Any and all applications, if any, for which a foreign or domestic priority claim is identified in the Application Data Sheet of the present application are hereby incorporated by reference under 37 CFR 1.57.
Software development environments are computing environments that support both (i) a production (or “official”) platform, and also (ii) informal workspaces that are derived from the official and which developers use on their own private computing devices to develop new source code and/or diagnostics and/or bugfixes. Typically, the production platform comprises an official software base (including, e.g., source code, files, configuration parameters, etc.) for building executable code and/or associated binary files (the “executable”). The executable(s) may be provided to customers as an “official release.” The official software base (or “build”) may be stored in a build-volume on a storage device such as a storage array. A so-called build server may manage the source code in the software base and may also generate the official release from an official software base.
Workspaces are private developer copies that may be derived from an official software base. Typically, a developer obtains a copy of the official software base to use as a workspace on her/his own computing device. The workspace may be tested and if the changes are deemed of appropriate quality, the workspace may be submitted for integration, so that the changes developed by the developer may be incorporated into the official base.
The process for obtaining copies of the official software base and generating workspaces for a large number of developers may consume huge amounts of storage. Because each developer may be working with one or more workspaces at any given time (e.g., on several different releases and/or features) and each workspace may comprise a copy of an official software base, which may be very large to begin with, the storage consumed by so many copies could rapidly exceed the storage capacity available in the development environment. An exemplary prior-art approach to providing workspaces and the necessary storage therefor is presented in
Storage array 104 may be a high-capacity mass storage device that is well known in the art. Storage array 104 also includes array-based hardware snapshot capability, which is also well-known in the art and is discussed in more detail in regard to array-created hardware snapshots S1-Sn. Storage array 104 may comprise one or more data storage technologies, and may be any kind of block storage array, e.g., storage-area network (SAN) array technologies. An example of storage array 104 may be a Dell EqualLogic™ array from Dell, Inc. of Round Rock, Tex., USA. Storage array 104 may comprise several volumes, including build-volume BV1 (element 110) and n array-created hardware snapshots S1-Sn (elements 111-1, . . . . , 111-n).
Build server 106 is a computing device, well known in the art, which is generally directed at managing source code, which may include compiling the source code in a software base and generating executables. In the present example, build server 106 executes a Microsoft Windows® operating system (e.g., from Microsoft Corp., Redmond, Wash., USA), and therefore may be referred to as a Windows-based computing device. Software development environment 100 as a whole may be referred to as a Windows-based development environment, because the build server 106 and developers' machines 108 are Windows-based computing devices. Build server 106 may perform one or more of the following functions in software development environment 100:
User computer devices D1-Dn (elements 108-1, . . . , 108-n) are computing devices assigned to individual developers, and may be referred to herein as “developer machines.” In the present example, each developer machine D (component 108) executes a Microsoft Windows operating system, and may be referred to as a Windows-based computing device or Windows-based developer machine. A developer machine 108 operating in software development environment 100 may perform one or more of the following functions:
Array-created build-volume BV1 (element 110) is a volume created in storage array 104 that has been designated to store a software base. Build-volume BV1 is accessible to build server 106, as indicated by the solid arrow 150. In the present example, build-volume BV1 is sized at 200 GB and is formatted for NTFS (New Technology File system from Microsoft Corp.), which is a file system (or “filesystem”) that is based on and compatible with the Microsoft Windows@operating system. Thus, NTFS may be said to be a Windows-based file system. Build-volume BV1 may be of any size and may be formatted for any Windows-based file system, not necessarily NTFS.
Array-created hardware snapshots S1-Sn (elements 111-1, . . . , 111-n) are so-called “hardware snapshots” or “hardware-based snapshots,” which are created by storage array 104. A snapshot is a point-in-time copy of a defined collection of data that acts as a source. A snapshot may be thought of as an instant image of source data at a given point in time (e.g., a build-volume, such as build-volume BV1, which may comprise a software base). Thus, build-volume BV1 may be thought of as the source for snapshots S1-Sn. An array-created snapshot is generated by storage array 104 in a self-contained fashion, substantially independently, using hardware, firmware and/or software residing/executing on the storage array itself. For instance, storage array 104 may be capable of performing snapshot operations upon request from another component, generally without intervention or oversight from other components, thus off-loading other components from processing needed for snapshot creation and management.
In the present example, a snapshot S (e.g., S1, . . . , Sn) is generated by storage array 104 from a source which is build-volume BV1. The snapshot S may be created in response to a command/request issued by build server 106, a developer's machine 108, or by another component (not shown here). The array-created hardware snapshot S is an exact copy of the source volume BV1.
Logical communication pathways 150 and 151 (e.g., 151-1, . . . , 151-n) may be supported by any suitable underlying physical communications infrastructure. For example, logical communication pathways 150 and 151 may include one or more networks or other connection types including one or more of the following: the Internet, a wide area network (WAN), a local area network (LAN), a Small Computer System Interface (SCSI) connection, a virtual private network (VPN), and/or other appropriate computer or telecommunications networks, combinations of the same or the like.
The present figure illustrates only a handful of snapshots S and only two developer machines D in software development environment 100. However, the number of development machines may reach well into the hundreds, each development machine D requiring its own dedicated one or more snapshots S in storage array 104. Only one build-volume BV1 is illustrated here, but a software development environment may operate with several official software bases corresponding to different releases and/or service packs, each one causing potentially hundreds of corresponding snapshots S to be created for respective developers' workspaces. The result is that the physical storage capacity of storage array 104 may be quickly exhausted and necessitate the purchase of another storage array, which is a major expense and a considerable increase in the complexity of the software development environment. This represents a substantial disadvantage of the prior-art approach depicted in
As illustrated by the prior-art approach to workspace connectivity and storage in a Windows-based software development environment, the need exists for a more efficient, yet robust, way to avoid or at least to slow the growth of storage space used for providing developer workspaces. Systems and methods are disclosed herein that use a Unix-based file system—e.g., ZFS—hosted by a Unix-based storage management server, to manage and serve clones to Windows-based computing clients, such as developer machines that need access to workspaces. The Unix-based storage management server may manage a storage volume allocated on a storage array as a ZFS pool. The Unix-based storage management server may establish a volume within the ZFS pool as a build-volume and may serve it as a logical unit number (LUN) to a Windows-based build server, which may store a software base (or “build”) to the build-volume as a source for developer workspaces. The Unix-based storage management server may further establish any number of ZFS clone volumes within the ZFS pool, each ZFS clone representing a copy of the software base in the build-volume. The Unix-based storage management server may serve a ZFS clone as a logical unit number (LUN) to a respective Windows-based developer machine that requested a workspace of the software base.
The difference in actual storage space occupied on a storage device by ZFS clones versus array-created hardware snapshots is exploited in the illustrative embodiment to provide more efficient storage space utilization in the storage device. In a large software development environment, e.g., when there are hundreds of developers and/or workspaces to be provided, this difference may significantly ameliorate the immediate need for additional storage arrays.
According to the illustrative embodiment, Windows-based computing devices obtain native Windows-based access to data in a storage volume that is actually managed by the Unix-based storage management server under the ZFS volume manager and file system. The ZFS nature of the accessed storage volume is unbeknownst to the Windows-based machines. This enables Windows-based utilities, applications, and tools, e.g., software development utilities executing on the Windows-based build server or on a developer's Windows-based machine, to operate upon the data in ZFS-managed space the same as they might have operated on a workspace in an array-created hardware snapshot such as snapshot S1 in the prior art.
These applications, utilities, and tools may operate without protocol conversion between Windows and Unix and without native ZFS support on Windows-based computing devices. Accordingly, users may access storage space from their Windows-based computing devices according to a Windows-based file system such as NTFS, while the actual storage space is managed under a Unix-based file system such as ZFS volume manager and file system. Conversely, the Windows-based formatting of the contents in the ZFS-managed volumes are unbeknownst to the Unix-based storage management server and to the ZFS volume manager and file system. Since Windows and Unix operating systems are generally considered to be mutually incompatible along with any associated utilities, applications, and tools, the cross-accessibility provided by the illustrative embodiment is an important advantage.
Systems and methods are disclosed herein for using a Unix-based file system to manage and serve clones to Windows-based computing clients. Examples of such systems and methods are described in further detail in reference to
Storage management server 201 may be a computing device or data processing device that operates with a Unix or Unix-like operating system, such as Linux, Solaris, AIX, etc., which are well known in the art. Thus, in the present disclosure, storage management server 201 may be said to be “Unix-based,” e.g., a “Unix-based server” or a “Unix-based computing device” or a “Unix-based data processor.” Storage management server 201 may be in communication with storage array 204 and with build server 206 as depicted by the solid arrows.
Component 202 may be a “ZFS” utility, which may be referred to herein simply as “ZFS 202.” ZFS 202 executes on storage management server 201. ZFS (sometimes referred to herein as a “Z file system”) is a Unix-based utility that provides logical volume management and also acts as a file system. ZFS 202 may be provided by Oracle Corporation of Redwood Shores, Calif., USA (formerly from Sun Microsystems), e.g., on a Solaris operating system, UNIX® operating system, Unix operating system, or on another Unix-like operating system. In some embodiments, ZFS 202 may be another version of ZFS, e.g., provided by a member of the OpenZFS organization. Storage management server 201, using ZFS 202 (or “executing ZFS 202”), may perform one or more of the following functions in system 200, without limitation:
See also
Storage array 204 may be a high capacity mass storage device that is well known in the art. Storage array 204 may comprise one or more data storage technologies, and may be any kind of block storage array, e.g., storage area network (SAN) array technologies. An example of storage array 204 may be a Dell EqualLogic™ array from Dell, Inc. Storage array 204 may comprise several storage volumes, including supervolume SV 220. Storage array 204 may be the same as or different from storage array 104, but notably the hardware snapshot feature is not required for storage array 204 and the illustrative embodiment. Thus, storage array 204 may operate in system 200 even if it lacks hardware array-created snapshot capability. Communications to/from storage array 204 may use the Internet Small Computer System Interface (iSCSI) protocol or another SCSI protocol.
Build server 206 is analogous to build server 106 described above and may comprise additional functionality for operating in system 200. In contrast to Unix-based storage management server 201, build server 206 is Windows-based, i.e., executes a Microsoft Windows operating system. In some alternative embodiments, build server 206 may execute another operating system that is analogous to Microsoft Windows or is Windows-compatible, but which is distinct from the Unix or Unix-like operating system used by storage management server 201. For example, build server 206 may perform one or more of the following functionality in system 200, without limitation:
See also
Supervolume SV 220 is a storage volume that physically resides on storage array 204, but which is defined, formatted, and managed by storage management server 201, e.g., using ZFS 202. In contrast to the prior art, where build-volume BV1 was created by storage array 204 in response to build server 106 using a Windows-based file system, supervolume SV 220 is sized to accommodate numerous workspaces and is managed as a ZFS volume by a Unix-based machine such as storage management server 201. Thus, logically, supervolume SV 220 is associated with Unix-based storage management server 201. Illustratively, supervolume SV 220 may be sized at 1 TB, based on a build-volume of 200 GB.
Logical operation 1, depicted by the dotted arrow, illustrates storage management server 201 (e.g., using ZFS 202) establishing supervolume SV 220 on storage array 204. This operation may include communicating with storage array 204, creating the volume, formatting the volume for ZFS, mounting it as a ZFS Pool on server 201, etc. See also
Logical operation 2 illustrates storage management server 201 (e.g., using ZFS 202) establishing build-volume BV3 (element 310) within the ZFS Pool of supervolume SV 220. This is a ZFS operation according to features provided by ZFS 202, e.g., naming the build-volume, allocating a size, e.g., 200 GB, etc. This operation may be performed in response to a request from build server 206 asking for a build-volume.
Logical operation 3 illustrates build server 206 establishing a communicative coupling with build-volume BV3310—via storage management server 201. Thus, according to the illustrative embodiment, storage management server 201 may be responsible, at least in part, for providing communicative coupling between build server 206 and the build-volume BV3310. This functionality may be provided by special-purpose code that executes on storage management server 201. Accordingly, storage management server 201 may serve and/or present build-volume BV3 as a “blank” logical unit number (LUN) to build server 206. Windows-based build server 206 may then treat build-volume BV3310 as any other storage volume accessible as a LUN, yet the storage space occupied by build-volume BV3310 is managed as ZFS space. Storage management server 201 may treat each volume in the ZFS pool as an individual iSCSI target. Furthermore, storage management server 201 may provide to build server 206 an iSCSI initiator address to use with the particular iSCSI target, such as build-volume BV3310.
Once communicative coupling has been established between build server 206 and build-volume BV3310, build server 206 may access build-volume BV3 via storage management server 201, e.g., using iSCSI protocol; may map BV3 to build server 206; may mount BV3 to build server 206 as a LUN and format BV3 according to a Windows-based file system, e.g., NTFS and may use BV3 as an NTFS volume going forward. The Windows-based build server 206 lacks any awareness that build-volume BV3310 was established and/or is managed by a ZFS file system, such as ZFS 202, e.g., build server 206 lacks any configuration settings/parameters, administration settings/parameters, feature activation, and/or protocol conversion, etc. relative to the ZFS nature of build-volume BV3310. Windows-based build server 206 is not configured for ZFS nor does it natively support ZFS. Instead, Windows-based build server 206 may access build-volume BV3310 based on a Windows operating system and Windows-based file system (e.g., NTFS) that execute on the Windows-based server 206. Windows-based build server 206 may write data to and/or read data from build-volume BV3310, e.g., build server 206 may store a software base or a software build to BV3. See also
Build-volume BV3 (element 310) illustratively comprises a software base and acts as a source for ZFS clones that are to be used for workspaces. Supervolume SV 220 may comprise any number of distinct build-volumes such as BV3, each build-volume comprising a software base, and each build-volume acting as a source for respective workspaces.
Development support server 401 may be a computing device and/or data processor that may also include a user interface for developer access to the development environment in system 200. Development support server 401 may be in communication with storage management server 201 and also with one or more developer Windows-based machines D, e.g., D1 shown here (component 108-1). Development support server 401 may rely on a web-based interface that provides developers with utilities to request and configure workspaces in system 200 as needed. The utilities may interoperate with storage management server 201 to respond to developers' requests for workspaces.
For example, based on the present illustrative configuration, a user/developer may request a workspace of the build-volume BV3, which contains a certain software build of interest to the developer, e.g., build 16. The developer may request any number of workspaces in reference to other build-volumes, analogous to BV3, that may be available on storage array 204 or on another storage device in system 200 (not shown). Although development support server 401 is shown here as a separate computing device, distinct from component 201, in some alternative embodiments, the functionality of development support server 401 may be provided by storage management server 201 and/or by build server 206.
ZFS clone Z1 (element 411-1) represents a copy of build-volume BV3, and may be generated by ZFS volume manager and file system 202. ZFS clone Z1 is part of the same ZFS pool as the source volume, i.e., build-volume BV3. ZFS volume manager and file system 202 may create any number of ZFS clones Z within the ZFS pool—within the constraints of ZFS features and storage array capacities.
Logical operation 4 illustrates the Unix-based storage management server 201 (e.g., using ZFS volume manager and file system 202) creating a ZFS clone of build-volume BV3, illustratively designated ZFS clone Z1 (element 411-1). This operation may occur in response to a request issued by user computing device D1, and may be received via development support server 401. See also
A ZFS clone such as ZFS clone Z1 may occupy substantially less physical storage space than an array-created hardware snapshot such as S1, because ZFS clones may use virtual space allocation to represent a copy of data from the source volume—as managed by the ZFS volume manager and file system 202. Thus, a ZFS clone may represent a copy of a source volume, such as BV3, from which the Z1 clone is cloned, yet the ZFS clone may take up less physical space than a full image of the source that may be provided by an array-created hardware snapshot such as S1.
Logical operation 5 depicts the Unix-based storage management server 201 serving and/or presenting ZFS clone Z1 (element 411-1) as a logical unit number (LUN), illustratively designated “LUN-1,” to a Windows-based computing device such as user computing device 108-1. This is accomplished in part by providing a communicative coupling between the Windows-based computing device (e.g., 108-1) and LUN-1—via the Unix-based storage management server 201. See also logical operation 3.
Windows-based computing device 108-1 may access (via the Unix-based storage management server 201) the data in the storage volume mounted as LUN-1 without any awareness that the volume designated LUN-1 was set up under ZFS, e.g., computing device 108-1 lacks any configuration settings/parameters, administration settings/parameters, feature activation, and/or protocol conversion, etc. relative to the ZFS nature of the storage space designated by LUN-1. Windows-based computing device 108-1 is not configured for ZFS nor does it natively support ZFS. Instead, Windows-based computing device 108-1 may perform, natively based on a Windows operating system and Windows-based file system (e.g., NTFS), one or more of the following functionality without limitation: map the cloned volume 411-1 and mount it as a logical unit number, e.g., LUN-1; access data in LUN-1, which was cloned from source volume BV3 in logical operation 4, and recognize file system metadata therein, e.g., indicating that this is an NTFS volume same as the source volume BV3. The developer's Windows-based machine 108 now has access, via the Unix-based storage management server 201, to a workspace that is a copy of the source build-volume BV3.
At this point, Windows-based computing device 108-1 has obtained native Windows-based access to data in a storage volume that is actually managed by the Unix-based storage management server 201 as a ZFS clone in a ZFS pool. The ZFS nature of the accessed storage volume is unbeknownst to the Windows-based developer's machine. This enables Windows-based utilities, applications, and tools, e.g., software development utilities executing on the developer's Windows-based machine 108-1, to operate upon the data in LUN-1 (really ZFS clone Z1) the same as they might have operated on a workspace in an array-created hardware snapshot such as snapshot S1 in the prior art. No protocol conversion between Windows and Unix is required according to the illustrative embodiment. Native ZFS support on Windows-based computing devices also is not required. Accordingly, users may access/use storage space from their Windows-based computing devices (e.g., 108) according to a Windows-based file system such as NTFS, while the actual storage space is managed under a Unix-based file system such as ZFS volume manager and file system 202.
User computing device 108-n (developer's machine Dn) is a Windows-based computing device analogous to component 108-1. System 200 may comprise any number of Windows-based computing devices 108.
ZFS clone Zn (element 411-n) is analogous to ZFS clone Z1 (element 411-1) and is likewise created within a ZFS pool by storage management server 201, e.g., using ZFS volume manager and file system 202. This is illustrated by logical operation 4n, which is analogous to logical operation 4 described in more detail elsewhere herein. Storage management server 201 may create any number of ZFS clones Z within the ZFS pool, subject to ZFS features and actual storage capacity on storage array 204.
Logical operation 5n is analogous to operation 5 described in more detail elsewhere herein. ZFS clone Zn is served as “LUN-n” to Windows-based user computing device 108-n. Storage management server 201 may execute and/or participate in any number of logical operations 5 according to the illustrative embodiment.
At block 701, a raw volume in a storage array (e.g., 204) may be mounted to a Unix-based computing device such as storage management server 201 and may be formatted as a ZFS volume and a ZFS pool may be created, e.g., supervolume 220, by the Unix-based computing device 201, e.g., using ZFS volume manager and file system 202 executing thereon. See also
At block 703, the Unix-based storage management server 201 may create a build-volume in the ZFS pool, e.g., build-volume BV3 (element 310). This operation may occur in response to a request and/or instruction received from a Windows-based computing device such as build server 206. See also
At block 705, the Unix-based storage management server 201 may provide communicative coupling between Windows-based build server 206 and build-volume BV3, such that build-volume BV3 is presented and/or served as a logical unit number (LUN) to build server 206. See also
At block 707, the Windows-based build server 206 may map and mount the logical unit number (LUN) served in the preceding operation, thus accessing build-volume BV3 via storage management server 201. See also
At block 709, the Windows-based build server 206 may access build-volume BV3 using a Windows-based file system, e.g., NTFS, and may format build-volume BV3 accordingly, e.g., as an NTFS volume. See also
At block 711, having established build-volume BV3 as an accessible Windows-based volume, e.g., NTFS, Windows-based build server 206 may now use build-volume BV3. One illustrative use is to store a software base to build-volume BV3, e.g., build 16. Build-volume BV3 will now act as a source volume for workspaces requested by developers. See also
At block 801, a Windows-based computing device such as Windows-based user computing device (developer's machine) 108 (e.g., 108-1) may request a workspace of a particular software base, such as, illustratively, build 16 stored in build-volume BV3. The request may be entered by a user (developer) via a user interface. The request may be transmitted as a request and/or instruction to Unix-based storage management server 201, directly, or in some embodiments indirectly, e.g., via development support server 401, which is in communication with storage management server 201. See also
At block 803, Unix-based storage management server 201 (e.g., using ZFS volume manager and file system 202) may create, in response to the preceding request, a ZFS done within the ZFS pool created at operation 701, e.g., stored in supervolume SV 220. The ZFS clone, such as ZFS clone Z1, may be managed according to ZFS features within the ZFS pool. See also
At block 805, the Unix-based storage management server 201 may provide communicative coupling between the requesting Windows-based computing device 108-1 and ZFS clone Z1, such that the ZFS clone Z1 is presented and/or served as a logical unit number (illustratively “LUN-1”) to the Windows-based computing device 108-1. See also
At block 807, the Windows-based computing device 108-1 may map and mount the logical unit number served in the preceding operation (LUN-1), thus accessing ZFS clone Z1 via storage management server 201. See also
At block 809, the Windows-based computing device 108-1 using its own native Windows-based file system, e.g., NTFS, may access the data in LUN-1 based at least in part on the metadata in LUN-1 which was ZFS-cloned from the NTFS source volume BV3. The developer may now use the copy of software base from LUN-1 as a workspace, using native Windows-based applications, utilities, and/or tools executing on Windows-based computing device 108-1. See also
At block 811, the operations 801-809 may be repeated any number of times for any number of Windows-based computing devices 108, each requesting its own respective workspace(s) of the software base in build-volume BV3 (and/or in other similar ZFS-based build-volumes in storage array 204). As explained, the result is that less actual storage space may be occupied on the storage array by the totality of the ZFS pool (e.g., SV 220) than using storage array-created hardware snapshots in the prior art (e.g., Σ(BV1, S1, . . . , Sn)). See also
System 200 may support any number of software bases and any number of build-volumes such as BV3. Storage management server 201 may establish these other build-volumes in the same ZFS pool as supervolume 220 or in a separate ZFS pool comprising its own allocated storage on storage array 204, or any combination thereof, without limitation. System 200 may also support any number of workspace requests from any number of developers' Windows-based computing devices 108.
In regard to the components, blocks, operations and/or sub-operations described in reference to
According to an example embodiment, a system for using a Unix-based Z file system (ZFS file system) in a Windows-based computing environment may comprise: a Unix-based computing device for managing storage space as a ZFS file system; a storage array comprising the storage space managed as a ZFS file system by the Unix-based computing device; a Windows-based server in communication with the Unix-based computing device; wherein the Unix-based computing device is configured to: create a first volume on the storage array, mount the first volume as a ZFS pool, create a second volume within the ZFS pool, and provide a communicative coupling between the Windows-based server and the second volume, such that the second volume is presented as a first logical unit number (LUN) to the Windows-based server; wherein the Windows-based server is configured to: mount the first LUN, access the second volume represented by the first LUN, format the second volume according to a Windows-based file system, wherein metadata stored to the second volume indicates that the second volume is formatted as a Windows-based file system, and wherein the Windows-based server lacks any configuration that indicates that the second volume was created within a ZFS pool; and wherein the Unix-based computing device lacks any configuration that indicates that the second volume within the ZFS pool has been formatted by the Windows-based server according to the Windows-based file system. The above-recited system wherein the Unix-based computing device is further configured to manage the first volume as a ZFS pool in the ZFS file system. The above-recited system wherein the Windows-based server is configured to use the second volume stored in the storage array as a volume within the Windows-based file system, wherein the second volume was created, by the Unix-based computing device, within the ZFS pool.
According to one example embodiment, a tangible non-transitory computer-readable storage medium may store instructions, which when implemented by at least one Unix-based computing device, perform a method for using a Unix-based ZFS file system in a Windows-based computing environment, the method comprising: managing a storage volume stored in a storage array under a ZFS file system that executes on the Unix-based computing device; mounting the storage volume as a ZFS pool on the Unix-based computing device; creating a second volume within the ZFS pool, based at least in part on a request received from a Windows-based server; and providing a communicative coupling between the Windows-based server and the second volume, such that the second volume is served as a first logical unit number (LUN) to the Windows-based server, wherein the Windows-based server lacks native support for the ZFS file system. The above-recited tangible non-transitory computer-readable storage medium, wherein the method further comprises: creating a third volume as a first ZFS clone of the second volume, within the ZFS pool, based at least in part on a request issued by a first Windows-based computing device that is distinct from the Windows-based server, wherein the third volume comprises a copy of first data cloned from the second volume; and providing, a communicative coupling between the first Windows-based computing device and the third volume, such that the third volume is served as a second LUN to the first Windows-based computing device, wherein the first Windows-based computing device lacks native support for the ZFS file system.
According to another exemplary embodiment, a tangible computer-readable storage medium whose contents may cause a system comprising a Unix-based computing device to perform a method for using a Unix-based ZFS file system in a Windows-based computing environment, the method comprising: managing a storage volume stored in a storage array under a ZFS file system that executes on the Unix-based computing device; mounting the first volume as a ZFS pool on the Unix-based computing device; creating a second volume within the ZFS pool, based at least in part on a request received from a Windows-based server; and providing a communicative coupling between the Windows-based server and the second volume, such that the second volume is served as a first logical unit number (LUN) to the Windows-based server, wherein the Windows-based server lacks native support for the ZFS file system. The above-recited tangible computer-readable storage medium wherein the method further comprises: creating a third volume as a first ZFS clone of the second volume, within the ZFS pool, based at least in part on a request issued by a first Windows-based computing device that is distinct from the Windows-based server, wherein the third volume comprises a copy of first data cloned from the second volume; and providing, a communicative coupling between the first Windows-based computing device and the third volume, such that the third volume is served as a second LUN to the first Windows-based computing device, wherein the first Windows-based computing device lacks native support for the ZFS file system.
According to another embodiment, a method for using a Unix-based ZFS file system in a Windows-based computing environment may comprise: managing a storage volume stored in a storage array under the Unix-based ZFS file system that executes on a Unix-based computing device; mounting the storage volume as a ZFS pool on the Unix-based computing device; creating, by the Unix-based computing device, a second volume within the ZFS pool; providing, by the Unix-based computing device, a communicative coupling between the Windows-based server and the second volume, such that the second volume is presented as a first logical unit number (LUN) to the Windows-based server; mounting the first LUN to the Windows-based server; accessing the second volume by the Windows-based server via the Unix-based computing device; formatting the second volume, by a Windows-based file system that executes on the Windows-based server; storing to the second volume first data that is generated by the Windows-based server; creating, by the Unix-based computing device executing the Unix-based ZFS file system, a third volume as a first ZFS clone of the second volume, within the ZFS pool, based at least in part on a request received from a first Windows-based computing device that is distinct from the Windows-based server, wherein the third volume comprises a copy of the first data cloned from the second volume; providing, by the Unix-based computing device, a communicative coupling between the first Windows-based computing device and the third volume, such that the third volume is presented as a second LUN to the first Windows-based computing device; mounting the second LUN to the first Windows-based computing device; accessing the third volume by the Windows-based computing device via the Unix-based computing device; and using the third volume under the Windows-based file system, based on metadata which is cloned from the second volume, which metadata indicates that the third volume is formatted according to the Windows-based file system, wherein the using of the third volume comprises accessing, by the Windows-based computing device, the copy of the first data cloned to the third volume.
The above-recited method wherein the first data comprises a first software base generated by the Windows-based server; and accessing the first software base, by the first Windows-based computing device, as a workspace in the third volume. The above-recited method wherein the first Windows-based computing device lacks any configuration that indicates that the second volume was created within a ZFS pool; and wherein the Unix-based computing device lacks any configuration that indicates that the second volume within the ZFS pool has been formatted by the Windows-based server according to the Windows-based file system. The above-recited method wherein the first Windows-based computing device lacks any configuration that indicates that the third volume was created as a ZFS clone within a ZFS pool.
According to another illustrative embodiment, a method may comprise: creating a first volume stored in a storage array, by a Unix-based computing device that executes a Z file system (ZFS), wherein the first volume is created under the ZFS file system; mounting the first volume as a ZFS pool on the Unix-based computing device; creating, by the Unix-based computing device, a second volume within the ZFS pool; providing, by the Unix-based computing device, a communicative coupling between the Windows-based server and the second volume, such that the second volume is presented as a first logical unit number (LUN) to the Windows-based server; formatting the second volume, by a Windows-based file system that executes on the Windows-based server, according to the Windows-based file system; storing to the second volume first data that is generated by the Windows-based server; creating, by the Unix-based computing device, a third volume as a first ZFS clone of the second volume, within the ZFS pool, wherein the third volume comprises a copy of the first data cloned from the second volume; providing, by the Unix-based computing device, a communicative coupling between the third volume on the storage array and a first Windows-based computing device that is distinct from the Windows-based server, such that the third volume is presented as a second LUN to the first Windows-based computing device; and using the third volume under the Windows-based file system, based on metadata which is cloned from the second volume, which metadata indicates that the third volume is formatted according to the Windows-based file system, wherein the using of the third volume comprises accessing, by the Windows-based computing device, the copy of the first data cloned to the third volume; wherein the first Windows-based computing device lacks any configuration that indicates that the second volume and third volume were created within a ZFS pool and also lacks native support for the ZFS file system; and wherein the Unix-based computing device lacks any configuration that indicates that the second volume within the ZFS pool has been formatted by the Windows-based server according to the Windows-based file system.
The above-recited method wherein the first data comprises a first software base generated by the Windows-based server; and accessing the first software base, by the first Windows-based computing device, as a workspace in the third volume. The above-recited method wherein the Unix-based computing device creates the first ZFS clone in response to a request issued by the first Windows-based computing device.
According to yet another embodiment, a method for using a Unix-based ZFS file system in a Windows-based computing environment may comprise: accessing a first storage volume from a Windows-based computing device using a Windows-based file system executing on the Windows-based computing device; wherein the first storage volume is mounted as a first logical unit number (LUN) to the Windows-based computing device; and wherein the first storage volume is part of a ZFS pool managed under a ZFS file system by a Unix-based computing device, Unix-based computing device which is communicatively coupled to the Windows-based computing device and to a storage device that hosts the storage space allocated to the ZFS pool; and wherein the Windows-based computing device lacks native support for the ZFS file system; and wherein the Windows-based computing accessing the first storage volume device lacks any configuration that indicates that the first storage volume is part of a ZFS pool managed by the Unix-based computing device.
The above-recited method further comprising: issuing a request for a copy of the first storage volume, wherein the request is issued by a Windows-based computing device is one of: the same as the Windows-based computing device accessing the first storage volume, and another Windows-based computing device which is also communicatively coupled to the Unix-based computing device; creating by the Unix-based computing device, in response to the request, a ZFS clone of the first storage volume, wherein the ZFS clone is also part of the ZFS pool, and wherein the ZFS done represents the requested copy of the first storage volume; and presenting the ZFS clone to the requesting Windows-based computing device as a second logical unit number (LUN) to be mounted to the requesting Windows-based computing device, wherein the Windows-based computing device lacks native support for the ZFS file system. The above-recited method further comprising: mounting the second logical unit number (LUN) to the requesting Windows-based computing device; and accessing, by the requesting Window-based computing device, the requested copy of the first storage volume in the second logical unit number (LUN); wherein the requesting Windows-based computing device lacks any configuration that indicates that storage space represented by the second logical unit number (LUN) is managed by the Unix-based computing device as part of a ZFS pool.
According to another example embodiment, a system for using a Unix-based ZFS file system in a Windows-based computing environment may comprise: a storage array comprising a storage space; a Unix-based computing device for managing the storage space on the storage array as a ZFS file system; wherein the Unix-based computing device is configured to: create a first volume under the ZFS file system, which first volume is stored on the storage array, mount the first volume as a ZFS pool, create a second volume within the ZFS pool, and present the second volume as a first logical unit number (LUN) to a first Windows-based computing device; the first Windows-based computing device in communication with the Unix-based computing device; and wherein the first Windows-based computing device is configured to: mount the first logical unit number (LUN), and access the second volume under a Windows-based file system executing on the first Windows-based computing device.
The above-recited system wherein the Unix-based computing device is further configured to: create a ZFS clone of the first storage volume, wherein the ZFS clone is also part of the ZFS pool, and wherein the ZFS clone represents a copy of the second volume; and present the ZFS clone to a second Windows-based computing device as a second logical unit number (LUN). The above-recited system wherein the Unix-based computing device is further configured to: create a ZFS clone of the first storage volume, wherein the ZFS clone is also part of the ZFS pool, and wherein the ZFS clone represents a copy of the second volume; and present the ZFS clone to a second Windows-based computing device as a second logical unit number (LUN); and the second Windows-based computing device in communication with the Unix-based computing device, wherein the second Windows-based computing device is configured to: mount the second logical unit number (LUN), and access the copy of the second volume under a Windows-based file system executing on the second Windows-based computing device.
Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” As used herein, the terms “connected,” “coupled,” or any variant thereof means any connection or coupling, either direct or indirect, between two or more elements; the coupling or connection between the elements can be physical, logical, or a combination thereof. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or” in reference to a list of two or more items, covers all of the following interpretations of the word: any one of the items in the list, all of the items in the list, and any combination of the items in the list. Likewise the term “and/or” in reference to a list of two or more items, covers all of the following interpretations of the word: any one of the items in the list, all of the items in the list, and any combination of the items in the list.
Depending on the embodiment, certain operations, acts, events, or functions of any of the algorithms described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all are necessary for the practice of the algorithms). Moreover, in certain embodiments, operations, acts, functions, or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially.
Systems and modules described herein may comprise software, firmware, hardware, or any combination(s) of software, firmware, or hardware suitable for the purposes described herein. Software and other modules may reside and execute on servers, workstations, personal computers, computerized tablets, PDAs, and other computing devices suitable for the purposes described herein. Software and other modules may be accessible via local memory, via a network, via a browser, or via other means suitable for the purposes described herein. Data structures described herein may comprise computer files, variables, programming arrays, programming structures, or any electronic information storage schemes or methods, or any combinations thereof, suitable for the purposes described herein. User interface elements described herein may comprise elements from graphical user interfaces, interactive voice response, command line interfaces, and other suitable interfaces.
Further, the processing of the various components of the illustrated systems can be distributed across multiple machines, networks, and other computing resources. In addition, two or more components of a system can be combined into fewer components. Various components of the illustrated systems can be implemented in one or more virtual machines, rather than in dedicated computer hardware systems and/or computing devices. Likewise, the data repositories shown can represent physical and/or logical data storage, including, for example, storage area networks or other distributed storage systems. Moreover, in some embodiments the connections between the components shown represent possible paths of data flow, rather than actual connections between hardware. While some examples of possible connections are shown, any of the subset of the components shown can communicate with any other subset of components in various implementations.
Embodiments are also described above with reference to flow chart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products. Each block of the flow chart illustrations and/or block diagrams, and combinations of blocks in the flow chart illustrations and/or block diagrams, may be implemented by computer program instructions. Such instructions may be provided to a processor of a general purpose computer, special purpose computer, specially-equipped computer (e.g., comprising a high-performance database server, a graphics subsystem, etc.) or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor(s) of the computer or other programmable data processing apparatus, create means for implementing the acts specified in the flow chart and/or block diagram block or blocks.
These computer program instructions may also be stored in a non-transitory computer-readable memory that can direct a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the acts specified in the flow chart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computing device or other programmable data processing apparatus to cause a series of operations to be performed on the computing device or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the acts specified in the flow chart and/or block diagram block or blocks.
Any patents and applications and other references noted above, including any that may be listed in accompanying filing papers, are incorporated herein by reference. Aspects of the invention can be modified, if necessary, to employ the systems, functions, and concepts of the various references described above to provide yet further implementations of the invention.
These and other changes can be made to the invention in light of the above Detailed Description. While the above description describes certain examples of the invention, and describes the best mode contemplated, no matter how detailed the above appears in text, the invention can be practiced in many ways. Details of the system may vary considerably in its specific implementation, while still being encompassed by the invention disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the invention should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the invention with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the invention to the specific examples disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the invention encompasses not only the disclosed examples, but also all equivalent ways of practicing or implementing the invention under the claims.
To reduce the number of claims, certain aspects of the invention are presented below in certain claim forms, but the applicant contemplates the various aspects of the invention in any number of claim forms. For example, while only one aspect of the invention is recited as a means-plus-function claim under 35 U.S.C sec. 112(f) (AIA), other aspects may likewise be embodied as a means-plus-function claim, or in other forms, such as being embodied in a computer-readable medium. Any claims intended to be treated under 35 U.S.C. § 112(f) will begin with the words “means for”, but use of the term “for” in any other context is not intended to invoke treatment under 35 U.S.C. § 112(f). Accordingly, the applicant reserves the right to pursue additional claims after filing this application, in either this application or in a continuing application.
Number | Name | Date | Kind |
---|---|---|---|
4686620 | Ng | Aug 1987 | A |
4995035 | Cole et al. | Feb 1991 | A |
5005122 | Griffin et al. | Apr 1991 | A |
5093912 | Dong et al. | Mar 1992 | A |
5133065 | Cheffetz et al. | Jul 1992 | A |
5193154 | Kitajima et al. | Mar 1993 | A |
5212772 | Masters | May 1993 | A |
5226157 | Nakano et al. | Jul 1993 | A |
5239647 | Anglin et al. | Aug 1993 | A |
5241668 | Eastridge et al. | Aug 1993 | A |
5241670 | Eastridge et al. | Aug 1993 | A |
5263154 | Eastridge et al. | Nov 1993 | A |
5276860 | Fortier et al. | Jan 1994 | A |
5276867 | Kenley et al. | Jan 1994 | A |
5287500 | Stoppani, Jr. | Feb 1994 | A |
5317731 | Dias et al. | May 1994 | A |
5321816 | Rogan et al. | Jun 1994 | A |
5333315 | Saether et al. | Jul 1994 | A |
5347653 | Flynn et al. | Sep 1994 | A |
5369757 | Spiro et al. | Nov 1994 | A |
5403639 | Belsan et al. | Apr 1995 | A |
5410700 | Fecteau et al. | Apr 1995 | A |
5448724 | Hayashi | Sep 1995 | A |
5491810 | Allen | Feb 1996 | A |
5495607 | Pisello et al. | Feb 1996 | A |
5504873 | Martin et al. | Apr 1996 | A |
5544345 | Carpenter et al. | Aug 1996 | A |
5544347 | Yanai et al. | Aug 1996 | A |
5559957 | Balk | Sep 1996 | A |
5559991 | Kanfi | Sep 1996 | A |
5604862 | Midgely et al. | Feb 1997 | A |
5619644 | Crockett et al. | Apr 1997 | A |
5638509 | Dunphy et al. | Jun 1997 | A |
5642496 | Kanfi | Jun 1997 | A |
5673381 | Huai et al. | Sep 1997 | A |
5699361 | Ding et al. | Dec 1997 | A |
5720026 | Uemura et al. | Feb 1998 | A |
5729743 | Squibb | Mar 1998 | A |
5751997 | Kullick et al. | May 1998 | A |
5758359 | Saxon | May 1998 | A |
5761677 | Senator et al. | Jun 1998 | A |
5764972 | Crouse et al. | Jun 1998 | A |
5765173 | Cane et al. | Jun 1998 | A |
5778395 | Whiting et al. | Jul 1998 | A |
5790114 | Geaghan et al. | Aug 1998 | A |
5812398 | Nielsen | Sep 1998 | A |
5813009 | Johnson et al. | Sep 1998 | A |
5813017 | Morris | Sep 1998 | A |
5819292 | Hitz et al. | Oct 1998 | A |
5875478 | Blumenau | Feb 1999 | A |
5878408 | Van Huben et al. | Mar 1999 | A |
5887134 | Ebrahim | Mar 1999 | A |
5901327 | Ofek | May 1999 | A |
5907672 | Matze et al. | May 1999 | A |
5924102 | Perks | Jul 1999 | A |
5950205 | Aviani, Jr. | Sep 1999 | A |
5974563 | Beeler, Jr. | Oct 1999 | A |
6021415 | Cannon et al. | Feb 2000 | A |
6021475 | Nguyen et al. | Feb 2000 | A |
6026414 | Anglin | Feb 2000 | A |
6052735 | Ulrich et al. | Apr 2000 | A |
6072490 | Bates et al. | Jun 2000 | A |
6076148 | Kedem | Jun 2000 | A |
6094416 | Ying | Jul 2000 | A |
6101585 | Brown et al. | Aug 2000 | A |
6131095 | Low et al. | Oct 2000 | A |
6131148 | West et al. | Oct 2000 | A |
6131190 | Sidwell | Oct 2000 | A |
6148412 | Cannon et al. | Nov 2000 | A |
6154787 | Urevig et al. | Nov 2000 | A |
6161111 | Mutalik et al. | Dec 2000 | A |
6167402 | Yeager | Dec 2000 | A |
6195695 | Cheston et al. | Feb 2001 | B1 |
6205450 | Kanome | Mar 2001 | B1 |
6212512 | Barney et al. | Apr 2001 | B1 |
6260069 | Anglin | Jul 2001 | B1 |
6269431 | Dunham | Jul 2001 | B1 |
6275953 | Vahalia et al. | Aug 2001 | B1 |
6301592 | Aoyama et al. | Oct 2001 | B1 |
6311193 | Sekido | Oct 2001 | B1 |
6324581 | Xu et al. | Nov 2001 | B1 |
6328766 | Long | Dec 2001 | B1 |
6330570 | Crighton | Dec 2001 | B1 |
6330642 | Carteau | Dec 2001 | B1 |
6343324 | Hubis et al. | Jan 2002 | B1 |
RE37601 | Eastridge et al. | Mar 2002 | E |
6356801 | Goodman et al. | Mar 2002 | B1 |
6366986 | St. Pierre et al. | Apr 2002 | B1 |
6366988 | Skiba et al. | Apr 2002 | B1 |
6374363 | Wu et al. | Apr 2002 | B1 |
6389432 | Pothapragada et al. | May 2002 | B1 |
6418478 | Ignatius et al. | Jul 2002 | B1 |
6421711 | Blumenau et al. | Jul 2002 | B1 |
6434681 | Armangau | Aug 2002 | B1 |
6473775 | Kusters et al. | Oct 2002 | B1 |
6487561 | Ofek et al. | Nov 2002 | B1 |
6519679 | Devireddy et al. | Feb 2003 | B2 |
6538669 | Lagueux, Jr. et al. | Mar 2003 | B1 |
6542972 | Ignatius et al. | Apr 2003 | B2 |
6564228 | O'Connor | May 2003 | B1 |
6604118 | Kleiman et al. | Aug 2003 | B2 |
6631477 | LeCrone et al. | Oct 2003 | B1 |
6643671 | Milillo et al. | Nov 2003 | B2 |
6647473 | Golds et al. | Nov 2003 | B1 |
6651075 | Kusters et al. | Nov 2003 | B1 |
6658526 | Nguyen et al. | Dec 2003 | B2 |
6662198 | Satyanarayanan et al. | Dec 2003 | B2 |
6665815 | Goldstein et al. | Dec 2003 | B1 |
6721767 | De Meno et al. | Apr 2004 | B2 |
6728736 | Hostetter et al. | Apr 2004 | B2 |
6732125 | Autrey et al. | May 2004 | B1 |
6760723 | Oshinsky et al. | Jul 2004 | B2 |
6792518 | Armangau et al. | Sep 2004 | B2 |
6799258 | Linde | Sep 2004 | B1 |
6826661 | Umbehocker et al. | Nov 2004 | B2 |
6832299 | Shimada et al. | Dec 2004 | B2 |
6871271 | Ohran et al. | Mar 2005 | B2 |
6880051 | Timpanaro-Perrotta | Apr 2005 | B2 |
6898688 | Martin et al. | May 2005 | B2 |
6912627 | Matsunami et al. | Jun 2005 | B2 |
6915313 | Yao | Jul 2005 | B2 |
6938135 | Kekre et al. | Aug 2005 | B1 |
6948038 | Berkowitz et al. | Sep 2005 | B2 |
6948089 | Fujibayashi | Sep 2005 | B2 |
6954834 | Slater et al. | Oct 2005 | B2 |
6959310 | Eshel et al. | Oct 2005 | B2 |
6981114 | Wu et al. | Dec 2005 | B1 |
6981177 | Beattie | Dec 2005 | B2 |
6993539 | Federwisch et al. | Jan 2006 | B2 |
7003641 | Prahlad et al. | Feb 2006 | B2 |
7035880 | Crescenti et al. | Apr 2006 | B1 |
7080088 | Lau | Jul 2006 | B1 |
7165079 | Chen et al. | Jan 2007 | B1 |
7174352 | Kleiman et al. | Feb 2007 | B2 |
7209972 | Ignatius et al. | Apr 2007 | B1 |
7225204 | Manley et al. | May 2007 | B2 |
7225208 | Midgley et al. | May 2007 | B2 |
7225210 | Guthrie, II | May 2007 | B2 |
7231544 | Tan et al. | Jun 2007 | B2 |
7234115 | Sprauve et al. | Jun 2007 | B1 |
7237075 | Welsh et al. | Jun 2007 | B2 |
7240219 | Teicher et al. | Jul 2007 | B2 |
7275177 | Armangau et al. | Sep 2007 | B2 |
7296125 | Ohran | Nov 2007 | B2 |
7346623 | Prahlad et al. | Mar 2008 | B2 |
7383538 | Bates et al. | Jun 2008 | B2 |
7386532 | Kiessig et al. | Jun 2008 | B2 |
7395282 | Crescenti et al. | Jul 2008 | B1 |
7406048 | Datta et al. | Jul 2008 | B2 |
7412583 | Burton et al. | Aug 2008 | B2 |
7426052 | Cox et al. | Sep 2008 | B2 |
7454443 | Ram et al. | Nov 2008 | B2 |
7480779 | Tsuji | Jan 2009 | B2 |
7509316 | Greenblatt et al. | Mar 2009 | B2 |
7523278 | Thompson et al. | Apr 2009 | B2 |
7529782 | Prahlad et al. | May 2009 | B2 |
7539707 | Prahlad et al. | May 2009 | B2 |
7539735 | Fruchtman et al. | May 2009 | B2 |
7549028 | Thompson et al. | Jun 2009 | B2 |
7565572 | Yamasaki | Jul 2009 | B2 |
7567991 | Armangau et al. | Jul 2009 | B2 |
7568080 | Prahlad et al. | Jul 2009 | B2 |
7580950 | Kavuri et al. | Aug 2009 | B2 |
7587563 | Teterin et al. | Sep 2009 | B1 |
7596611 | Satish et al. | Sep 2009 | B1 |
7600219 | Tsantilis | Oct 2009 | B2 |
7620666 | Root et al. | Nov 2009 | B1 |
7651593 | Prahlad et al. | Jan 2010 | B2 |
7668884 | Prahlad et al. | Feb 2010 | B2 |
7707184 | Zhang et al. | Apr 2010 | B1 |
7716171 | Kryger | May 2010 | B2 |
7716183 | Lee | May 2010 | B2 |
7725440 | Reed et al. | May 2010 | B2 |
7734578 | Prahlad et al. | Jun 2010 | B2 |
7761456 | Cram et al. | Jul 2010 | B1 |
7840533 | Prahlad et al. | Nov 2010 | B2 |
7840537 | Gokhale et al. | Nov 2010 | B2 |
7844577 | Becker et al. | Nov 2010 | B2 |
7873806 | Prahlad et al. | Jan 2011 | B2 |
7882077 | Gokhale et al. | Feb 2011 | B2 |
7933927 | Dee et al. | Apr 2011 | B2 |
7979389 | Prahlad et al. | Jul 2011 | B2 |
8055625 | Prahlad et al. | Nov 2011 | B2 |
8117410 | Lu et al. | Feb 2012 | B2 |
8140786 | Bunte et al. | Mar 2012 | B2 |
8140794 | Prahlad et al. | Mar 2012 | B2 |
8161077 | Zha et al. | Apr 2012 | B2 |
8170995 | Prahlad et al. | May 2012 | B2 |
8195623 | Prahlad et al. | Jun 2012 | B2 |
8219524 | Gokhale | Jul 2012 | B2 |
8245192 | Chen | Aug 2012 | B1 |
8285671 | Prahlad et al. | Oct 2012 | B2 |
8307177 | Prahlad et al. | Nov 2012 | B2 |
8401996 | Muller et al. | Mar 2013 | B2 |
8433682 | Ngo | Apr 2013 | B2 |
8433872 | Prahlad et al. | Apr 2013 | B2 |
8442944 | Prahlad et al. | May 2013 | B2 |
8453145 | Naik | May 2013 | B1 |
8468518 | Wipfel | Jun 2013 | B2 |
8489830 | Wu et al. | Jul 2013 | B2 |
8543998 | Barringer | Sep 2013 | B2 |
8544016 | Friedman et al. | Sep 2013 | B2 |
8578120 | Attarde et al. | Nov 2013 | B2 |
8583594 | Prahlad et al. | Nov 2013 | B2 |
8595191 | Prahlad et al. | Nov 2013 | B2 |
8655846 | Prahlad et al. | Feb 2014 | B2 |
8719767 | Bansod | May 2014 | B2 |
8726242 | Ngo | May 2014 | B2 |
8805953 | Murphy et al. | Aug 2014 | B2 |
8898411 | Prahlad et al. | Nov 2014 | B2 |
8959299 | Ngo et al. | Feb 2015 | B2 |
20020107877 | Whiting et al. | Aug 2002 | A1 |
20030028514 | Lord et al. | Feb 2003 | A1 |
20030033346 | Carlson et al. | Feb 2003 | A1 |
20030167380 | Green et al. | Sep 2003 | A1 |
20030177149 | Coombs | Sep 2003 | A1 |
20040139125 | Strassburg et al. | Jul 2004 | A1 |
20040170374 | Bender et al. | Sep 2004 | A1 |
20040230566 | Balijepalli et al. | Nov 2004 | A1 |
20040260678 | Verbowski et al. | Dec 2004 | A1 |
20050203864 | Schmidt et al. | Sep 2005 | A1 |
20060224846 | Amarendran et al. | Oct 2006 | A1 |
20070185940 | Prahlad et al. | Aug 2007 | A1 |
20080183775 | Prahlad et al. | Jul 2008 | A1 |
20080228771 | Prahlad et al. | Sep 2008 | A1 |
20090276771 | Nickolov et al. | Nov 2009 | A1 |
20090319534 | Gokhale | Dec 2009 | A1 |
20100070474 | Lad | Mar 2010 | A1 |
20100077165 | Lu et al. | Mar 2010 | A1 |
20100082672 | Kottomtharayil et al. | Apr 2010 | A1 |
20100293144 | Bonnet | Nov 2010 | A1 |
20100312754 | Bear et al. | Dec 2010 | A1 |
20100313185 | Gupta et al. | Dec 2010 | A1 |
20110153697 | Nickolov | Jun 2011 | A1 |
20110283113 | Moffat | Nov 2011 | A1 |
20130246360 | Ngo | Sep 2013 | A1 |
20130262387 | Varadharajan et al. | Oct 2013 | A1 |
20130332610 | Beveridge | Dec 2013 | A1 |
20140075031 | Doering | Mar 2014 | A1 |
20140075440 | Prahlad et al. | Mar 2014 | A1 |
20140114922 | Prahlad et al. | Apr 2014 | A1 |
20140279950 | Shapiro | Sep 2014 | A1 |
20150020059 | Davis | Jan 2015 | A1 |
20150066858 | Sabdar | Mar 2015 | A1 |
20150169413 | Ngo et al. | Jun 2015 | A1 |
Number | Date | Country |
---|---|---|
0259912 | Mar 1988 | EP |
0405926 | Jan 1991 | EP |
0467546 | Jan 1992 | EP |
0774715 | May 1997 | EP |
0809184 | Nov 1997 | EP |
0838758 | Apr 1998 | EP |
0899662 | Mar 1999 | EP |
0981090 | Feb 2000 | EP |
1349088 | Oct 2003 | EP |
1579331 | Sep 2005 | EP |
2256952 | Dec 1992 | GB |
2411030 | Aug 2005 | GB |
05189281 | Jul 1993 | JP |
06274605 | Sep 1994 | JP |
09016463 | Jan 1997 | JP |
11259348 | Sep 1999 | JP |
2000347811 | Dec 2000 | JP |
WO-9303549 | Feb 1993 | WO |
WO-9513580 | May 1995 | WO |
WO-9912098 | Mar 1999 | WO |
WO-2001004755 | Jan 2001 | WO |
WO-02-088943 | Nov 2002 | WO |
WO-03028183 | Apr 2003 | WO |
WO-2003046768 | Jun 2003 | WO |
WO-2004034197 | Apr 2004 | WO |
WO-2007021997 | Feb 2007 | WO |
Entry |
---|
Dell Storage Engineering, Deploying Solaris 11 with EqualLogic Arrays, Dell Inc., Feb. 2014 (17 pgs.). |
Oracle Corporation, “Realizing the Superior Value of Oracle ZFS Storage Appliance,” Oracle White Paper, Redwood Shores, California, Mar. 2015 (12 pgs.). |
“Software Builds and the Virtual Machine,” Dr. Dobb's, Jan. 23, 2008, 2 pages. |
Armstead et al., “Implementation of a Campwide Distributed Mass Storage Service: The Dream vs. Reality,” IEEE, Sep. 11-14, 1995, pp. 190-199. |
Arneson, “Mass Storage Archiving in Network Environments,” Digest of Papers, Ninth IEEE Symposium on Mass Storage Systems, Oct. 31, 1988-Nov. 3, 1988, pp. 45-50, Monterey, CA. |
Cabrera et al., “ADSM: A Multi-Platform, Scalable, Backup and Archive Mass Storage System,” Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA. |
CNET Reviews, “IPStor Enterprise Edition Zerolmpact Backup Enabler Option—(V.4.0) Manufacturer Description”, May 8, 2004, 1 page. |
CommVault Partner Advantage, “CommVault First to Market with Complete ‘Zero Impact’ Backup Solutions for Mixed Windows and UNIX Environments”, <http://partners.commvault.com/microsoft/microsoft_news_story.asp?id=164>, Sep. 25, 2002, 2 pages. |
CommVault Systems, Inc., “CommVault Galaxy Express 7.0 Backup & Recovery,” copyright date 1999-2007, 4 pages. |
CommVault Systems, Inc., “CommVault QiNetix: Architecture Overview,” CommVault Systems White Paper, 2005, 35 pages. |
CommVault Systems, Inc., “CommVault Simpana Software with SnapBackup,” copyright date 1999-2009, 6 pages. |
Commvault, “Remote Backup,” <http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_us/features/ddr/ddr.htm>, internet accessed on Dec. 17, 2009, 8 pages. |
CommVault, “Snap Backup,” <http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_us/features/snap_backup/snap_backup.htm>, internet accessed on Dec. 17, 2009, 7 pages. |
CommVault, “Snapshots,” <http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_us/features/snapshots/snapshots.htm>, internet accessed on Dec. 15, 2009, 2 pages. |
CommVault, “vol. Shadow Services (VSS),” <http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_us//features/snapshots/vss/vss.htm>, internet accessed on Dec. 23, 2009, 1 page. |
Eitel, “Backup and Storage Management in Distributed Heterogeneous Environments,” IEEE, Jun. 12-16, 1994, pp. 124-126. |
EMC Corporation, “EMC CLARiiON CX Series,”May 2006, 7 pages. |
EMC Corporation, “EMC CLARiiON CX3 UltraScale Series,” Feb. 2008, 6 pages. |
EMC Corporation, “EMC Symmetrix DMX Series,” Jan. 2008, 8 pages. |
Extended European Search Report in Application No. 09815090.7, dated Oct. 25, 2012, 8 pages. |
FalconStor Software, “Impact-free Backup of Vmware Environments”, http://www.falconstor.com/dmdocuments/HyperTrac_for_VMware_SB_HR.pdf>, 2011, 2 pages. |
FalconStor Software, “Unified Backup & DR for Vmware Environments”, http://www.falconstor.com/dmdocuments/UniBU-DR_CDP_SB_100520.pdf>, 2001, 2 pages. |
FalconStor Software, “Zero-impact Unified Backup & DR”, <http://www.falconstor.com/solutions/solutions-for-server-virtualization/vmware-solutions/zero-impact-unified-backup-a-dr>, undated, Internet accessed May 2, 2012, 1 page. |
Fegreus, CommVault Simpana 8.0, Mar. 3, 2010, http://www.virtual-strategy.com/2010/03/03/commvault-simpana. |
Gait, J., “The Optical File Cabinet: A Random-Access File System for Write-Once Optical Disks,” IEEE Computer, vol. 21, No. 6, pp. 11-22 (Jun. 1988). |
Garimella, N., “Understanding and Exploiting Snapshot Technology for Data Protection, Part 1: Snapshot Technology Overview,” <http://www.ibm.com/developerworks/tivoli/library/t-snaptsm1/index.html>internet accessed on Dec. 22, 2009, 8 pages. |
Harriman-Polanski, CommVault Galaxy Enhances Data Protection, Reprinted from Dell Power Solutions, May 2006. |
Hitachi Data Systems, “Hitachi HiCommand Protection Manager Software,” Feb. 2007, 2 pages. |
International Search Report and Written Opinion for International Application No. PCT/US09/57102, dated Nov. 6, 2009, 14 pages. |
International Search Report and Written Opinion for International Application No. PCT/US10/62146, dated Feb. 18, 2011, 9 pages. |
International Search Report and Written Opinion for International Application No. PCT/US10/62158; dated Feb. 23, 2011, 8 pages. |
International Search Report and Written Opinion for International Application No. PCT/US2004/038323, dated Feb. 19, 2008, 10 pages. |
Jander, M., “Launching Storage-Area Net,” Data Communications, US, McGraw Hill, NY, vol. 27, No. 4 (Mar. 21, 1998), pp. 64-72. |
Managing Data More Effectively in Virtualized Environments with CommVault® Simpana® Universal Virtual Software Agent, © 1999-2009. |
Marshall, David, “Veeam's SureBackup transforms VMware image backups,” <http://www.infoworld.com/print/117315>, internet accessed on Mar. 23, 2010, 4 pages. |
Microsoft TechNet, “How Volume Shadow Copy Service Works,” <http://technet.microsoft.com/en-us/library/cc785914(WS.10,printer).aspx>, internet accessed on Dec. 17, 2009, 4 pages. |
Microsoft TechNet, “Overview of Exchange Server Backup Methods,” <http://technet.microsoft.com/en-us/library/aa996125(EXCHG.65,printer).aspx>, internet accessed on Dec. 29, 2009, 3 pages. |
Microsoft TechNet, “What is Volume Shadow Copy Service?” Mar. 28, 2003, 5 pages. |
Microsoft, “Microsoft System Center Data Protection Manager 2007: Microsoft Exchange Server,” undated, 4 pages. |
Microsoft, “Microsoft System Center Data Protection Manager 2007: Microsoft SharePoint Products and Technologies,” undated, 4 pages. |
Microsoft, “Microsoft System Center Data Protection Manager 2007: Product Overview,” undated, page. |
Microsoft.com, “XADM: Hot Split Snapshot Backups of Exchange,” <http://support.microsoft.com/kb/311898/>, internet accessed on Dec. 29, 2009, 5 pages. |
MSDN, “Backup Sequence Diagram,” <http://msdn.microsoft.com/en-us/library/ms986539(EXCHG.65,printer).aspx>, internet accessed on Dec. 30, 2009, 1 page. |
MSDN, “Exchange Transaction Logs and Checkpoint Files,” <http://msdn.microsoft.com/en-us/library/ms986143(EXCHG.65,printer).aspx>, internet accessed on Dec. 30, 2009, 1 page. |
MSDN, “Identifying Required Transaction Logs,” <http://msdn.microsoft.com/en-us/library/ms986606(EXCHG.65,printer).aspx>, internet accessed on Dec. 30, 2009, 1 page. |
MSDN, “Overview of Processing a Backup Under VSS,” <http://msdn.microsoft.com/en-us/library/aa384589(VS.85,printer).aspx>, internet accessed on Dec. 18, 2009, 3 pages. |
MSExchange.org, “Exchange log disk is full, Prevention and Remedies,” <http://www.msexchange.org/articles/exchange-log-disk-full.html?printversion>, internet accessed on Dec. 30, 2009, 7 pages. |
NetApp, “NetApp SnapManager for Microsoft Exchange,” 2009, 2 pages. |
Network Appliance, Inc., “Network Appliance Snapshot Technology,” copyright 2004, 1 page. |
OpenAir.com, Product Update—Jun. 21, 2001, http://web.archive.org/web/200110071539001http:llwww.openair.comlhomeln.s-ub.--p. sub.--update062101 .html, Oct. 2001, 3 pages. |
Partial Supplementary European Search Report in Application No. 10841622.3, dated Feb. 11, 2015, 5 pages. |
Robinson, Simon, “CommVault Unveils QiNetix to Unite Data Movement with Storage Management”, 451 Research, Oct. 11, 2002, 3 pages. |
Rosenblum et al., “The Design and Implementation of a Log-Structured File System,” Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991). |
Tanenbaum, Andrew S. Structured Computer Organization, 1984, Prentice-Hall, Inc. second edition, pp. 10-12. |
Veeam Software, “The New Standard for Data Protection,” internet accessed on Mar. 23, 2010, 2 pages. |
Veritas Software Corporation, “Veritas Volume Manager 3.2, Administrator's Guide,” Aug. 2001, 360 pages. |
Wikipedia.org, “Snapshot (computer storage),” <http://en.wikipedia.org/w/index.php?title=Snapshot_(computer_storage)>, internet accessed on Dec. 15, 2009, 3 pages. |
Number | Date | Country | |
---|---|---|---|
20160299908 A1 | Oct 2016 | US |