing environment

The invention discloses a dynamic task replication method, device and system in an edge computing environment. The method comprises the following steps: establishing an optimization problem by taking the minimum difference regret between the total completion time of a job in an edge environment and the total time delay of job completion under an ideal optimal replication decision as a target; solving an optimization problem by using a task replication decision algorithm based on a multi-armed bandit, comprising the following steps of: estimating a task calculation amount wt according to a task type of a task and the size of input data at the beginning of a first time slot; for each task t, calculating the lower confidence limit of the time delay of copying the task t from the edge cluster i to the edge cluster j, determining all available edge clusters, selecting rt smaller available edge clusters as target edge clusters, and copying the task to all the target edge clusters for execution. According to the method, the algorithm based on the multi-armed bandit is applied to the task replication problem of the edge computing system for the first time, and the method has excellent time delay performance and service reliability.
Owner:JIANGSU ELECTRIC POWER CO +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products