17809348. GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)
GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES
Organization Name
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor(s)
Theresa Mary Brown of Tucson AZ (US)
Dale F Riedy of Poughkeepsie NY (US)
William J. Rooney of Hopewell Junction NY (US)
Scott B. Compton of Hyde Park NY (US)
Gregory Edward Mcbride of Vail AZ (US)
John R. Paveza of Morgan Hill CA (US)
GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES - A simplified explanation of the abstract
This abstract first appeared for US patent application 17809348 titled 'GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES
Simplified Explanation
Ensuring recoverability and usability of potentially corrupted enterprise data by creating safeguarded copy volumes.
- Detecting data corruption and locating the last known uncorrupted copy quickly.
- Initiating restoration process with the identified uncorrupted data and reapplying subsequent logged transactions if possible.
- Bringing the data to the most recent and uncorrupted version.
Potential Applications
This technology can be applied in various industries and sectors where data integrity and recoverability are crucial, including:
- Banking and financial institutions
- Healthcare and medical records management
- Government agencies and public sector organizations
- E-commerce and online platforms
- Data centers and cloud service providers
Problems Solved
The technology addresses the following problems:
- Data corruption in enterprise systems
- Difficulty in detecting and locating the last known uncorrupted data
- Inability to restore data to the most recent and uncorrupted version
- Loss of critical information due to corruption
Benefits
The benefits of this technology include:
- Enhanced data integrity and recoverability
- Quick detection and location of uncorrupted data
- Efficient restoration process
- Minimized data loss and improved data reliability
Original Abstract Submitted
Ensuring that enterprise data that has potentially become corrupted is recoverable and usable by creating safeguarded copy volumes of the enterprise data. One important aspect of any corruption detection scheme is to determine when the data has become corrupted and locate the last known uncorrupted copy of the data as quickly as possible. Once this set of data is identified, the restoration process can begin with that data, and subsequent logged transactions can be reapplied if possible, which brings the data to the most recent and uncorrupted version.