Lee L. Nelson - Boise ID, US Rodger Daniels - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F012/00 G06F012/08
US Classification:
711203, 711 6, 711162, 711206
Abstract:
Virtual storage systems and virtual storage system operational methods are described. According to one aspect, a virtual storage system includes a virtual storage space including a plurality of virtual storage locations, a physical storage space including a plurality of physical storage locations configured to store data, a memory configured to store a plurality of activated pointers which associate a plurality of virtual storage locations with a plurality of the physical storage locations, and a controller configured to deactivate at least some of the activated pointers including extracting the deactivated pointers from the memory, to access a request pertaining to selected data associated with at least one of the deactivated pointers, to activate the deactivated pointers including providing the deactivated pointers in the memory providing reactivated pointers, and to modify at least one of the reactivated pointers responsive to the request.
Virtual Storage Systems And Virtual Storage System Operational Methods
Rodger Daniels - Boise ID, US Lee L. Nelson - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 17/30 G06F 12/00
US Classification:
707200, 711 6
Abstract:
Virtual storage systems and virtual storage system operational methods are described. According to one aspect, a virtual storage system includes a physical storage space configured to store data, a virtual storage space adapted to provide a representation of data stored within the physical storage space to a host, a memory configured to store a plurality of pointers utilized to implement addressing intermediate the physical storage space and the virtual storage space, and a controller configured to extract selected ones of the pointers from the memory and to provide the selected pointers in another storage location different than the memory at a first moment in time and to extract the selected pointers from the another storage location and to provide the selected pointers in the memory at a second moment in time subsequent to the first moment in time.
Computer Systems, Virtual Storage Systems And Virtual Storage System Operational Methods
Michael B. Jacobson - Boise ID, US Lee L. Nelson - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/16 G06F 12/10
US Classification:
711202, 711 6, 711161, 707204
Abstract:
Computer systems, virtual storage systems, and virtual storage system operational methods are described. According to one aspect, a computer system includes a virtual storage system including a physical storage space, a virtual storage space, and a non-guaranteed available capacity utilized to generate a non-guaranteed snapshot volumes of virtual storage volumes of the virtual storage space, wherein the virtual storage system is configured to monitor the non-guaranteed available capacity and to present a report regarding the non-guaranteed available capacity responsive to the monitoring and a host configured to execute an application wherein generation of a non-guaranteed snapshot volume of at least one of the virtual storage volumes is desired, to access the report to determine the non-guaranteed available capacity, and to issue a request to the virtual storage system to generate the at least one non-guaranteed snapshot volume of the at least one virtual storage volume responsive to the accessing.
Rodger Daniels - Boise ID, US Lee Nelson - Boise ID, US Andrew Dallmann - Meridian ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/00
US Classification:
711162, 711112, 711147
Abstract:
Exemplary storage network architectures, data architectures, and methods for creating and using snapdifference files in storage networks are described. One exemplary method may be implemented in a processor in a storage network. The method comprises receiving a request to execute a snapclone operation; generating, in response to the received service request, a snapclone copy of a source disk volume contemporaneous with the generation of the snapclone file, opening a first snapdifference file; and recording I/O operations to the source disk volume in the snapdifference file. The methods described herein may be embodied as logic instructions on a computer-readable medium.
Concurrent Data Restore And Background Copy Operations In Storage Networks
Aaron Lindemann - Boise ID, US Xia Xu - Boise ID, US Rodger Daniels - Boise ID, US Lee Nelson - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/04
US Classification:
711162, 711113
Abstract:
Exemplary storage network architectures, data architectures, and methods for data restore operation are disclosed. In one embodiment, a storage device comprises a processor, a memory module communicatively connected to the processor, and logic instructions in the memory module which, when executed by the processor, configure the processor to receive a signal that identifies a source volume and a first target snapshot that represents a point in time copy of the source volume, update metadata to define an restore relationship between the first target snapshot and the source volume, execute a background copy process between the first target snapshot and the source volume, and manage input/output operations during the background copy process to permit input/output operations to the source volume during the background copy process.
Rodger Daniels - Boise ID, US Lee Nelson - Boise ID, US Andrew Dallmann - Meridian ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/00
US Classification:
714 7, 714 5
Abstract:
Exemplary storage network architectures, data architectures, and methods for creating and using snapdifference files in storage networks are described. One exemplary method may be implemented in a processor in a storage network. The method comprises detecting a failure in a source volume, and in response to the failure: terminating communication with one or more applications that generate I/O requests to the source volume; refreshing the source volume; copying a backup data set to the source volume, and while the backup data set is being copied: activating a new snapdifference file; restarting communication with one or more applications that generate I/O requests to the source volume; and recording I/O operations to the source volume in the snapdifference file.
Virtual Storage Systems, Virtual Storage Methods And Methods Of Over Committing A Virtual Raid Storage System
Michael Jacobson - Boise ID, US Lee L. Nelson - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/00
US Classification:
711203, 711161, 711162
Abstract:
Virtual storage systems, virtual storage methods and methods of over committing a virtual RAID storage system are described. According to one aspect, a virtual storage system includes a virtual storage space, a physical storage space, a mapping system configured to associate a plurality of addresses of the virtual storage space with respective addresses of the physical storage space and a controller configured to automatically remove a portion of the mapping system according to a prioritization protocol which specifies removal of portions of the mapping system according to an order.
Data Protection Using Data Distributed Into Snapshots
Brian Patterson - Boise ID, US Lee Nelson - Boise ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F017/30
US Classification:
707008000
Abstract:
A method of protecting data includes distributing data across a plurality of snapshots of a parent logical unit (LUN) when data of the parent LUN diverges from the snapshots.
Name / Title
Company / Classification
Phones & Addresses
Lee Nelson Vice-President
Lake Texoma Post No. 7873, Veterans of Foreign Wars of The United States, Pottsboro, Texas
Prankster Simon Brodkin - also known as his TV persona Lee Nelson - was arrested by Greater Manchester Police after briefly interrupting the PM and giving her a sheaf of paper he claimed was from Boris Johnson.
Date: Oct 04, 2017
Category: World
Source: Google
Kanye West rapped by fans for 'swearing' at Glastonbury 2015 festival
After a dramatic opening appearing crouched under a low-level panel of lights, the multi-award-winning Grammy star was left thrown when comedian Lee Nelson ran on stage holding a microphone just minutes into the set.
The low point, he says, was the stage invasion during Kanye West's set. "That idiot Lee Nelson ran onto the stage trying to get attention for himself and ruined what could have been something very special," he says.
Date: Jun 29, 2015
Category: Entertainment
Source: Google
Watch Kanye West get 'Kanye-d' by British heckler at Glastonbury
Wearing a t-shirt that read "Lee-Zus" in parody of West's nickname and album title "Yeezus," British comedian Lee Nelson real name Simon Brodkin claimed responsibility for the stunt on Twitter. "Some people were saying Kanye shouldn't headline Glastonbury so I thought I'd give him a hand," he wr
Date: Jun 28, 2015
Category: Entertainment
Source: Google
Kanye West gets 'Kanye'd' by onstage heckler at Glastonbury
When the petition went nowhere, British comedian Lee Nelson -- whose real name is Simon Brodkin -- took matters into his own hands. Wearing a shirt that said "Lee-Zus," a parody of West's nickname and self-titled album "Yeezus," Nelson bounced across stage with a working microphone in hand.
Date: Jun 28, 2015
Source: Google
Kanye West's Glastonbury Show Disrupted by Stage Invader
t the 2009 MTV VMAs and of Beck at this years Grammys. One Twitter user wrote that Nelson was getting a taste of his own medicine, but another commented imagine being Lee Nelson & so irrelevant that the only way to remind people you exist is to crash a headliner at glasto.
Date: Jun 28, 2015
Source: Google
Glastonbury 2015: Kanye West reaction, the Dalai Lama and more
At times it felt like a rehearsal, such was the sporadic energy possessed by Yeezy on stage. Cranes, abrupt song changes, forgotten lyrics then, of course, there was the small matter of Lee Nelson storming the stage.
Date: Jun 28, 2015
Source: Google
Kanye West Calls Himself 'Greatest Living Rock Star' at Glastonbury Show
But the set was at times chaotic. Just minutes in, an audience member, comedian Lee Nelson, jumped onto stage and had to be removed by security, while Kanye stopped several songs to restart them.