The subject matter disclosed herein relates to flash copy relationships and more particularly relates to flash copy relationship management.
Flash copy relationships are often established in order to back up data units. An administrator may subsequently need to manage a flash copy relationship.
A method for flash copy relationship management is disclosed. A management module identifies a data unit in a flash copy relationship with an extent range using a flash copy table. A resolution module erases the flash copy relationship from the flash copy table in response to the flash copy relationship completing. An apparatus and computer program product also perform the functions of the method.
In order that the advantages of the embodiments of the invention will be readily understood, a more particular description of the embodiments briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only some embodiments and are not therefore to be considered to be limiting of scope, the embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment, but mean “one or more but not all embodiments” unless expressly specified otherwise. The terms “including,” “comprising,” “having,” and variations thereof mean “including but not limited to” unless expressly specified otherwise. An enumerated listing of items does not imply that any or all of the items are mutually exclusive and/or mutually inclusive, unless expressly specified otherwise. The terms “a,” “an,” and “the” also refer to “one or more” unless expressly specified otherwise.
Furthermore, the described features, advantages, and characteristics of the embodiments may be combined in any suitable manner. One skilled in the relevant art will recognize that the embodiments may be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments.
The present invention may be a method, an apparatus, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
Modules may also be implemented in software for execution by various types of processors. An identified module of program instructions may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
The computer program product may be deployed by manually loading directly in the client, server and proxy computers via loading a computer readable storage medium such as a CD, DVD, etc., the computer program product may be automatically or semi-automatically deployed into a computer system by sending the computer program product to a central server or a group of central servers. The computer program product is then downloaded into the client computers that will execute the computer program product. Alternatively the computer program product is sent directly to the client system via e-mail. The computer program product is then either detached to a directory or loaded into a directory by a button on the e-mail that executes a program that detaches the computer program product into a directory. Another alternative is to send the computer program product directly to a directory on the client computer hard drive. When there are proxy servers, the process will, select the proxy server code, determine on which computers to place the proxy servers' code, transmit the proxy server code, then install the proxy server code on the proxy computer. The computer program product will be transmitted to the proxy server and then it will be stored on the proxy server.
The computer program product may be integrated into a client, server and network environment by providing for the computer program product to coexist with applications, operating systems and network operating systems software and then installing the computer program product on the clients and servers in the environment where the computer program product will function.
In one embodiment software is identified on the clients and servers including the network operating system where the computer program product will be deployed that are required by the computer program product or that work in conjunction with the computer program product. This includes the network operating system that is software that enhances a basic operating system by adding networking features.
In one embodiment, software applications and version numbers are identified and compared to the list of software applications and version numbers that have been tested to work with the computer program product. Those software applications that are missing or that do not match the correct version will be upgraded with the correct version numbers. Program instructions that pass parameters from the computer program product to the software applications will be checked to ensure the parameter lists match the parameter lists required by the computer program product. Conversely parameters passed by the software applications to the computer program product will be checked to ensure the parameters match the parameters required by the computer program product. The client and server operating systems including the network operating systems will be identified and compared to the list of operating systems, version numbers and network software that have been tested to work with the computer program product. Those operating systems, version numbers and network software that do not match the list of tested operating systems and version numbers will be upgraded on the clients and servers to the required level.
In response to determining that the software where the computer program product is to be deployed, is at the correct version level that has been tested to work with the computer program product, the integration is completed by installing the computer program product on the clients and servers.
The description of elements in each figure may refer to elements of proceeding figures. Like numbers refer to like elements in all figures, including alternate embodiments of like elements.
The central processor complexes 110 may be mainframe computers and may each comprise one or more processors. The coupling facility 105 may facilitate the processors of each central processor complex 110 accessing common data.
The storage subsystems 120 may comprise one or more storage controllers and one or more storage devices including hard disk drives, semiconductor storage devices, optical storage devices, micromechanical storage devices, and combinations thereof. The storage subsystems 120 may store data for the central processor complexes 110. The switches 115 may route the data from the storage subsystems 120 to the central processor complexes 110. In one embodiment, the data mover 125 may manage data transfers.
The data in the storage subsystems 120 may be stored on extents. An extent may be a contiguous area of storage on a storage device. One or more extents may be organized as a data set. Alternatively, one or more extents maybe organized as a volume. A volume may include one or more data sets.
Flash copy relationships may be established between a data set or volume on the first storage subsystem 120 and the second storage subsystem 120. The flash copy relationships may create point-in-time snapshot copies of the data sets or volumes. The flash copy relationships may be established by FLASHCOPY® software manufactured by IBM.
Currently, after a flash copy relationship is established, the flash copy relationship can only be found by querying individual extent ranges, making managing flash copy relationships difficult. The embodiments described herein identify a data unit such as a data set, volume, and/or extent in a flash copy relationship with an extent range using a flash copy table as will be described hereafter. The flash copy table is used to automatically manage the flash copy relationships of the system 100. The embodiments may further erase the flash copy relationship from the flash copy of table in response to the flash copy relationship completing as will be described hereafter.
The flash copy table 200 includes a plurality of entries 221. Each entry 221 describes a flash copy relationship. In the depicted embodiment, each entry 221 includes a data unit identifier 205, an extent range 210, a flash copy status 215, and unit information 220. The data unit identifier 205 may uniquely identify the data unit of the flash copy relationship. In one embodiment, the data unit identifier 205 is an index to the flash copy table database and/or data structure.
The extent range 210 may describe a range of extents in the storage subsystems 120 that receive the point-in-time copy of the data unit. The flash copy status 215 may describe a status of the flash copy relationship. The flash copy status 215 may be active, indicating that the extent range 210 is periodically receiving the point-in-time copy of the data unit. Alternatively, the flash copy status 215 may be completed, indicating that the extent range 210 has received the point-in-time copy of the data unit. In one embodiment, the flash copy status 215 is withdrawn, indicating that the extent range 210 will no longer receive the point-in-time copy of the data unit.
The unit information 220 may describe the data unit. The unit information 220 is dependent upon the type of the data unit. The unit information 220 for a data set data unit, a volume data unit, and an extent data unit are described hereafter in
The data set name 225 may be the logical name for the data set. The extent data 230 may include a box serial number, a logical control unit (LCU), and/or a common cryptographic architecture (CCA) for the extent range 210. The list of extent ranges 255 may include a listing of extent ranges if the extent range 210 is broken into multiple non-contiguous ranges.
The volume identifier 235 may uniquely identify the volume. The volume source 240 may identify the volume of which the point-in-time copy is created. The volume target 245 may identify the volume in which the point-in-time copy is stored. The incremental flash copy relationships 250 may describe each incremental flash copy relationship for the volume. The list of extent ranges 255 may include a listing of extent ranges if the extent range 210 is broken into multiple non-contiguous ranges.
The management unit 355 may identify a data unit in a flash copy relationship with an extent range 210 using the flash copy table 200. The resolution module 360 may erase the flash copy relationship from the flash copy table 200 in response to the flash copy relationship completing.
The method 500 starts, and in one embodiment, the management module 355 establishes 505 a flash copy relationship between the data unit and an extent range. The management module 355 may communicate the flash copy relationship to a storage subsystem 120. The management module 355 may further determine 510 if the data mover 125 receives a flash copy acknowledgment from the storage subsystem 120. If the data mover 125 does not receive the flash copy acknowledgment, the manager module 355 continues to determine 510 if the data mover 125 receives the flash copy acknowledgment.
If the data mover 125 receives the flash copy acknowledgment, the management module 355 may record 515 the flash copy relationship in the flash copy table 200 and the method 500 ends. In one embodiment, the management module 355 creates an entry 221 in the flash copy table 200. The management module 355 may record the identity of the data unit in a unit information 220. In addition, the management module 355 may record the extent range in the extent range 210 of the flash copy table 200. In one embodiment, the management module 355 records the flash copy status 215 as active. The entry 221 may embody the flash copy relationship.
The method 550 starts, and in one embodiment, the resolution module 360 receives 555 a flash copy table request. The flash copy table request may be generated by the administrator. Alternatively, the flash copy table request may be generated by a maintenance program.
The resolution module 360 may identify 560 a data unit from the extent range 210 in response to the flash copy table request. In one embodiment, the resolution module 360 scans each flash copy table entry 221 in turn, retrieves the extent range 210, and identifies 560 the data unit in a flash copy relationship with the extent range 210. Alternatively, the resolution module 360 may sequentially scan extents in the storage subsystem 120 and identify data units in the flash copy relationship with the extents.
The resolution module 360 may further determine 565 if the flash copy relationship between the extent range 210 and the data unit is complete. If the flash copy relationship is complete, the resolution module 360 may erase 570 the flash copy relationship from the flash copy table 200 by erasing the entry 221 for the flash copy relationship.
After erasing 570 the flash copy relationship or if the flash copy relationship is not complete, the resolution module 360 may determine 575 if all flash copy relationships have been identified. In one embodiment, all flash copy relationships have been identified if all entries 221 in the flash copy table 200 have been scanned. Alternatively, all flash copy relationships may have been identified if all extents in the storage subsystems 120 have been scanned.
If all flash copy relationships have not been identified, the resolution module 360 identifies 560 a data unit from a next extent range 210. If all flash copy relationships have been identified, the resolution module 360 provides 580 the flash copy relationships and the method 550 ends. In one embodiment, the resolution module 360 displays the flash copy relationships of the flash copy table 200 for an administrator.
The method 600 starts, and in one embodiment, the resolution module 360 determines 605 if a withdraw command is received. The withdraw command may be received from an administrator in response to the display of the flash copy table 200. For example, flash copy relationships between data units and extent ranges 210 may be displayed along with the flash copy status 215 for each flash copy relationship. An administrator may have the option to withdraw each flash copy relationship by issuing the withdraw command. If the withdraw command is not received, the method 600 ends.
If the withdraw command is received, the resolution module 360 may withdraw 610 at least one flash copy relationship allocated to a data unit identified by the withdraw command. In one embodiment, the resolution module 360 directs the storage subsystems 120 to withdraw all flash copy relationships allocated to the data unit.
Alternatively, the resolution module 360 may withdraw 610 all flash copy relationships allocated to a data unit in response to both the flash copy relationship for the data unit not completing and receiving 605 the withdraw command. In one embodiment, only uncompleted flash copy relationships are withdrawn in response to the withdraw command.
The resolution module 360 may determine 615 if the withdraw is acknowledged by the storage subsystems 120. The storage subsystems 120 may acknowledge the withdraw by communicating a withdraw acknowledgment message. If the withdraw is not acknowledged, the resolution module 360 may wait for the withdraw acknowledgment.
If there withdraws acknowledged, the resolution module 360 may erase 620 the flash copy relationships for the data unit in the flash copy table 200 and the method 600 ends. In one embodiment, the resolution module 360 erases 620 each flash copy table entry 221 that includes the data unit.
The embodiments automatically identify a data unit in a flash copy relationship with an extent range using the flash copy table 200. As a result, an administrator can rapidly determine all of the existing flash copy relationships in the system 100. In addition, the embodiments may automatically erase the flash copy relationship from the flash copy table 200 if the flash copy relationship is completed. Thus maintenance of the flash copy table 200 and the flash copy relationships is simplified.
The embodiments may be practiced in other specific forms. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
3862615 | Liou | Jan 1975 | A |
6799258 | Linde | Sep 2004 | B1 |
6996586 | Stanley et al. | Feb 2006 | B2 |
7000145 | Werner et al. | Feb 2006 | B2 |
7024530 | Jarvis | Apr 2006 | B2 |
7047390 | Factor et al. | May 2006 | B2 |
7120768 | Mizuno | Oct 2006 | B2 |
7124323 | Sanchez et al. | Oct 2006 | B2 |
7240131 | Bjornsson | Jul 2007 | B1 |
7249278 | Fukuda | Jul 2007 | B2 |
7257676 | Corbett et al. | Aug 2007 | B2 |
7395402 | Wilson et al. | Jul 2008 | B2 |
7409510 | Werner | Aug 2008 | B2 |
7437676 | Magdum et al. | Oct 2008 | B1 |
7461100 | Spear et al. | Dec 2008 | B2 |
7467266 | Burton et al. | Dec 2008 | B2 |
7523408 | Barrios et al. | Apr 2009 | B2 |
7571293 | LeCrone et al. | Aug 2009 | B1 |
7596658 | Tsurudome | Sep 2009 | B2 |
7702670 | Duprey et al. | Apr 2010 | B1 |
7702866 | Beardsley et al. | Apr 2010 | B2 |
7716185 | Thompson et al. | May 2010 | B2 |
7747576 | Micka | Jun 2010 | B2 |
8140785 | Kalos | Mar 2012 | B2 |
8161253 | Suarez | Apr 2012 | B2 |
8200637 | Stringham | Jun 2012 | B1 |
8271753 | Nemoto | Sep 2012 | B2 |
8312490 | Yap et al. | Nov 2012 | B2 |
8429363 | Benhase et al. | Apr 2013 | B2 |
8433867 | Eastman et al. | Apr 2013 | B2 |
8433870 | Benhase et al. | Apr 2013 | B2 |
8468316 | Beeken | Jun 2013 | B2 |
8515911 | Zhou et al. | Aug 2013 | B1 |
8572045 | Shah | Oct 2013 | B1 |
8635423 | Blumenau | Jan 2014 | B1 |
8655841 | Shidharan | Feb 2014 | B1 |
8745006 | Hiwatashi | Jun 2014 | B2 |
8775390 | Anglin et al. | Jul 2014 | B2 |
8793290 | Pruthi et al. | Jul 2014 | B1 |
8806281 | Dowers, II | Aug 2014 | B1 |
8832028 | Susairaj et al. | Sep 2014 | B2 |
8874532 | Anglin et al. | Oct 2014 | B2 |
8910030 | Goel | Dec 2014 | B2 |
8914578 | DeNeui et al. | Dec 2014 | B2 |
9483355 | Meiri | Nov 2016 | B1 |
20030158869 | Micka | Aug 2003 | A1 |
20030177149 | Coombs | Sep 2003 | A1 |
20040073831 | Yanai et al. | Apr 2004 | A1 |
20040243778 | Barrios | Dec 2004 | A1 |
20040243945 | Benhase et al. | Dec 2004 | A1 |
20040260869 | Factor | Dec 2004 | A1 |
20040267706 | Springer, Sr. | Dec 2004 | A1 |
20050235337 | Wilson et al. | Oct 2005 | A1 |
20060161721 | Iwamura | Jul 2006 | A1 |
20060174003 | Wilson et al. | Aug 2006 | A1 |
20060212667 | Mikami | Sep 2006 | A1 |
20060218370 | Satoyama | Sep 2006 | A1 |
20070083710 | Corbett et al. | Apr 2007 | A1 |
20070180204 | Wilson | Aug 2007 | A1 |
20070220322 | Mikami | Sep 2007 | A1 |
20080005146 | Kubo | Jan 2008 | A1 |
20090228658 | Nagai | Sep 2009 | A1 |
20110167044 | Hiwatashi | Jul 2011 | A1 |
20110167234 | Nishibori | Jul 2011 | A1 |
20110191299 | Huynh Huu | Aug 2011 | A1 |
20110307660 | Yang | Dec 2011 | A1 |
20120089795 | Benhase et al. | Apr 2012 | A1 |
20120216009 | Benhase | Aug 2012 | A1 |
20120221823 | Benhase et al. | Aug 2012 | A1 |
20120260051 | Maki | Oct 2012 | A1 |
20130054531 | Susairaj et al. | Feb 2013 | A1 |
20130054545 | Anglin et al. | Feb 2013 | A1 |
20130054906 | Anglin et al. | Feb 2013 | A1 |
20130254833 | Nicodemus et al. | Sep 2013 | A1 |
20130290626 | Sundrani | Oct 2013 | A1 |
20130339297 | Chen | Dec 2013 | A1 |
20130339302 | Zhang et al. | Dec 2013 | A1 |
20130339303 | Potter et al. | Dec 2013 | A1 |
20130339319 | Woodward et al. | Dec 2013 | A1 |
20130339471 | Bhargava et al. | Dec 2013 | A1 |
20130339643 | Tekade et al. | Dec 2013 | A1 |
20140052952 | Anglin et al. | Feb 2014 | A1 |
20140089581 | DeNeui et al. | Mar 2014 | A1 |
20160259574 | Carpenter | Sep 2016 | A1 |
Entry |
---|
Garimella, Neeta, “Understanding and exploiting snapshot technology for data protection, Part 1: Snapshot technology overview” < IBMdeveloperWorks®, published Nov. 6, 2006 (http://www.ibm.com/developerworks/tivoli/library/t-snaptsm1/). |
VMware, “VMWare Infrastructure 3 SAN Conceptual and Design Basics”, published Mar. 9, 2006, 14 pages, (https://www.vmware.com/pdf/esx_san_cfg_technote.pdf). |
ISPF—Allocating a New Data Set, published by Western Illinois University in 2001, retrieved online Jun. 27, 2017 (https://mvs.wiu.edu/stumvs/TSO/ISPFAllocateDataSet.html) hereinafter “WIU”, pp. 1-6. |
“Query Flashcopy,” z/VM V5R4.0 CP Commands and Utilities Reference, SC24-608107, http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp topic=/com.ibm.zvm.v54.hcpb7/qflashcy.htm , 6 pages. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Apr. 25, 2016. |
Webopedia, “Wildcard Character”, Oct. 1, 2002, pp. 1, https://web.archive.org/web/20021001193432/http://www.webopedia.com/TERM/W/wildcard_character.html. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Sep. 9, 2016. |
ViceVersa, About Synchronization (One-Way, Two-Way), Backup and Replication, May 13, 2008, pp. 1-4, https://web.archive.or/web/200805135005/http://www.tgrmn.com/web/kb/item78.htm. |
ViceVersa, “What is the Difference Between One-Way and Two-Way Synchronization?”, Oct. 13, 2005, pp. 1-2, https://web.archive.org/web/20051013085336/http://www.tgrmn.com/web/kb/item34.htm. |
Synametrics Technologies, “Two-Way File Synchronization”, Jan. 27, 2011, pp. 1-2, https://web.archive.org/web/20110127120735/http://web.synametrics.com/SyncrifyTwoWaySync.htm. |
Comodo Group, “Selecting the Backup Format”, Jun. 3, 2014, pp. 1-3, https://web.archive.org/web/20140603022324/http://help.comodo.com/topic-9-1-455-4994-.html. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Jan. 4, 2017. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Apr. 27, 2017. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Dec. 21, 2017. |
U.S. Appl. No. 14/637,151 Office Action Summary, dated Aug. 10, 2017. |
HighPoint Technologies, Inc., “Expanding Storage Capacity—A Primer”, Oct. 22, 2007, pp. 1-3, https://web.archive.org/web/20071022225100/http://www.highpoint-tch.com/PDF/Expanding_Storage_Capacity-A_Primer_pdf. |
Microsemi, “How to Use Online Capacity Expansion (OCE) with an Adaptec Raid Controller?”, Jun. 28, 2002, pp. 1-2, http://ask.mictosemi.com/app/answers/detail/a_id/3883/˜/how-to-use-online-capacity-expansion-%28oce%29-with-an-adaptec-raid-controller-%3F. |
QNAP, “Oneline Raid Level Migration”, Apr. 22, 2013, p. 1-5, https://www.quap.com/en/how-to/tutorial/artical/online-raid-level-migration. |
Number | Date | Country | |
---|---|---|---|
20150324280 A1 | Nov 2015 | US |