Restoring checkpointed processes including adjusting...
Restoring checkpointed processes without restoring...
Restoring configurations of data storage systems
Restoring data from point-in-time representations of the data
Restoring data to a distributed storage node
Restoring method for hard disk
Restoring user states in dynamic computing environments
Restricting the execution of copy services commands
Restricting the execution of copy services commands
Resynchronization of mirrored logical data volumes...
Retrieval of a single complete copy from multiple stored...
Retry mechanism for remote operation failure in distributed...
Reversible mirrored restore of an enterprise level primary disk
RF transmitter fault and data monitoring, recording and...
RFID active/passive tag identifying failed sub-CRU and...
Ring control node
Risk assessment methodology for AIX-based computer systems
Risk indices for enhanced throughput in computing systems
RMI-IIOP request failover mechanism
Robust and recoverable interprocess locks