The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Disclosed is an algorithm for a restartable copy of data in a
filesystem without loss of integrity.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
98% of the total text.
Page 1 of 1
An algorithm for a restartable copy of data in a filesystem without loss of integrity
This invention solves the problem of being able to interrupt a filesystem data copy operation and restart without loss of integrity.
The main idea here is to periodically note up to what point file was copied using a checkpoint and also note what contents were copied using a checksum. When the operation is resumed after the interruption consult the above stored data to restart. The main advantage of using this invention is customers don't have to schedule large amount of outages to copy data instead they can copy what ever the amount fits in their regular scheduled maintenance window and continue where it was left off in their next maintenance window.
A file is divided into set of blocks. Data is copied block by block. During the file copy operation checksum is computed after every block copy. After every specified number of block copies all the information about the file metadata, number of blocks copied and the checksum of the file up to the number of blocks copied is recorded in a log file. This copy process can be interrupted any time. At the time of restart the algorithm reads the metadata and checksum from the log file and does a three way verification between the original file, partially copied file and log file to verify the integrity of the data. After verifying the integrity, algorithm resumes the copy from the file offset of last checkpoint.