The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A method and system is disclosed for eliminating data loss during disasters that may occur when using asynchronous data replication technologies for Fiber Connectivity (FICON) data / Extended Count Key data (ECKD).
English (United States)
This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately
67% of the total text.
Page 1 of 2
Method and System for Eliminating Data Loss During Disaster Fiber Connectivity (FICON) Data / Extended Count Key Data (ECKD).
Disclosed is a method and system for eliminating data loss during disaster that may occur when using asynchronous data replication technologies for Fiber Connectivity (FICON) data / Extended Count Key data (ECKD).
The method employs a data collector to synchronously store data in a black box. When a disaster occurs, an extended remote copy (XRC) is replicated with the data stored in the black box.
Fig.1 illustrates an exemplary implementation of the disclosed method for eliminating data loss during disaster for FICON/ECKD data.
As shown in Fig. 1 a peer-to-peer remote copy (PPRC) session is established between a primary control unit and a secondary control unit. A data collector utilizes a fabric switch feature to intercept PPRC fiber channel and Fiber Channel Protocol (FC/FCP) traffic between the primary control unit and the secondary control unit. Using this, the data collector captures the modification to the data and updates the same in a secondary storage device inside the black box. Therefore, it can be considered that a synchronous copy of the data is maintained the secondary storage data. Also, the secondary control unit asynchronously sends the data to a remote site via a system data mover.