17968004. SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION simplified abstract (Dell Products L.P.)
Contents
- 1 SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION
Organization Name
Inventor(s)
Kurumurthy Gokam of Bangalore (IN)
Mohammad Salim Akhtar of Jamshedpur (IN)
SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17968004 titled 'SPOOFING OF DEVICE IDENTIFIERS IN NON-DISRUPTIVE DATA MIGRATION
Simplified Explanation
The patent application describes an apparatus that facilitates data migration between logical storage devices by implementing multi-path devices and copying paths from the source to the target device.
- The processing device includes a processor and memory.
- Implements a source multi-path device between a source access device and a source logical storage device.
- Implements a target multi-path device between a target access device and a target logical storage device.
- Initiates a data migration process from the source logical storage device to the target logical storage device.
- Copies a set of paths from the source multi-path device to the target multi-path device.
- Provides identifying information of the source logical storage device to the source access device during the data migration process.
Potential Applications
This technology could be applied in:
- Data centers for efficient data migration processes.
- Cloud storage services for seamless data transfers.
Problems Solved
This technology solves:
- Challenges in migrating data between storage devices.
- Ensures data integrity during the migration process.
Benefits
The benefits of this technology include:
- Faster and more efficient data migration.
- Reduced risk of data loss or corruption during migration.
Potential Commercial Applications
The potential commercial applications of this technology include:
- Data migration services for businesses.
- Storage solution providers for seamless data transfers.
Possible Prior Art
One possible prior art could be the use of multi-path devices for data migration in storage systems.
Unanswered Questions
How does this technology impact data security during the migration process?
This article does not delve into the specific security measures implemented to ensure data security during the migration process. Additional information on encryption or access control mechanisms would provide a more comprehensive understanding of the technology's security aspects.
What are the scalability limitations of this technology in large-scale data migration scenarios?
The article does not address the scalability of this technology in handling large volumes of data during migration. Further details on performance metrics or potential bottlenecks in scaling up the technology would be beneficial for assessing its applicability in enterprise-level data migration tasks.
Original Abstract Submitted
An apparatus comprises at least one processing device that includes a processor coupled to a memory. The at least one processing device is configured to implement a source multi-path device between a source access device and a source logical storage device, to implement a target multi-path device between a target access device and a target logical storage device, and to initiate a data migration process to migrate data from the source logical storage device to the target logical storage device. The at least one processing device is further configured, in conjunction with the data migration process, to copy a set of paths of the source multi-path device to the target multi-path device, and to at least temporarily provide to the source access device identifying information of the source logical storage device in place of identifying information of the source multi-path device.