EMC CORPORATION Patent applications |
Patent application number | Title | Published |
20160062882 | METHOD AND SYSTEM FOR GARBAGE COLLECTION IN A STORAGE SYSTEM BASED ON LONGEVITY OF STORED DATA - A method for managing data. The method includes receiving a first request to write data to persistent storage and in response to the first request, writing the data to a short-lived block in the persistent storage, where the data is short-lived data or data of unknown longevity. The method further includes performing a modified garbage collection operation that includes: selecting a first frag page in a first block, determining that the first frag page is live, and migrating, based on the determination that the first frag page is live, the first frag page to a long-lived block in the persistent storage, where the long-lived block is distinct from the short-lived block and wherein the long-lived block does not include any short-lived data. | 03-03-2016 |
20160026501 | MANAGING PROVISIONING OF STORAGE RESOURCES - A method is used in managing provisioning of storage resources. An access is provided to a provisioning decision making service configured to derive a storage provisioning decision based on information provided to the provisioning decision making service. Provisioning of storage resources is enabled on a storage system over a communication medium by using the provisioning decision making service. | 01-28-2016 |
20150278284 | Heteroscedastic Data Compression Using Arima-Garch Model Estimation - Methods and apparatus are provided for compression and decompression of heteroscedastic data, such as seismic data, using Autoregressive Integrated Moving Average (ARIMA)-Generalized Autoregressive Conditional Heteroscedasticity (GARCH) model estimation. Heteroscedastic data is compressed by obtaining the heteroscedastic data; applying the heteroscedastic data to an ARIMA-GARCH model; determining residuals between the obtained heteroscedastic data and the ARIMA-GARCH model; and compressing parameters of the ARIMA-GARCH model and the residuals using entropy encoding, such as an arithmetic encoding, to generate compressed residual data. Parameters of the ARIMA-GARCH model are adapted to fit the obtained heteroscedastic data. The compressed residual data is decompressed by performing an entropy decoding and obtaining the parameters of the ARIMA-GARCH model and the residuals. The ARIMA-GARCH model predicts heteroscedastic data values and then the decompressed residuals are added. | 10-01-2015 |
20150220355 | METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION - A hypervisor virtual server system, including a plurality of virtual servers, a plurality of virtual disks that are read from and written to by the plurality of virtual servers, a physical disk, an I/O backend coupled with the physical disk and in communication with the plurality of virtual disks, which reads from and writes to the physical disk, a tapping driver in communication with the plurality of virtual servers, which intercepts I/O requests made by any one of said plurality of virtual servers to any one of said plurality of virtual disks, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted I/O write requests from the tapping driver, and that provides data services based thereon. | 08-06-2015 |
20150188922 | PARALLEL ON-PREMISES AND CLOUD-BASED AUTHENTICATION - A method for parallel authentication comprises receiving a download request from a client computer system to download a document stored in a first storage system. The first storage system is coupled to the client computer system via a network. The first storage system is coupled with a second storage system via the network. The download request includes a first token associated with the first storage system and a second token associated with the second storage system. The first storage system is configured to authenticate the download request based on the first token and the second token. Based on successful authentication, the first storage system is configured to authorize the client computer system to download the document. | 07-02-2015 |
20150161765 | SCALING MOBILE CHECK PHOTOS TO PHYSICAL DIMENSIONS - A digital photo of an object is received. The digital photo is transformed to an image. A dimension for an anchor line is calculated based at least in part on the image. The image is scaled based at least in part on the dimension. A confidence value is calculated based at least in part on the scaled image. | 06-11-2015 |
20150066572 | IDENTITY AND ACCESS MANAGEMENT - A computer-implemented process for an endpoint for automated fulfillment, includes: in an Automatic Fulfillment (AF) server: creating an endpoint on the AF server; selecting supported commands; and for each command, defining required and optional parameters and endpoint type specific implementation details; and in a Compliance Manager (CM): running discovery to find new endpoint and create metadata for it in the CM; for each command to be automated, filling in mappings for at least all required parameters; and enabling the command; enabling the endpoint; binding the endpoint to a business source; and ensuring that the business source uses a fulfillment process that uses the AF server. | 03-05-2015 |
20140380127 | FOLDED CODES FOR CORRECTION OF LATENT MEDIA ERRORS - Data is obtained at a data storage system. Codewords are generated from the obtained data. The codewords are computed using a folded code and each codeword comprises symbols. The codewords are stored on an array of disks associated with the data storage system in accordance with a codeword symbol mapping that is specified by at least one parameter of the folded code used to generate each codeword. | 12-25-2014 |
20140380114 | DATA ENCODING FOR DATA STORAGE SYSTEM BASED ON GENERALIZED CONCATENATED CODES - Data is obtained at a data storage system. Codewords are generated from the obtained data. The codewords are computed using a generalized concatenated code and each codeword comprises symbols, wherein the symbols comprise information symbols and check symbols. The codewords are stored on an array of disks associated with the data storage system. In one example, i-th symbols of the generated codewords are stored on an i-th disk of the array of disks. | 12-25-2014 |
20140340223 | ENVIRONMENTAL ALERT FOR COMPUTER SYSTEMS - Improved efficiency in monitoring environmental conditions in the vicinity of an unattended computer system includes using the existing communication systems between the computer system and a network, to provide immediate information to users, emergency responders and anyone connected to the network. The system may also include an ability of the unattended computer system to receive a return message from the user ordering a physical action in response to the reported environmental condition, for example turning on a fire suppression system in response to a smoke alarm. The system may also include storage of environmental conditions and analysis of variations over time, as well as any interactions of various types of environmental conditions, such as giving more weight to a high temperature reading in conjunction with an elevated but not critical level of smoke. | 11-20-2014 |
20140337988 | METHOD AND APPARATUS FOR DATABASE SANITIZING - A method of generating a test database from a deployed database by “sanitizing”, or removing sensitive data, is employed for recreating problem scenarios from a customer site, verifying compatibility of customer data with database version updates, and for performance testing using actual, rather than generated, database structures. In database management operations, in can be beneficial to use data generated from actual operational scenarios rather than artificially generated data created from a test pattern. Data generated from actual operation, such has at a customer site, assures compatibility with the relation patterns and record volumes employed by the customer (user). However, databases often contain sensitive information that would be inappropriate, illegal, or vulnerable in a testing environment. Accordingly, the generated test database overwrites sensitive data values with benign, or generic values while preserving the structure and relations of the data stored. | 11-13-2014 |
20140337287 | VIRTUAL REPOSITORY MANAGEMENT - Virtual repository management is disclosed. An indication is received that a content management functionality is desired to be available with respect to one or more external content items. A reference object is created for each for the one or more external content items that represents the external content item and enables the content management functionality to be performed with respect to the external content item. | 11-13-2014 |
20140330797 | SEGMENT DEDUPLICATION SYSTEM WITH COMPRESSION OF SEGMENTS - A system for storing compressed data comprises a processor and a memory. The processor is configured to receive a compressed segment. The compressed segment is determined by breaking a data stream, a data block, or a data file into one or more segments and compressing each of the one or more segments. The processor is further configured to determine whether the compressed segment has been previously stored, and in the event that the compressed segment has not been previously stored, store the compressed segment. The memory is coupled to the processor and configured to provide the processor with instructions. | 11-06-2014 |
20140330793 | CAPACITY FORECASTING FOR A DEDUPLICATING STORAGE SYSTEM - A system for managing a storage system comprises a processor and a memory. The processor is configured to receive storage system information from a deduplicating storage system. The processor is further configured to determine a capacity forecast based at least in part on the storage system information. The processor is further configured to provide a compression forecast. The memory is coupled to the processor and configured to provide the processor with instructions. | 11-06-2014 |
20140325216 | SEGMENT DEDUPLICATION SYSTEM WITH ENCRYPTION AND COMPRESSION OF SEGMENTS - A system for storing encrypted compressed data comprises a processor and a memory. The processor is configured to determine whether an encrypted compressed segment has been previously stored. The encrypted compressed segment was determined by breaking a data stream, a data block, or a data file into one or more segments and compressing and then encrypting each of the one or more segments. The processor is further configured to store the encrypted compressed segment in the event that the encrypted compressed segment has not been previously stored. The memory is coupled to the processor and configured to provide the processor with instructions. | 10-30-2014 |
20140324880 | INDEX SEARCHING USING A BLOOM FILTER - A system for index searching comprises a first index, a second index, a processor, and a memory. The processor is configured to determine, using a Bloom filter for the second index of fingerprints, whether the Bloom filter indicates that an entry corresponding to a segment has been previously stored in the second index. The processor is further configured to, in the event that the Bloom filter indicates that an entry corresponding to the segment has been previously stored in the second index, retrieve a second index entry associated with the segment that has been previously stored. The memory is coupled to the processor and configured to provide the processor with instructions. | 10-30-2014 |
20140324796 | STATE-BASED DIRECTING OF SEGMENTS IN A MULTINODE DEDUPLICATED STORAGE SYSTEM - A system for directing for storage comprises a processor and a memory. The processor is configured to determine a segment overlap for each of a plurality of nodes. The processor is further configured to determine a selected node of the plurality of nodes based at least in part on the segment overlap for each of the plurality of nodes and based at least in part on a selection criteria. The memory is coupled to the processor and configured to provide the processor with instructions. | 10-30-2014 |
20140317063 | SYNCHRONIZATION OF STORAGE USING COMPARISONS OF FINGERPRINTS OF BLOCKS - A system for processing data comprises a deduplicating system, an interface, and a processor. The deduplicating system stores a copy of data stored in a data storage system by storing a set of segments that is able to reconstruct the data stored in the data storage system. The interface receives an indication to revert data stored in the data storage system to a state of data at a snapshot time stored in the deduplicating system. The processor is configured to determine a subset of the data stored in the data storage system that has changed between the data stored in the data storage system and the state of data at the snapshot time stored in the deduplicating system using a first list of fingerprints associated with the data stored on the data storage system and a second list of fingerprints associated with the state of data at the snapshot time stored in the deduplicating system. | 10-23-2014 |
20140304380 | MODEL FRAMEWORK TO FACILITATE ROBUST PROGRAMMING OF DISTRIBUTED WORKFLOWS - A method is disclosed. A finite state machine model for a single system workflow is replicated across a plurality of distributed nodes associated with a leader election protocol. A leader is determined amongst the plurality of distributed nodes to perform a next action of the finite state machine model based at least in part on the leader election protocol. One or more nodes amongst the plurality of distributed nodes are configured to submit a timeout ticket if the next action of the finite state machine model does not appear to have been performed by the leader within a prescribed time. | 10-09-2014 |
20140304299 | DATA MANAGEMENT IN A MULTI-TENANT DISTRIBUTIVE ENVIRONMENT - The present invention relates to a method and apparatus for data management in multi-tenant distributive environment. According to the embodiments of the present invention, a tenant-specific virtual metadata server may be created and registered with a task manager in a job processing system. The virtual metadata server provides a tenant-specific logical file system namespace. Any access to tenant data will be performed via the virtual metadata server. In other words, such virtual metadata server acts as an interface between a tenant terminal and an entity file system. In this way, it may effectively realize isolation of tenant data and enhance data security. Moreover, by using a virtual metadata server rather than physically isolating user data, the embodiments of the present invention may guarantee the efficiency of data sharing while improving the data security. | 10-09-2014 |
20140298416 | PROVIDING ACCESS TO MANAGED CONTENT IN RICH CLIENT APPLICATION ENVIRONMENTS - Providing access to managed content in rich client application environments is disclosed. A request is received from within a first application environment for access to managed content not managed primarily by a first application with which the first application environment is associated. Access is provided to managed content based at least in part on a context data associated with the first application environment. | 10-02-2014 |
20140281221 | DATA PROCESSING - Various embodiments of the present invention relate to a method and apparatus for data copy. Specifically, in one embodiment of the present invention there is provided a method for data copy, comprising: obtaining a data source on which data copy is to be executed; determining a size P of a block extent based on which the data source is divided; dividing the data source into at least one data block based on the size P of the block extent; and copying data from the data source to a data target in the basic unit of the at least one data block; wherein the size P of the block extent is an integral multiple of a size R of a read/write unit supported by underlying architecture. In one embodiment of the present invention, there is provided an apparatus for data copy. | 09-18-2014 |
20140280159 | DATABASE SEARCH - The present disclosure provides a method and apparatus for database search, by grouping data entries based on join conditions between the data entries as set in search conditions; and executing the search based on the grouping of the data entries, and can efficiently and effectively resolve the issues that are common to the existing MapReduce query processing systems, thereby being particularly suitable for big dataset analytics in a large cluster system. | 09-18-2014 |
20140279958 | REPRESENTING DE-DUPLICATED FILE DATA - Providing a subset of de-duplicated as output is disclosed. In some embodiments, the output comprises a subset of data stored in de-duplicated form in a plurality of containers each comprising a plurality of data segments comprising the data. For each container that includes one or more data segments comprising the subset, a corresponding container data is included in the output. Each container may include one or more segments not included in the subset. For each container the corresponding container data of which is included in the output, a corresponding value in a data structure comprising for each container stored on the de-duplicated storage system a data value indicating whether or not the corresponding container data has been included in the output is updated. | 09-18-2014 |
20140259025 | METHOD AND APPARATUS FOR PARALLEL COMPUTING - The present invention relates to a method and apparatus for parallel computing. According to one embodiment of the present invention, there is provided a job parallel processing method, the job processing at least comprising executing an upstream task in a first phase and executing a downstream task in a second phase. The method comprises: quantitatively determining data dependence between the upstream task and the downstream task; and selecting time for initiating the downstream task at least partially based on the data dependence. There is further disclosed a corresponding apparatus. According to embodiments of the present invention, it is possible to more accurately and quantitatively determine data dependence between tasks during different phases and thus select the right time to initiate a downstream task. | 09-11-2014 |
20140258987 | DETERMINING CORRECTNESS OF AN APPLICATION - The present invention provides a method for determining correctness of an application, comprising: obtaining a dataset and a reference running result for the application; and determining correctness of the application based on a comparison between the reference running result and an actual running result of the dataset on the application. Through the method, the users can connect to a standard task tool repository, thereby using a data-driven testing method as a complement to the existing quality assurance framework. | 09-11-2014 |
20140244691 | CLUSTER STORAGE USING SUBSEGMENTING FOR EFFICIENT STORAGE - Cluster storage is disclosed. A data stream or a data block is received. The data stream or the data block is broken into segments. For each segment, a cluster node is selected, and a portion of the segment smaller than the segment is identified that is a duplicate of a portion of a segment already managed by the cluster node. | 08-28-2014 |
20140237232 | SELECTIVE SHREDDING IN A DEDUPLICATION SYSTEM - Making a target file impratical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a segment that is used when reconstructing a target file. The directory manager file is modified by deleting a reference to the target file. The reference includes a file encryption key. Retrieving the target file is made impractical by the deletion of the reference to the target file in the directory manager file. The modified directory manager file is encrypted using a second directory manager file key. | 08-21-2014 |
20140237210 | CAPACITY FORECASTING FOR BACKUP STORAGE - A system for capacity forecasting for backup storage comprises a processor and a memory. The processor is configured to calculate a set of statistical analyses for subsets of a set of capacities at points in time. The processor is further configured to determine a selected statistical analysis from the set of statistical analyses. The processor is further configured to forecast a full capacity time based at least in part of the selected statistical analysis. The memory is coupled to the processor and configured to provide the processor with instructions. | 08-21-2014 |
20140236955 | COMPUTER READABLE ELECTRONIC RECORDS AUTOMATED CLASSIFICATION SYSTEM - Classifying an electronic document in a computer-based system is disclosed. For each classification instance in a plurality of classification instances, a confidence data indicating a degree of confidence that the electronic document is associated with that classification instance is determined. A classification, based on a first classification instance in the plurality of classification instances, is assigned without human intervention to the electronic document if the confidence data associated with the first classification instance exceeds a first threshold. | 08-21-2014 |
20140222813 | COLLECTING DATA IN INTERNET OF THINGS - Embodiments of the present invention relate to a method, apparatus and system for collecting data in an Internet of Things. In one embodiment of the present invention, there is provided a method for collecting data in an Internet of Things, comprising: receiving status data from a sensor node of at least one sensor node; in response to verifying the status data being trusted status data, extracting content data from the status data; aggregating the content data based on a predefined rule; and transmitting the aggregated content data to a data center; wherein the at least one sensor node is connected with the data center via the Internet of Things. In one embodiment, there is provided an apparatus for collecting data in an Internet of Things. In one embodiment, there is provided a system for collecting data in an Internet of Things. | 08-07-2014 |
20140215552 | SMART CONTAINERS - Smart containers are disclosed. A system for managing content comprises an interface to receive an operation associated with an instance of a smart container. The smart container comprises a logical structure configure using a definition to manage associated content. The system for managing content comprises a processor configured to determine whether the operation is allowable based at least in part on a policy; and in the event that the operation is allowable, perform the operation. A memory is coupled to the processor and is configured to provide the processor with instructions. | 07-31-2014 |
20140201430 | SNAPSHOTTING OF A PERFORMANCE STORAGE SYSTEM IN A SYSTEM FOR PERFORMANCE IMPROVEMENT OF A CAPACITY OPTIMIZED STORAGE SYSTEM - A system for storing data comprises a performance storage system for storing one or more data items. A data item of the one or more data items comprises a data file or a data block. The system further comprises a segment storage system for storing a snapshot of a stored data item of the one or more data items in the performance storage system. The taking of the snapshot of the stored data item enables recall of the stored data item as stored at a time of the snapshot. At least one newly stored segment is stored as a reference to a previously stored segment. | 07-17-2014 |
20140195553 | METADATA CACHE SUPPORTING MULTIPLE HETEROGENEOUS SYSTEMS - A request for a metadata object is received where the request includes an identifier. It is determined whether the metadata object is stored in a metadata cache, including by: selecting a sub-cache in the metadata cache based at least in part on the identifier and determining whether the metadata object is stored in that sub-cache. If it is determined the metadata object is not in the metadata cache, a request (in a format associated with the source) to obtain the metadata object is sent to a source with which the metadata object is associated. If the metadata object provided by the source is in a native format which is not the same as the common format, the metadata object is transformed from the native format into the common format. Access to the metadata object in the common format is provided. | 07-10-2014 |
20140189857 | METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER - The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved. | 07-03-2014 |
20140189715 | CONVERSION OF LIGHTWEIGHT OBJECT TO A HEAVYWEIGHT OBJECT - Processing an object that shares a parent with another object is disclosed. An indication is received with respect to an object that shares a parent object instance with one or more other objects that a change associated with the object is to be made to a data comprising the shared parent object instance. The parent object instance is cloned to create a new parent object instance. The new parent object instance is designated as the parent of the object instance. | 07-03-2014 |
20140189419 | METHOD AND APPARATUS FOR PROVIDING COMPUTING RESOURCES - Embodiments of the present invention relate to a method and apparatus for providing computing resources to a user. In one embodiment of the present invention, there is provided a method for providing computing resources to a user, comprising: in response to a request from the user, looking up in a profile repository a profile corresponding to the user's domain information; requesting at least one computing resource associated with the profile; integrating the at least one computing resource into a virtual datacenter; and providing the virtual datacenter to the user; wherein the at least one computing resource is physically deployed in a distributed manner. In one embodiment of the present invention, there is provided an apparatus for providing computing resources to a user. | 07-03-2014 |
20140189267 | METHOD AND APPARATUS FOR MANAGING MEMORY SPACE - Embodiments of the present invention relate to a method, apparatus and computer product for managing memory space. In one aspect of the present invention, there is provided a method for managing memory space that is organized into pages, the pages being divided into a plurality of page sets, each page set being associated with one of a plurality of upper-layer systems, by: performing state monitoring to the plurality of upper-layer systems to assign priorities to the plurality of upper-layer systems; and determining an order of releasing the pages of the memory space based on the priorities of the plurality of upper-layer systems with the page sets as units. Other aspects and embodiments of invention are also disclosed. | 07-03-2014 |
20140181982 | METHOD AND SYSTEM FOR DATA PROTECTION - Embodiments of the present invention relate to a method and system for data protection. A data protection method comprises: receiving at least one event prediction message from at least one message source, the at least one event prediction message being associated with an event that is predicted to occur in a future period of time; analyzing information, which is relevant to the event, included in the at least one event prediction message, so as to determine a risk level of the event with respect to the data to be protected; and determining a data protection operation at least based on the risk level and a predetermined event handling policy. There is further disclosed a corresponding data protection system. According to the embodiments of the present invention, it is enabled to voluntarily, dynamically, and flexibly handle high-risk events potentially damaging data, thereby better guaranteeing data security. | 06-26-2014 |
20140181929 | METHOD AND APPARATUS FOR USER AUTHENTICATION - The disclosure generally relates to methods and apparatuses for user authentication. According to embodiments of the present invention, authentication-related information may be encoded in an image such as a QR code. By communicating and decoding such image information and other authentication information between one or more devices of the user and an authentication server, the authentication server may perform an effective authentication to the user and his/her device. In the meantime, it is possible to avoid the risk of invalid authentication due to the disclosure of the password. Embodiments of the present invention may be used in combination with the existing static password and/or dynamic password authentication and thus they have a good compatibility. | 06-26-2014 |
20140181399 | SYSTEM AND METHOD FOR PROVIDING LONG-TERM STORAGE FOR DATA - A system for storing files comprises a processor and a memory. The processor is configured to break a file into one or more segments; store the one or more segments in a first storage unit; and add metadata to the first storage unit so that the file can be accessed independent of a second storage unit, wherein a single namespace enables access for files stored in the first storage unit and the second storage unit. The memory is coupled to the processor and configured to provide the processor with instructions | 06-26-2014 |
20140181059 | BATCHING CONTENT MANAGEMENT OPERATIONS TO FACILITATE EFFICIENT DATABASE INTERACTIONS - Batching content management operations to facilitate efficient database interactions is disclosed. Two or more content management-related requests are received. The two or more content management-related requests are treated as a batch, including by formulating and sending to a database in a single database interaction a grouped request to add, delete, or modify each of a plurality of database records. | 06-26-2014 |
20140164397 | APPARATUS AND METHOD FOR SEARCHING INFORMATION - The present invention provides a method and apparatus for searching information. The method is for, in response to receipt of a keyword from a search user of a plurality of users, searching in an information repository to obtain one or more information items to be returned; and returning the information item to the search user based on an importance of each information item of the one or more information items. With the method, it is possible to fully leverage various objective internal relationships between search users, information items and creators and thus improve the search accuracy. | 06-12-2014 |
20140156877 | STORAGE RESOURCE USAGE ANALYSIS FOR CUSTOMIZED APPLICATION OPTIONS - Described are techniques for analyzing storage resources. I/O operations which are directed to a set of storage resources and received at a data storage system from a first application are monitored. First information characterizing the I/O operations from the first application is collected in accordance with said monitoring. Using the first information, a first execution profile for the first application characterizing I/O operations of the first application is determined. It is determined whether the first execution profile of the first application matches any of a set of predetermined execution profiles for known applications. Each of the predetermined execution profiles characterizes I/O operations of one of the known applications. First processing is performed in accordance with one or more criteria including whether the first execution profile matches any of the set of predetermined execution profiles. | 06-05-2014 |
20140150057 | METHOD AND APPARATUS FOR RECOGNIZING IMAGE CONTENT - Embodiments of the present invention provide a method and apparatus for recognizing image contents. In one embodiment of the present invention, there is provided a method for recognizing image contents, comprising: providing at least a first image pair and a second image pair to a user; obtaining a first answer and a second answer from the user, wherein the first answer and the second answer respectively indicate the user's determination on whether the image contents in the first image pair and the second image pair are same or not; and modifying a weight of the second image pair in response to the first answer matching a predetermined answer. In one embodiment of the present invention, there is provided an apparatus for recognizing image contents. | 05-29-2014 |
20140143215 | ASSURED FEDERATED RECORDS MANAGEMENT - A record is managed by obtaining from an external system on which a stored object comprising the record is stored a property of the stored object as stored on the external system. A stored property associated with the record is compared with the obtained property of the stored object. In the event the comparison does not match, responsive action is taken. | 05-22-2014 |
20140133643 | REDIRECTING AND MIRRORING OF TELEPHONIC COMMUNICATIONS - Initiating a communication is disclosed. An identifier associated with an intended destination with which the calling party desires to establish communication is received from a calling party. Communication with a compliance node is established. An identifier is provided to the compliance node. The compliance node is configured to establish with the intended destination a communication session in which the compliance node, the intended destination, and the calling party are participants. | 05-15-2014 |
20140129790 | EFFICIENT DATA STORAGE SYSTEM - A system and method are disclosed for providing efficient data storage. A plurality of data segments is received in a data stream. The system preliminarily checks in a memory having a relatively low latency whether one of the plurality of data segments may have been stored previously in a data segment repository. The memory having the relatively low latency stores data segment information. In the event that the preliminary check determines that one of the plurality of data segments may have been stored in the data segment repository, a memory having a relatively higher latency is checked to determine whether the data segment has been stored previously in the data segment repository. | 05-08-2014 |
20140122932 | ANALYSIS SYSTEM AND METHOD FOR INTELLIGENT CUSTOMER SERVICE BASED ON COMMON SEQUENCE PATTERN - The present invention provides a method and system for information analysis. The method extracts a plurality of metadata from a source information set so as to generate a metadata set, the metadata comprising error log information that forms an error sequence in the metadata set; and generates a common error sequence set for a plurality of the metadata sets. By means of the method, it is possible to easily obtain a global error sequence pattern, and easily compare a new error with a previous error sequence pattern so as to prevent, diagnose and recover the new error. | 05-01-2014 |
20140122637 | METHOD AND APPARATUS FOR PROVIDING CACHING SERVICE IN NETWORK INFRASTRUCTURE - A method and apparatus for providing caching service in network infrastructure. In an embodiment, there is provided a method for providing caching service in network infrastructure, comprising: in response to at least one application node accessing data in a storage node, caching a copy of the data in a cache server; in response to the at least one application node accessing the data in the storage node, obtaining an identifier indicating whether the data in the storage node is valid or not; and in response to the identifier indicating the data in the storage node is valid, returning the copy; wherein the at least one application node and the storage node are connected via the network infrastructure, and the cache server is coupled to a switch in the network infrastructure. In another embodiment of the present invention, there is provided an apparatus for providing caching service in network infrastructure. | 05-01-2014 |
20140122420 | SYSTEM AND METHOD OF DYNAMIC DATA OBJECT UPGRADES - A method, article of manufacture, and apparatus for managing a cloud computing environment. In some embodiments, this includes modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, components of an object such as data structures are modified. In some embodiments, objects may have more than one version. | 05-01-2014 |
20140114910 | METHOD AND SYSTEM FOR PARTITIONING DATABASE - The present invention relates to a method and system for partitioning a database. The method for partitioning a database comprises: grouping a plurality of entries in the database into one or more entry groups, so that entries in the same entry group are always accessed together by one or more transactions; and dividing the one or more entry groups into a set number of partitions, so that a total number of transactions that access across more than one partition is minimized. By means of the present invention, it is possible to obtain an efficient, flexible and convenient method for partitioning a database, thereby greatly improving the system performance. | 04-24-2014 |
20140114613 | METHOD AND APPARATUS FOR DIAGNOSIS AND RECOVERY OF SYSTEM PROBLEMS - Embodiments of the present invention relate to method and apparatus for system problem diagnosis and recovery. According to embodiments of the present invention, problem symptom information in a system can be automatically monitored and collected BY a monitoring apparatus (or referred as to “agent”) deployed at the system side. Upon after receiving such information, the diagnosis apparatus, for example, may automatically determine a root cause of the problem by querying a backend knowledge repository, and possibly generate an executable software package for recovering the problem. If the diagnosis apparatus determines that the currently available information is insufficient to determine a creditable enough root cause and/or is insufficient to generate the software package for recovering the problem, the diagnosis apparatus may interactively control the monitoring apparatus to collect desired additional information. In this way, the efficiency and accuracy of problem diagnosis and recovery may be improved. | 04-24-2014 |
20140095548 | INTERACTIVE VISUAL DATA MINING FOR INCREASING CLASSIFICATION ACCURACY - Visual data mining techniques for increasing data classification accuracy are disclosed. For example, a method comprises the following steps. At least two decision tree data structures from a high-dimensional data set are generated. A composite data structure comprising the at least two decision tree data structures is generated. The composite data structure is generated based on a correlation computed between the at least two decision tree data structures. The composite data structure is visualized on a display. Modification of the composite data structure is enabled via interaction with the visualization of the composite data structure on the display. | 04-03-2014 |
20140095467 | METHOD AND SYSTEM FOR MEMORY EFFICIENT, UPDATE OPTIMIZED, TRANSACTIONAL FULL-TEXT INDEX VIEW MAINTENANCE - Methods and systems are directed to an update-optimized and memory-efficient method for transactional full-text index view maintenance. Embodiments include a method and system of reducing the overhead requirements of maintaining a transactional index view in the case of a large number of updates at any particular time. The method involves maintaining a single blacklist bitmap across updated transactional query views, applying the latest set of updates to the bitmap when a new view is required, and post-adjusting the bitmap when the transactional view is created to ensure that entries that should be visible have not been removed. | 04-03-2014 |
20140075573 | PRIVILEGED ACCESS TO MANAGED CONTENT - Privileged access to managed content is disclosed. In some embodiments, a privileged portion of application code manages user access to managed content at a level of access greater than the user would otherwise be afforded. The privileged code moves a content management session up or down in levels of access as required to allow a user to perform through the application one or more specific actions it is desired to permit the user to do in a particular context (e.g., at a particular time in the lifecycle of an item of content and/or a particular point in a business process or work flow), including to permit the user to perform an action it is not desired to let the user perform in other contexts, such as write a particular value to a content item it is not desired to allow the user to write to otherwise. | 03-13-2014 |
20140074917 | REUSING SYSTEM CONFIGURATION INFORMATION AND METADATA FOR RELATED OPERATIONS - Reusing system configuration information and metadata for related operations is disclosed. It is determined that a group of content management system commands may be treated as a related set for purposes of updating content management system configuration information and/or metadata. The content management system configuration information and/or metadata are updated once for purposes of processing the group. | 03-13-2014 |
20140019420 | EFFICIENT USE OF MEMORY AND ACCESSING OF STORED RECORDS - Memory is used, including by receiving at a processor an indication that a first piece of metadata associated with a set of backup data is required during a block based backup and/or restore. The processor is used to retrieve from a metadata store a set of metadata that includes the first piece of metadata and one or more additional pieces of metadata included in the metadata store in an adjacent location that is adjacent to a first location in which the first piece of metadata is stored in the metadata store, without first determining whether the one or more additional pieces of metadata are currently required. The retrieved set of metadata is stored in a cache. | 01-16-2014 |
20140006856 | OPTIMIZED RECOVERY | 01-02-2014 |
20140006850 | REDUNDANT DISK ENCODING VIA ERASURE DECODING | 01-02-2014 |
20140006292 | DECISION PROCEDURE FOR CUSTOMER ISSUE RESOLUTION | 01-02-2014 |
20130346372 | SELF RECOVERY - A method, article of manufacture, and apparatus for restoring data. In some embodiments, this includes receiving a request from a requestor to recover an object, determining segments of the object, identifying any segments of the object residing in the requestor, and processing the recovery request based on the identified segments residing in the requestor. In some embodiments, segments of the object includes hash values of the object. In some embodiments, processing the recovery request based on the determined segments includes using the identified segments residing in the requestor to reconstitute the object. | 12-26-2013 |
20130332566 | PROVIDING LOCAL ACCESS TO MANAGED CONTENT - A method for providing local access to managed content is disclosed. The method comprises receiving from a remote host a request to perform an operation with respect to content associated with a set of managed content and obtaining information required to respond to the request. The method further comprises providing in response to the request a content locator usable to perform the requested operation through direct communication with a local content system associated with the remote host. | 12-12-2013 |
20130325811 | FILE SYSTEM QUIESCING - Techniques are disclosed for quiescing a file system. One technique comprises freezing a file system, flushing a memory associated with the file system, and thawing the file system. One technique comprises receiving a request targeted to a file system and intercepting the request. | 12-05-2013 |
20130322622 | AUTHENTICATION METHODS AND APPARATUS USING BASE POINTS ON AN ELLIPTIC CURVE AND OTHER TECHNIQUES - In one aspect, a method comprises the steps of deriving a base point on an elliptic curve in a first processing device, generating authentication information in the first processing device utilizing the base point and a private key of the first processing device, and transmitting the authentication information from the first processing device to a second processing device. The base point on the elliptic curve may be derived, for example, by applying a one-way function to a current time value, or by computation based on a message to be signed. | 12-05-2013 |
20130268500 | REPRESENTING DE-DUPLICATED FILE DATA - Providing a subset of de-duplicated as output is disclosed. In some embodiments, the output comprises a subset of data stored in de-duplicated form in a plurality of containers each comprising a plurality of data segments comprising the data. For each container that includes one or more data segments comprising the subset, a corresponding container data is included in the output. Each container may include one or more segments not included in the subset. For each container the corresponding container data of which is included in the output, a corresponding value in a data structure comprising for each container stored on the de-duplicated storage system a data value indicating whether or not the corresponding container data has been included in the output is updated. | 10-10-2013 |
20130262522 | SYSTEM AND METHOD OF HIERARCHICAL DATA CONTAINERS - A method, article of manufacture, and apparatus for managing a computing environment, such as a cloud data repository. In some embodiments, such may include modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, the component of an object being modified may include traits. In some embodiments, traits may be hierarchical data structures, including hierarchical data structures having more than one version. These hierarchical data structures may also contain or be associated with metadata, and may also make up the metadata of a host object. Embodiments provide that policies may be applied to these traits. | 10-03-2013 |
20130232125 | STREAM LOCALITY DELTA COMPRESSION - Stream locality delta compression is disclosed. A previous stream indicated locale of data segments is selected. A first data segment is then determined to be similar to a data segment in the stream indicated locale. | 09-05-2013 |
20130218900 | INDEX SEARCHING USING A BLOOM FILTER - A system for index searching comprises a first index, a second index, a processor, and a memory. The processor is configured to determine, using a Bloom filter for the second index of fingerprints, whether the Bloom filter indicates that an entry corresponding to a segment has been previously stored in the second index. The processor is further configured to, in the event that the Bloom filter indicates that an entry corresponding to the segment has been previously stored in the second index, retrieve a second index entry associated with the segment that has been previously stored. The memory is coupled to the processor and configured to provide the processor with instructions. | 08-22-2013 |
20130212259 | SERVICE SCRIPTING FRAMEWORK - Receiving and executing at a server a script provided by a client, e.g., in a service request sent by a web services or other service client and/or consumer, is disclosed. In various embodiments, the script is configured to cause the server to do one or more of the following: pre-process at least a portion of the services request; post-process a response data associated with the services request; and replace an operation comprising the service at least in part with a replacement operation defined or identified at least in part in the script. | 08-15-2013 |
20130166862 | EFFICIENT BACKUP REPLICATION - A system for backup replication comprises a processor and a memory. The processor is configured to determine data present in a most recent backup not present in a previous backup; transmit an extent specification; and transmit data segment fingerprints of the one or more data segments. The memory is coupled to the processor and is configured to provide the processor with instructions. | 06-27-2013 |
20130145054 | SUPERVISING A DATA STORAGE SYSTEM - A method and system for use in supervising a data storage system is disclosed. The status of an operational feature in the data storage system is monitored. A human perceptible signal is outputted in response to monitoring the status of the operational feature in the data storage system. The data storage system outputs the human perceptible signal locally thereto indicating the current status of the operational feature in the data storage system. | 06-06-2013 |
20130132657 | RETRIEVEING DATA FROM DATA STORAGE SYSTEMS - A method is used in retrieving data from data storage systems. A nonvolatile memory module connected to a data storage system is detected. The data storage system uses information stored in the nonvolatile memory module to initiate an action. Based on the information, the action is performed. The action includes retrieving data from the data storage system to the nonvolatile memory module. | 05-23-2013 |
20130110840 | ENVIRONMENT CLASSIFICATION AND SERVICE ANALYSIS | 05-02-2013 |
20130086015 | SYSTEM AND METHOD OF ROLLING UPGRADES OF DATA TRAITS - A method, article of manufacture, and apparatus for managing a computing environment, such as a cloud data repository. In some embodiments, this includes modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, the component of an object modified may include traits. In some embodiments, objects or traits may have more than one version. | 04-04-2013 |
20130080710 | HARDWARE METHOD FOR DETECTING TIMEOUT CONDITIONS IN A LARGE NUMBER OF DATA CONNECTIONS - Tracking several open data connections is difficult with a large number of connections. Checking for timeouts in software uses valuable processor resources. Employing a co-processor dedicated to checking timeouts uses valuable logic resources and consumes extra space. In one embodiment, a finite state machine implemented in hardware increases the speed connections can be checked for timeouts. The finite state machine stores a last accessed time stamp for each connection in a memory, and loops through the memory to compare each last accessed time stamp with a current time stamp of the system minus a global timeout value. In this manner, the finite state machine can efficiently find and react to timed out connections. | 03-28-2013 |
20130080166 | DIALOG-BASED VOICEPRINT SECURITY FOR BUSINESS TRANSACTIONS - A system for biometrically securing business transactions uses speech recognition and voiceprint authentication to biometrically secure a transaction from a variety of client devices in a variety of media. A voiceprint authentication server receives a request from a third party requestor to authenticate a previously enrolled end user of a client device. A signature collection applet presents the user a randomly generated signature string, prompting the user to speak the string, and recording the user's as he speaks. After transmittal to the authentication server, the signature string is recognized using voice recognition software, and compared with a stored voiceprint, using voiceprint authentication software. An authentication result is reported to both user and requestor. Voiceprints are stored in a repository along with the associated user data. Enrollment is by way of a separate enrollment applet, wherein the end user provides user information and records a voiceprint, which is subsequently stored. | 03-28-2013 |
20130066843 | INFORMATION CLASSIFICATION - Providing information classification in a computer system for use in an information management system. Information management provides services such as data protection, backup, retention, compliance, etc., by classifying the objects and/or environment of an entity according to its value to the entity. Initially a series of rules are identified relating to information management services. Using these rules, information is classified into categories by using a series of plugins that relate to specific characteristics of information within data. Often, classification includes the collection and/or generation of metadata. After the data is classified, service level objectives can be identified and mapped to service levels. After service levels are selected, the corresponding actions can be orchestrated such that the objects of the entity received the selected services in the service level. | 03-14-2013 |
20130024687 | SELECTIVE SHREDDING IN A DEDUPLICATION SYSTEM - Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a segment that is used when reconstructing a target file. The directory manager file is modified by deleting a reference to the target file. The reference includes a file encryption key. Retrieving the target file is made impractical by the deletion of the reference to the target file in the directory manager file. The modified directory manager file is encrypted using a second directory manager file key. | 01-24-2013 |
20130014104 | METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION - A hypervisor virtual server system, including a plurality of virtual servers, a plurality of virtual disks that are read from and written to by the plurality of virtual servers, a physical disk, an I/O backend coupled with the physical disk and in communication with the plurality of virtual disks, which reads from and writes to the physical disk, a tapping driver in communication with the plurality of virtual servers, which intercepts I/O requests made by any one of said plurality of virtual servers to any one of said plurality of virtual disks, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted I/O write requests from the tapping driver, and that provides data services based thereon. | 01-10-2013 |
20130007054 | FEDERATED SEARCH - Federated search is disclosed. A result associated with a search of a content source not natively configured to provide content type data for content items is received. A content type is associated with a content item included in the result based at least in part on information associated with the result. | 01-03-2013 |
20120330917 | BATCHING CONTENT MANAGEMENT OPERATIONS TO FACILITATE EFFICIENT DATABASE INTERACTIONS - Batching content management operations to facilitate efficient database interactions is disclosed. Two or more content management-related requests are received. The two or more content management-related requests are treated as a batch, including by formulating and sending to a database in a single database interaction a grouped request to add, delete, or modify each of a plurality of database records. | 12-27-2012 |
20120324159 | METHOD AND APPARATUS FOR IMPLEMENTING HIGH-PERFORMANCE, SCALEABLE DATA PROCESSING AND STORAGE SYSTEMS - A data system architecture is described that allows multiple processing and storage resources to be connected to multiple clients so as 1) to distribute the clients' workload efficiently across the available resources; and 2) to enable scaleable expansion, both in terms of the number of clients and in the number of resources. The major features of the architecture are separate, modular, client and resource elements that can be added independently, a high-performance cross-bar data switch interconnecting these various elements, separate serial communication paths for controlling the cross-bar switch settings, separate communication paths for passing control information among the various elements and a resource utilization methodology that enables clients to distribute processing or storage tasks across all available resources, thereby eliminating “hot spots” resulting from uneven utilization of those resources. | 12-20-2012 |
20120317381 | EFFICIENT DATA STORAGE SYSTEM - A system and method are disclosed for providing efficient data storage. A plurality of data segments is received in a data stream. The system preliminarily checks in a memory having a relatively low latency whether one of the plurality of data segments may have been stored previously in a data segment repository. The memory having the relatively low latency stores data segment information. In the event that the preliminary check determines that one of the plurality of data segments may have been stored in the data segment repository, a memory having a relatively higher latency is checked to determine whether the data segment has been stored previously in the data segment repository. | 12-13-2012 |
20120311662 | SMART CONTAINERS - Smart containers are disclosed. A system for managing content comprises an interface to receive an operation associated with an instance of a smart container. The smart container comprises a logical structure configure using a definition to manage associated content. The system for managing content comprises a processor configured to determine whether the operation is allowable based at least in part on a policy; and in the event that the operation is allowable, perform the operation. A memory is coupled to the processor and is configured to provide the processor with instructions. | 12-06-2012 |
20120303587 | BACKUP INFORMATION MANAGEMENT - Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed towards protected data. The intercepted file output is analyzed to determine whether a predetermined type of version of the protected data has been created. In the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted file output includes a modification to the protected data, the protected data automatically backed up, including by storing at least a portion of the file output as a backup version of the protected data. In the event it is determined that the predetermined type of version of the protected data has not been created, the protected data is not backed up. | 11-29-2012 |
20120290623 | EFFICIENT STORAGE OF NON-SEARCHABLE ATTRIBUTES - Storing data is disclosed. An attribute is included in a combined set of attributes. The combined set of attributes is stored in one or more database locations not specific to any one attribute in the combined set. | 11-15-2012 |
20120290533 | SYNCHRONIZING RESOURCE TYPE AND PROPERTY STRUCTURES - Extracting and synchronizing an Enterprise Portal application resource types and properties of business objects located in repository is disclosed. The repository is queried without human intervention to determine business object type information and for each business object type its associated properties. A representation of the business object types and associated properties in a format that facilitates synchronization with the enterprise portal application is generated. | 11-15-2012 |
20120278292 | METHOD AND APPARATUS FOR MANAGING AND ARCHIVING PERFORMANCE INFORMATION RELATING TO STORAGE SYSTEM - A data management and archive method and apparatus, for implementation in an automated system to monitor and manage status, performance and configuration data for networked storage components. Analysis and cross-correlation of data related to the storage components can be done individually, collectively and/or comparatively. A collection manager component of a workload analyzer is implemented to start and stop data collection. The collection manager includes a command and control module that coordinates requests of data from at least one collection agent configured on at least one host connected to the storage component(s). The collection manager manages collection of data and effects file transfer of collected data according to a user specified policy, and maintains status of the data collected. The user specified policy allows the user to specify data collection “shifts” (i.e. periodicity). | 11-01-2012 |
20120254848 | DEPLOYING AND DISTRIBUTING CONTENT MANAGEMENT CODE - Deploying and distributing content management code is disclosed. A software object class is received at a repository. The software object class is stored at the repository. The software object class is downloaded from the repository to an application server associated with the repository. | 10-04-2012 |
20120254565 | SYSTEM AND METHOD FOR MAINTAINING CONSISTENT POINTS IN FILE SYSTEMS - According to one embodiment, in response to a request to write a prime segment of a file system of a storage system having a plurality of storage units, one or more of the storage units are identified based on a prime segment write-map (PSWM). The PSWM includes information indicating which of the storage units to which a next prime should be written. The prime segment is then written in the one or more storage units identified from the PSWM, without writing the prime segment to a remainder of the storage units. The prime segment represents at least a portion of a prime that contains metadata representing a consistent point of data stored in the file system. | 10-04-2012 |
20120254257 | RESOURCE EFFICIENT SCALE-OUT FILE SYSTEMS - According to one embodiment, a file system (FS) of a storage system is partitioned into a plurality of FS partitions, where each FS partition stores segments of data files. In response to an input and output (IO) request for accessing a first of the FS partitions, a second of the FS partitions is selected that is currently in a ready state for access. The second FS partition is then removed from the ready state for access. The first FS partition is brought into a ready state for access. | 10-04-2012 |
20120254174 | TIME-BASED DATA PARTITIONING - According to one embodiment, a file system (FS) of a storage system is partitioned into a plurality of FS partitions, where each FS partition stores segments of data files. In response to a request for writing a file to the storage system, the file is stored in a first of the FS partitions that is selected based on a time attribute of the file, such that files having similar time attributes are stored in an identical FS partition. | 10-04-2012 |
20120254130 | SYSTEM AND METHOD FOR MAINTAINING CONSISTENT POINTS IN FILE SYSTEMS USING A PRIME DEPENDENCY LIST - According to one embodiment, a request is received for obtaining a consistent point of data stored in a file system of a storage system having a plurality of storage units. In response to the request, retrieving a prime dependency list from a first prime segment stored in a first of the storage units, where the prime dependency list includes information identifying at least a second prime segment stored in a second of the storage units. The first and second prime segments collectively form a prime segment representing a consistent view of the file system. Each of the prime segments listed in the prime dependency list is ascertained in an attempt to generate the consistent point of data. | 10-04-2012 |
20120254126 | SYSTEM AND METHOD FOR VERIFYING CONSISTENT POINTS IN FILE SYSTEMS - According to one embodiment, in response to a request for verifying a first prime representing a consistent point of a file system of a storage system having a plurality of storage units, each of a plurality of prime segments collectively representing the first prime is examined to determine whether the corresponding prime segment has been previously verified. Each of the prime segments is stored in one of the storage units, respectively. At least a first of the prime segments that has not been previously verified is verified, without verifying a second of the prime segments that has been previously verified. The first prime, when at least the first prime segment has been successfully verified, can be used to construct the consistent point of the file system. | 10-04-2012 |
20120239778 | SYSTEM AND METHOD FOR HIGHLY RELIABLE DATA REPLICATION - Data replication includes generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device; adding additional verification information to at least a portion of the replication data to prevent data corruption; and sending the replication data and the additional verification information over the communication channel to the destination replication device. The replication data with additional verification information is sent over the communication channel using a reliable protocol that allows the replication data to be verified by the reliable protocol at the destination replication device. The reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel. The additional verification information includes information for verifying that replication data sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol. | 09-20-2012 |
20120239641 | MEMORY QUOTA - A method, article of manufacture, and apparatus for processing queries, comprising analyzing a query tree, determining at least one operator based on the query tree analysis, assigning a memory allocation for each of the at least one operator, and storing the assignment in a storage device. In some embodiments, a memory classification for each of the at least one operator is determined. In some embodiments, assigning a memory allocation for each of the at least one operator includes assigning a memory allocation based on the memory classification. | 09-20-2012 |
20120233494 | STORAGE ARRAY NETWORK PATH IMPACT ANALYSIS SERVER FOR PATH SELECTION IN A HOST-BASED I/O MULTI-PATH SYSTEM - Systems and methods are provided for selecting a path for an I/O in a storage area network. In one embodiment, a method comprises receiving path configuration information for paths associated with a host device connected to the storage area network, a listing of components within the storage area network, and a notification of a component failure within the storage area network. The method may also comprise correlating the received path configuration information, the received listing of components, and the received notification of component failure to determine one determine one or more paths associated with the host device affected by the component failure. The method may further comprise transmitting to the host device an alert for the one or more affected paths. | 09-13-2012 |
20120233425 | DE-DUPLICATION IN A VIRTUALIZED STORAGE ENVIRONMENT - A data de-duplication application de-duplicates redundant data in the pooled storage capacity of a virtualized storage environment. The virtualized storage environment includes a plurality of storage devices and a virtualization or abstraction layer that aggregates all or a portion of the storage capacity of each storage device into a single pool of storage capacity, all or portions of which can be allocated to one or more host systems. For each host system, the virtualization layer presents a representation of at least a portion of the pooled storage capacity wherein the corresponding host system can read and write data. The data de-duplication application identifies redundant data in the pooled storage capacity and replaces it with one or more pointers pointing to a single instance of the data. The de-duplication application can operate on fixed or variable size blocks of data and can de-duplicate data either post-process or in-line. | 09-13-2012 |
20120226961 | EFFICIENT REDUNDANT MEMORY UNIT ARRAY - A method of storing data is disclosed. A set of data blocks, including a plurality of proper subsets of data blocks, is stored. A plurality of first-level parity blocks is generated, wherein each first-level parity block is generated from a corresponding proper subset of data blocks within the plurality of proper subsets of data blocks without reference to other data blocks not in the corresponding proper subset. A second-level parity block is generated, wherein the second level parity block is generated from a plurality of data blocks included in at least two of the plurality of proper subsets of data blocks, and wherein recovery of a lost block in a given proper subset of data blocks is possible without reference to any data blocks not in the given proper subset. | 09-06-2012 |
20120221817 | GLOBAL DE-DUPLICATION IN SHARED ARCHITECTURES - Redundant data is globally de-duplicated across a shared architecture that includes a plurality of storage systems. The storage systems implement copy-on-write or WAFL to generate snapshots of original data. Each storage system includes a de-duplication client to identify and reduce redundant original and/or snapshot data on the storage system. Each de-duplication client can de-duplicate a digital sequence by breaking the sequence into blocks and identifying redundant blocks already stored in the shared architecture. Identifying redundant blocks may include hashing each block and comparing the hash to a local and/or master hash table containing hashes of existing data. Once identified, redundant data previously stored is deleted (e.g., post-process de-duplication), or redundant data is not stored to begin with (e.g., inline de-duplication). In both cases, pointers to shared data blocks can be used to reassemble the digital sequence where one or more blocks were deleted or not stored on the storage system. | 08-30-2012 |
20120221560 | USER READABILITY IMPROVEMENT FOR DYNAMIC UPDATING OF SEARCH RESULTS - A system for moving search results visibly comprises an interface, a processor and a memory. The processor is configured to a) determine an ordering of one or more results in a subsequent set of search results as merged into a displayed set of search results; b) determine one or more interleaving positions for the subsequent set of search results in the displayed set of search results; c) cause the creation of one or more blank spaces in the one or more interleaving positions; and d) cause a display of one or more results in the subsequent set of search results in the one or more blank spaces. The memory causes a display of one or more results in the subsequent set of search results in the one or more blank spaces | 08-30-2012 |
20120221524 | STORAGE OF DATA WITH COMPOSITE HASHES IN BACKUP SYSTEMS - In one example, a method may include performance of a hash function on a digital sequence so as to generate a hash value that corresponds to the digital sequence. Next, the digital sequence may be broken into data pieces, and each data piece hashed to produce a corresponding hash value for each data piece. Then, a recipe may be produced that includes instructions which, when executed, may generate the digital sequence from the data pieces referenced by their corresponding hash values included in the recipe. Among other things, the hash values may enable reutilization of redundant data sequences by serving as pointers to the data pieces that the hash values respectively represent. | 08-30-2012 |
20120215980 | RESTORING DATA BACKED UP IN A CONTENT ADDRESSED STORAGE (CAS) SYSTEM - In one example, a method of restoring data backed up in a content addressed storage system may include retrieving a recipe and appended storage addresses from a first storage node of content addressed storage, where the recipe may include instructions for generating a data structure from two or more data pieces, and the two or more data pieces may be resident in locations identified by the appended storage addresses. The example method may further include populating a cache with the appended storage addresses for the two or more data pieces. As well the method may further include retrieving, and populating the cache with, the two or more data pieces without looking up a storage address for any of the two or more data pieces in an index, and restoring the data structure using the retrieved two or more data pieces in the cache. | 08-23-2012 |
20120215746 | SYSTEM FOR BACKING UP AND RESTORING DATA - In one example, a system that is operable to back up and restore data may include a high efficiency storage application configured to back up a chunk of data of a client system to a content addressed storage system by generating a recipe that includes instructions for generating the chunk of data from a plurality of data pieces. The system may further include a backup server communicably connected to the high efficiency storage application and configured to, among other things, in response to receipt of a restore request, recover the chunk of data by retrieving the recipe and appended storage addresses in one index seek without separately looking up a storage address for any of the plurality of data pieces in an index. | 08-23-2012 |
20120209820 | GARBAGE COLLECTION FOR MERGED COLLECTIONS - A method of identifying nonreferenced memory elements in a storage system is disclosed. A plurality of lists of referenced elements from a plurality of storage subsystems is input. A union of the lists of referenced elements is compiled. The union of the lists of referenced memory elements is compared to a list of previously referenced memory elements to determine previously referenced elements that are no longer referenced. The previously referenced elements that are no longer referenced is output. | 08-16-2012 |
20120191931 | REPLICATION OF DEDUPLICATED STORAGE SYSTEM - A method for replicating a deduplicated storage system is disclosed. A stream of data is stored on an originator deduplicating system by storing a plurality of deduplicated segments and information on how to reconstruct the stream of data. The originator deduplicating system is replicated on a replica system by sending a copy of the plurality of deduplicated segments and information on how to reconstruct the stream of data to the replica system. A first portion of the deduplicated segments stored on the originator deduplicating system that is corrupted is identified. A copy of the first portion of the deduplicated segments is requested to be sent by the replica system to the originator deduplicating system. | 07-26-2012 |
20120185514 | OPTIMIZED FETCHING FOR CUSTOMIZATION OBJECT ATTRIBUTES - An attribute of a hierarchical class-based object is received. The attribute in a database is stored both in a first location in a first table at a first level of a hierarchy of database tables which table hierarchy is based at least in part on a class hierarchy associated with the hierarchical class-based object and in a second location in a second table at a second level of the table hierarchy which second level is higher than the first level. | 07-19-2012 |
20120185504 | RETRIEVAL OF SEARCHABLE AND NON-SEARCHABLE ATTRIBUTES - Retrieving stored data is disclosed. A retrieval request is received for an object. A retrieval response is generated that includes: 1) a first set of searchable attributes associated with the object, wherein an attribute of the first set of attributes is stored in a database in a manner that enables a database query to be performed against the attribute of the first set of attributes; and 2) a second set of non-searchable attributes associated with the object, wherein an attribute of the second set of attributes is stored in the database in a manner that does not enable a database query to be performed against the attribute of the second set of attributes. | 07-19-2012 |
20120174094 | VIRTUAL APPLIANCE DEPLOYMENT - A method, article of manufacture, and apparatus for efficiently processing information. In some embodiments, this includes determining a physical appliance to virtualize, creating a virtual appliance based on the physical appliance, and storing the virtual appliance in a storage array. In some embodiments, creating the virtual appliance includes creating the virtual appliance from a template | 07-05-2012 |
20120173778 | DYNAMIC COMPRESSION OF AN I/O DATA BLOCK - In one aspect, a method of compressing data includes splitting an I/O into smaller I/Os based on an I/O throughput. The size of the smaller I/Os are equal or less than a set block size. The method also includes asynchronously compressing the smaller I/Os. | 07-05-2012 |
20120173773 | DYNAMIC COMPRESSION OF AN I/O DATA BLOCK - In one aspect, a method of compressing data includes splitting an I/O into smaller I/Os based on a throughput of I/Os in a queue, a smaller I/O is equal or smaller than a block size. The method also includes storing the smaller I/Os in the queue. The method further includes asynchronously compressing the smaller I/Os. | 07-05-2012 |
20120173563 | TOKENIZATION OF MULTIPLE-FIELD RECORDS - An improved technique for granting access to a complex datum maps a single user token representing a user onto a set of data group tokens, each data group token providing access to a data group stored on a storage medium. The improved technique combines the centralization of the complex datum while providing the security of tokenization and will lower the risk of a rogue third party gaining unauthorized access to the user's records stored across the data groups. | 07-05-2012 |
20120173516 | WORK FILE RECYCLING - A method, article of manufacture, and apparatus for processing information are disclosed. In some embodiments, this includes receiving a query plan, generating a work file based on the query plan, associating the query plan with a work file, storing the association, and storing the work file in a storage device after the query plan has executed. In some embodiments, a hash of the query plan may be generated. | 07-05-2012 |
20120168223 | HOUSING SYSTEM FOR RECEPTACLES - A housing system for covering a receptacle mounted on a board includes a base, a first flap and a second flap. The base has first and second opposing walls defining an interior space there between. The receptacle is positioned within the interior space. Each of the first and second flaps has a proximal end, a distal end and an intermediate portion between the proximal and distal ends. Each of the first and second flaps is mounted to the first and second opposing walls of the base such that each of the first and second flaps pivotally moves about a connection point with each of the first and second opposing sidewalls at the proximal end of each of the first and second flaps, between a first position and a second position. In the first position, the intermediate portion of the first flap is seated against the intermediate portion of the second flap, and in a second position, the intermediate portions of the first and second flaps are apart from each other to enable access to the interior space by an object to be mounted in the receptacle. At least one of the first and second flaps has at least one aperture therein between the intermediate portion and the distal end thereof. In the first position, the intermediate portions of each of the first and second flaps are a first distance from each other and the distal ends of the first and second flaps are a second distance from each other. The second distance is greater than the first distance. | 07-05-2012 |
20120167211 | Method and Apparatus to Harden a Software Execution in Random Access Memory - Example embodiments of the present invention relate to a system, apparatus and methods for preserving the integrity of a code to prevent it from being modified, maliciously or inadvertently, while it is in execution in the RAM of a computer platform. This method also may be referred to as code hardening. Code to be hardened in example embodiments of the present invention may be referred to as protected code. Example embodiments of the present invention are able to externally detect unauthorized stoppage of the hypervisor by employing (1) a launch-time metric of the protected code; (2) a run-time metric of the protected code; and (3) a liveliness indicator of the protected code. | 06-28-2012 |
20120143868 | COMPUTER READABLE ELECTRONIC RECORDS AUTOMATED CLASSIFICATION SYSTEM - Classifying an electronic document in a computer-based system is disclosed. For each classification instance in a plurality of classification instances, a confidence data indicating a degree of confidence that the electronic document is associated with that classification instance is determined. A classification, based on a first classification instance in the plurality of classification instances, is assigned without human intervention to the electronic document if the confidence data associated with the first classification instance exceeds a first threshold. | 06-07-2012 |
20120135760 | DATA MESSAGE PROCESSING - A method of processing data messages is disclosed. A mobile data message that is transmitted at least in part via a mobile communication network is received from a sending mobile device, wherein the mobile data message includes at least some message content generated at the sending mobile device. It is determined whether the mobile data message requires special handling at a compliance destination, wherein the compliance destination is neither the sending mobile device nor an intended recipient of the mobile data message. The mobile data message or a copy thereof is sent to the compliance destination if it is determined that the mobile data message requires special handling, wherein special handling is performed on the sent mobile data message or the copy thereof at the compliance destination. | 05-31-2012 |
20120124097 | REUSING SYSTEM CONFIGURATION INFORMATION AND METADATA FOR RELATED OPERATIONS - Reusing system configuration information and metadata for related operations is disclosed. It is determined that a group of content management system commands may be treated as a related set for purposes of updating content management system configuration information and/or metadata. The content management system configuration information and/or metadata are updated once for purposes of processing the group. | 05-17-2012 |
20120124003 | USING VERSIONING TO BACK UP MULTIPLE VERSIONS OF A STORED OBJECT - Using a versioning feature of an authoring application to back up multiple versions of a stored object in single, version-enabled instance stored on backup media is disclosed. In some embodiments, an indication is received that a subsequent version data associated with an object an existing instance of which is stored in a backup storage location is to be backed up. A version control mechanism of an authoring application that created or updated the object as stored in a primary storage location is invoked to incorporate the subsequent version data into the existing instance of the object as stored in the backup storage location. | 05-17-2012 |
20120110029 | DATA MODEL FOR SERVICE ARCHITECTURE - Processing for a data package is disclosed. An operation is received including a data package. The operation is performed with respect to each of one or more data objects included in the data package, in a manner determined at least in part by a context data applicable to the operation. | 05-03-2012 |
20120110024 | IDENTIFIERS FOR NON-SEARCHABLE ATTRIBUTES - An attribute is received for storage. Whether the attribute is searchable or non-searchable in storage is determined. Storing the attribute as a searchable attribute comprises storing the attribute in a database table corresponding to a hierarchical class-based object. Storing the attribute as a non-searchable attribute comprises storing the attribute together with one or more other non-searchable attributes as a set of attributes. The set of attributes is stored in a database location outside the database table corresponding to the hierarchical class-based object, and the database location is accessed before the database table. A unique attribute identifier is associated with the attribute to distinguish between a name of the attribute and a name of one of the one or more other non-searchable attributes in the event that the name of the attribute and the name of the one of the one or more other non-searchable attributes are assigned the same name. | 05-03-2012 |
20120084596 | MONITORING CIRCUIT - A monitoring circuit monitors for the occurrence of a failure event on a data bus. The monitoring circuit includes a failure detection circuit for detecting the occurrence of the failure event within a device coupled to the data bus. An isolation circuit isolates the device from the data bus in response to the occurrence of the failure event. | 04-05-2012 |
20120084595 | OPTIMIZED RECOVERY - A method, article of manufacture, and apparatus for restoring data. In some embodiments, this includes determining an object to be recovered, determining a representation of the object, and requesting the representation of the object from a data resource system. In some embodiments, the representation of the object is a hash value of the object. In some embodiments, the representation of the object is a segment of the object. | 04-05-2012 |
20120084333 | TRANSMITTING FILESYSTEM CHANGES OVER A NETWORK - Transmitting filesystem changes over a network is disclosed. A hash of data comprising a chunk of directory elements comprising one or more consecutive directory elements in a set of elements sorted in a canonical order is computed at a client system. One or more directory elements comprising the chunk are sent to a remote server in the event it is determined based at least in part on the computed hash that corresponding directory elements as stored on the remote server are not identical to the directory elements comprising the chunk as stored on the client system. | 04-05-2012 |
20120072763 | SYSTEM AND METHOD OF FILE LOCKING IN A NETWORK FILE SYSTEM FEDERATED NAMESPACE - A method, system and apparatus of a file locking within a network file system federated namespace is disclosed. In one embodiment, a method includes accessing a target file in a storage medium over a network through an intermediate proxy server using a processor. The storage medium may be any one storage medium of a group of storage mediums on the network forming a data sharing cluster. In addition, the method includes locking the target file in the storage medium through a lock protocol to enable an access to modify the target file to at most one user at any given time, via the intermediate proxy server. | 03-22-2012 |
20120072490 | PROVIDING ACCESS TO MANAGED CONTENT IN RICH CLIENT APPLICATION ENVIRONMENTS - Providing access to managed content in rich client application environments is disclosed. A request is received from within a first application environment for access to managed content not managed primarily by a first application with which the first application environment is associated. Access is provided to managed content based at least in part on a context data associated with the first application environment. | 03-22-2012 |
20120072461 | ACCESS CONTROL FOR BUSINESS PROCESS DATA - Controlling access to business process data is disclosed. An instance of a first business process object configured to contain business process data of a business process is created. An instance of a second business process object configured to contain business process data of the business process is created. A first access control list is associated with the instance of the first business process object and a second access control list is associated with the instance of the second business process object. | 03-22-2012 |
20120042365 | DISPOSABLE BROWSER FOR COMMERCIAL BANKING - Methods, computer program products, and apparatuses are provided for performing and facilitating secure communication between a client-side computing device and a remote application server through a virtual computing environment provided by an intermediate virtualization server. The virtual computing environment includes a disposable component, allowing all settings to be initialized to a secure state after each user session. | 02-16-2012 |
20120036574 | REMOTE ACCESS ARCHITECTURE ENABLING A CLIENT TO PERFORM AN OPERATION - Enabling a client computer to perform an operation is disclosed. Login information is received from a client computer. The login information is confirmed by querying a trusted agent on the client computer. | 02-09-2012 |
20120036120 | QUERY TRANSLATION FOR SEARCHING COMPLEX STRUCTURES OF OBJECTS - Searching stored content is disclosed. A first mapping is created from an object to one or more stored relational database tables. A second mapping is created from the object to an indexer schema. One or both of the following is done: 1) using the first mapping to translate a search request expressed in an abstract query language to a first query language associated with the relational database; and 2) using the second mapping to translate the search request to a second query language associated with the indexer schema. | 02-09-2012 |
20120014518 | ENHANCED SERVICES PROVIDED USING COMMUNICATION REDIRECTION AND PROCESSING - Processing a communication is disclosed. A first request to establish communication is received at a redirection node from a requesting communication participant. A destination communication participant associated with the request is determined. A communication session in which the requesting communication participant, the redirection node, and the destination communication participant are participants at the same time is established, including sending from the redirection node to an equipment associated with the destination communication participant a second request to establish communication between the redirection node and the equipment associated with the destination communication participant. A communication session processing feature not provided with respect to the communication session by a telecommunication service provider associated with a service provider network used to establish and provide the communication session is made available to at least one of the requesting communication participant and the destination communication participant. | 01-19-2012 |
20120005423 | Viewing Compression and Migration Status - A method for use in viewing compression and migration status is disclosed. A logical volume is selected for compression into a compressed logical volume. A destination storage pool for the compressed logical volume is selected. The logical volume is compressed during migration of the logical volume to the destination pool. Unified status information of progress of the compression and migration is presented. A system for use in viewing compression and migration status is also disclosed. | 01-05-2012 |
20120005379 | DATA ACCESS DURING DATA RECOVERY - A method, article of manufacture, and apparatus for accessing data during data recovery. In some embodiments, this includes sending an I/O request from an application to an object, wherein the object is being recovered, establishing an I/O intercept, intercepting the application's I/O request with the I/O intercept, and redirecting the I/O request based on the status of the object's sub-objects. | 01-05-2012 |
20120005253 | METHOD AND APPARATUS FOR PROCESSING DISTRIBUTED DATA - Some embodiments are directed to processing content units stored on a distributed computer system that comprises a plurality of independent nodes. The content units may be processed by determining which content units are stored on each node and identifying which content units warrant processing. Nodes may be selected to process the content units that warrant processing and instructions may be sent to these nodes to instruct them to process these content units. | 01-05-2012 |
20120005176 | CO-OPERATIVE LOCKING BETWEEN MULTIPLE INDEPENDENT OWNERS OF DATA SPACE - Locking allocated data space is disclosed. An indication is received that certain previous version data is required to be retained. A map of metadata records, each associated with a journaling process write of previous version data which write includes previous version data required to be retained, is built. In some embodiments, the map associates a write time with each record in the map. A reclamation process checks to determine whether any storage proposed to be reclaimed is included in the map of record identifiers. In some embodiments, the determination is made based at least in part on the write time associated in the map with at least a first record identifier in time-sorted order. | 01-05-2012 |
20110307441 | REPLICATION OF DEDUPLICATED STORAGE SYSTEM - A method of replicating a deduplicated storage system is disclosed. The method comprises storing a stream of data on an originator deduplicating system by storing deduplicated segments and information on how to reconstruct the stream of data. The method further comprises replicating the originator deduplicating system by receiving a copy of the deduplicated segments, information regarding containers for the deduplicated segments, and information on how to reconstruct the stream of data transferred from the originator deduplicating system to the replica system. | 12-15-2011 |
20110302326 | PARTITIONING A DATA STREAM USING EMBEDDED ANCHORS - Selecting a segment boundary within block b is disclosed. A first anchor location j|j+1 is identified wherein a value of f(b[j−A+1 . . . j+B]) satisfies a constraint and wherein A and B are non-negative integers. A segment boundary location k|k+1 is determined wherein k is greater than minimum distance from j. | 12-08-2011 |
20110302211 | MANDATORY ACCESS CONTROL LIST FOR MANAGED CONTENT - Restricting access to managed content to users that are both (1) members of one or more required groups identified in an ACL associated a content item to which access is requested and (2) otherwise granted access under the ACL, e.g., by virtue of their individual identity, role, or group membership is disclosed. In some embodiments, an ACL is configured to identify one or more groups as being a “required” group, membership in which is required for a user to be granted access to a content item with which the ACL is associated. If a user is not a member of a required group, the user is denied access (or denied access above a certain level), even if the user is otherwise delegated access rights in the ACL. | 12-08-2011 |
20110302141 | SAVE SET BUNDLING FOR STAGING - Backing up data blocks is disclosed, including: receiving an indication that a first backed up data block is to be processed; determining that the first backed up data block and a second backed up data block are related at an application level and are to remain stored together; and processing together the first and second backed up data blocks based at least in part on the determination that the first and second backed up data blocks are related at an application level and are to remain stored together. | 12-08-2011 |
20110282854 | VIRTUAL REPOSITORY MANAGEMENT - Virtual repository management is disclosed. An indication is received that a content management functionality is desired to be available with respect to one or more external content items. A reference object is created for each for the one or more external content items that represents the external content item and enables the content management functionality to be performed with respect to the external content item. | 11-17-2011 |
20110282845 | EFFICIENT BACKUP DATA RETRIEVAL - Information is retrieved by receiving a list of one or more files to be restored; and obtaining a contiguous group of blocks that includes a first segment of one or more blocks associated with the one or more files to be restored, a gap of one or more blocks that are not associated with the one or more files to be restored that is adjacent to the first segment, and a second segment of one or more blocks associated with the one or more files to be restored that is adjacent to the gap. | 11-17-2011 |
20110270887 | CLUSTER STORAGE USING SUBSEGMENTING FOR EFFICIENT STORAGE - Cluster storage is disclosed. A data stream or a data block is received. The data stream or the data block is broken into segments. For each segment, a cluster node is selected, and a portion of the segment smaller than the segment is identified that is a duplicate of a portion of a segment already managed by the cluster node. | 11-03-2011 |
20110258554 | HIERARCHICAL DISPLAY OF PROJECT INFORMATION IN A COLLABORATION ENVIRONMENT - Providing access to project information in a virtual collaboration environment is disclosed. A credential information associated with a user of the virtual collaboration environment is received. It is determined, based at least in part on the credential information, which portion or portions of a hierarchical set of project information the user is entitled to receive. A hierarchical display that includes the portion or portions of the hierarchical set of project information that it is determined the user is entitled to receive is provided to the user via the virtual collaboration environment. | 10-20-2011 |
20110246778 | PROVIDING SECURITY MECHANISMS FOR VIRTUAL MACHINE IMAGES - A method for providing a security mechanism for validating and executing a virtual machine image where the virtual machine image is obtained from an external source to run on an endpoint or host system. An electronic device storing validation data is connected to the host system, and the virtual machine image is validated with the validation data. The virtual machine image run on the host system if validated and/or decrypted. The electronic device can be a USB flash drive, and the electronic device can include a security processor with memory in addition to having a display, keypad, token, or any combination thereof. The validation data utilized may comprise a keyed hash or digital signature when validating the virtual machine image. | 10-06-2011 |
20110246542 | SYSTEM FOR LIGHTWEIGHT OBJECTS - Creating an object is disclosed. An instance of a sharable type is created. An instance of a lightweight type is created. The sharable type is designated as a parent of the lightweight type. The instance of the sharable type is designated as a parent of the instance of the lightweight type. The instance of the sharable type may be shared by one or more other instances of the lightweight type. | 10-06-2011 |
20110208775 | FEDERATED SEARCH - Federated search is disclosed. A result associated with a search of a content source not natively configured to provide content type data for content items is received. A content type is associated with a content item included in the result based at least in part on information associated with the result. | 08-25-2011 |
20110202569 | PROCESSING OF A GENERALIZED DIRECTED OBJECT GRAPH FOR STORAGE IN A RELATIONAL DATABASE - Creating transaction instructions is disclosed. A description of a set of objects is received. For each of at least a subset of objects in the set of objects, a description of one or more associated relationships is received. The description of the set of objects and the descriptions of the one or more associated relationships for each object in the at least a subset of the set of objects are processed to create an ordered list of transaction instructions for storing the set of objects and the one or more associated relationships for each object in the at least a subset of the set of objects. | 08-18-2011 |
20110196869 | CLUSTER STORAGE USING DELTA COMPRESSION - Storage of data segments is disclosed. For each segment, a similar segment to the segment is identified, wherein the similar segment is already managed by a cluster node. In the event the similar segment is identified, a reference to the similar segment and a delta between the similar segment and the segment are caused to be stored instead of the segment. | 08-11-2011 |
20110191560 | EFFICIENT DATA STORAGE USING TWO LEVEL DELTA RESEMBLANCE - Storage using resemblance of data segments is disclosed. It is determined that a new segment resembles a second prior stored segment wherein the second prior stored segment is represented as a first stored delta and a first prior stored segment. A second delta between the new segment and the prior stored segment is determined. A representation of the new segment based at least in part on the second delta is stored. | 08-04-2011 |
20110184975 | INCORPORATED WEB PAGE CONTENT - Including search result based content in a webpage is disclosed. One or more search criteria and an indication that a search result based content associated with the search criteria is to be included in a web page are received. A computer script or code configured to enable the search result based content to be retrieved in accordance with the search criteria is generated automatically for the web page. | 07-28-2011 |
20110173160 | SNAPSHOT INDEXING - Managing backup data comprises accessing a snapshot of a data set, wherein the data set includes at least one object and the snapshot includes a replica of the data set, and adding to an index associated with the snapshot, with respect to each of one or more objects included in the snapshot, index data indicating at least where the object is located within the snapshot. | 07-14-2011 |
20110173159 | DATA MOVER DISCOVERY OF OBJECT EXTENT - Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object. | 07-14-2011 |
20110131251 | SMART CONTAINERS - Smart containers are disclosed. A definition is received of a logical structure configured to manage associated content. A policy or operation specified by the definition is applied to an item of content associated with an instance of the logical structure. | 06-02-2011 |
20110093855 | MULTI-THREAD REPLICATION ACROSS A NETWORK - A replicated set of data is processed by receiving at a target, from one of a plurality of replication processing threads, a received batch of one or more non-synchronization tasks. It is determined that the received batch comprises a next batch to be performed at the target and the non-synchronization tasks included in the batch are performed in a task order. | 04-21-2011 |
20110083197 | PRIVILEGED ACCESS TO ENCRYPTED DATA - Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content. | 04-07-2011 |
20110078118 | BACKUP OF INCREMENTAL METADATA IN BLOCK BASED BACKUP SYSTEMS - Performing a backup is disclosed. A changed portion of a file system tree is determined based at least in part on a stored state of the file system tree at a time a prior block based backup of the file system tree was performed. Incremental metadata associated with the changed portion is obtained. The obtained incremental metadata is stored where there is at least some metadata associated with an unchanged portion of the file system tree that is not stored when storing the obtained incremental metadata. | 03-31-2011 |
20110072227 | PERFORMANCE IMPROVEMENT OF A CAPACITY OPTIMIZED STORAGE SYSTEM USING A PERFORMANCE SEGMENT STORAGE SYSTEM AND A SEGMENT STORAGE SYSTEM - A system for storing data comprises a performance storage unit for storing a data stream or a data block in. The data stream or the data block comprises one or more data items. The system further comprises a segment storage system for automatically storing a stored data item of the one or more data items as a set of segments. The system further comprises a performance segment storage unit for storing the set of segments in the event that the stored data item has been stored using the segment storage system. | 03-24-2011 |
20110072226 | SNAPSHOTTING OF A PERFORMANCE STORAGE SYSTEM IN A SYSTEM FOR PERFORMANCE IMPROVEMENT OF A CAPACITY OPTIMIZED STORAGE SYSTEM - A system for storing data comprises a performance storage system for storing one or more data items. A data item of the one or more data items comprises a data file or a data block. The system further comprises a segment storage system for storing a snapshot of a stored data item of the one or more data items in the performance storage system. The taking of the snapshot of the stored data item enables recall of the stored data item as stored at the time of the snapshot. At least one newly written segment is stored as a reference to a previously stored segment. | 03-24-2011 |
20110071980 | PERFORMANCE IMPROVEMENT OF A CAPACITY OPTIMIZED STORAGE SYSTEM INCLUDING A DETERMINER - A system for storing data comprises a performance storage unit and a performance segment storage unit. The system further comprises a determiner. The determiner determines whether a requested data is stored in the performance storage unit. The determiner determines whether the requested data is stored in the performance segment storage unit in the event that the requested data is not stored in the performance storage unit. | 03-24-2011 |
20110047132 | CONSISTENT RETENTION AND DISPOSITION OF MANAGED CONTENT AND ASSOCIATED METADATA - Consistent retention and disposition of managed content and associated metadata is disclosed. An indication that a retention policy is to be applied to a selected item of content comprising a body of managed content is received. The selected item of content and its associated metadata are retained automatically in parallel in accordance with the retention policy. | 02-24-2011 |
20110040819 | EFFICIENT COMPUTATION OF SKETCHES - Determining a summary feature set is disclosed. A plurality of subsegments of a first segment are selected. For each subsegment, a plurality of values by applying a set of functions to each subsegment are computed. From all the values computed for all the subsegments, a first subset of values is selected. | 02-17-2011 |
20110035430 | SYSTEMS AND METHODS FOR IMPLEMENTING CONTENT SENSITIVE ROUTING OVER A WIDE AREA NETWORK (WAN) - Systems and methods for optimizing storage network functionality. The methods and systems of the present invention are particularly useful for optimizing storage network performance for cases in which some components of the network may be separated by significant distances and/or which include communication links with relatively limited bandwidth. In certain aspects, the present invention provides methods and systems for implementing access to and management of geographically distributed storage resources through multiple peer-to-peer storage network array management functions (AMFs) that may also be geographically distributed. The methods and systems of the present invention, in certain aspects, provide geographically aware cache sharing, cache replication, cache coherence, traffic routing, redundancy group structure, source and destination selection, pre-fetching of data, message gathering and other useful features. | 02-10-2011 |
20110029730 | DATA PROCESSING SYSTEM USING CACHE-AWARE MULTIPATH DISTRIBUTION OF STORAGE COMMANDS AMONG CACHING STORAGE CONTROLLERS - A data processing system includes a storage system and caching storage controllers coupled to the storage system and to a storage network. The storage controllers operate in an active-active fashion to provide access to volumes of the storage system from any of the storage controllers in response to storage commands from the storage network. The storage controllers employ a distributed cache protocol in which (a) each volume is divided into successive chunks of contiguous blocks, and (b) either chunk ownership may be dynamically transferred among the storage controllers in response to the storage commands, or storage commands sent to a non-owning controller may be forwarded to the owning controller. A multipathing initiator such as a server computer directs the storage commands to the storage controllers by (1) for each volume, maintaining a persistent association of the chunks of the volume with respective storage controllers, and (2) for each storage request directed to a target chunk, identifying the storage controller associated with the target chunk and sending a corresponding storage command to the identified storage controller. Chunk ownership tends to stabilize at individual storage controllers, reducing unnecessary transfer of cache data and metadata among the storage controllers. | 02-03-2011 |
20110016083 | SEEDING REPLICATION - Seeding replication is disclosed. One or more but not all files stored on a deduplicated storage system are selected to be replicated. One or more segments referred to by the selected one or more but not all files are determined. A data structure is created that is used to indicate that at least the one or more segments are to be replicated. In the event that an indication based at least in part on the data structure indicates that a candidate segment stored on the deduplicating storage system is to be replicated, the candidate segment is replicated. | 01-20-2011 |
20100332748 | DISTRIBUTED DATA STORAGE SYSTEM USING LOCAL COPY OPERATIONS FOR RAID-1 VOLUMES - In a distributed RAID-1 (DR1) copy operation, operation of source and target DR1 volumes is first converted to a local-copy operating mode in which the distributed copy operation is converted into a set of local copy operations. Each t is performed at a respective location of the disks of the DR1 volumes and involves copying data of the source DR1 from a first disk to a second disk via a local second communication channel of relatively high bandwidth. Following conversion, the local copy operations are performed at the locations. Upon completion of the local copy operations, storage operations to the source and target DR1 volumes are temporarily suspended, operation of the source and target DR1 volumes is converted back to the normal operating mode, and storage operations to the source and target DR1 volumes are resumed. | 12-30-2010 |
20100281023 | RELEVANCY SCORING USING QUERY STRUCTURE AND DATA STRUCTURE FOR FEDERATED SEARCH - Determining a relevancy ranking score is disclosed. A query is received that includes one or more constraints. One of the one or more constraints includes an operator. A search result based on the query is received. The relevancy ranking score for the received search result is determined based at least in part on the operator associated with the one or more constraints of the query. | 11-04-2010 |
20100281002 | ACTIVE DIRECTORY CONTAINER RECOVERY - Methods and systems for performing rapid recovery of deleted object in Active Directory. The invention allows automated recovery of any object at any point in an Active Directory hierarchy. In one embodiment, the method for recovering a deleted object includes determining whether the object of interest is contained in the tombstone and, if not, recursively evaluating higher-order parent nodes until a parent node is found that exists in the tombstone. The object of interest can then be reanimated and its attributes automatically restored as well as those for all of the children of the object of interest. | 11-04-2010 |
20100274783 | TUNING OF RELEVANCY RANKING FOR FEDERATED SEARCH - Determining a relevancy ranking score is disclosed. An indication is received that a relevancy ranking score algorithm is to be tuned to a selected preference. The relevancy ranking score algorithm is updated based at least in part on the selected preference, wherein the relevancy ranking score of a search result resulting from a search query is based at least in part on one or more constraints of the search query. | 10-28-2010 |
20100218039 | METHODS AND SYSTEMS FOR IMPLEMENTING SHARED DISK ARRAY MANAGEMENT FUNCTIONS - Multiple Array Management Functions (AMFs) are connected to multiple redundancy groups over a storage area network (SAN), such as a fiber-channel based SAN. The multiple AMFs share management responsibility of the redundancy groups, each of which typically includes multiple resources spread over multiple disks. The AMFs provide concurrent access to the redundancy groups for associated host systems. When a host requests an AMF to perform an operation on a resource, the AMF synchronizes with the other AMFs sharing control of the redundancy group that includes the resource to be operated on, so as to obtain access to the resource. While performing the operation, the AMF send replication data and state information associated with the resource such that if the AMF fails, any of the other AMFs are able to complete the operation and maintain data reliability and coherency. | 08-26-2010 |
20100205393 | HIGH EFFICIENCY PORTABLE ARCHIVE - According to one embodiment, a method is disclosed for storing and archiving point-in-time sets of a raw data set in an environment including at least one server storing the raw data set. The method includes providing a virtualization layer on a computing resources pool. A virtualized storage application is operated on the virtualization layer. The virtualization layer shields the virtualized storage application from actual hardware in the computing resources pool. Storage efficient versions of the raw data set stored on one or more servers are generated. The storage efficient versions of the raw data set include point-in-time versions of the raw data set that are smaller in size than the raw data set. | 08-12-2010 |
20100192160 | System, Device, and Method for Interprocessor Communication in a Computer System - A system, device, and method for interprocessor communication in a computer system utilizes a special Message Passing Service (MPS) to provide interprocessor communications. The MPS enables a client application running on one processor in a computer to communicate with a target application running a different processor in the same or a different computer. In order for the client application to communicate with the target application, the client application establishes a session to the target application over an existing communication link using the MPS. The MPS provides for both synchronous and asynchronous communication services. When the client application establishes the session to the target application, the client application specifies, among other things, a “callback” routine. The MPS invokes the “callback” routine to report certain asynchronous events to the client application. The MPS blocks the client application during certain synchronous operations so that the client application does not proceed until the synchronous operation is completed. | 07-29-2010 |
20100153665 | METHODS AND APPARATUS FOR MANAGING DELETION OF DATA - One embodiment is directed to the deletion of content units from a storage system. When a content unit is deleted, a reflection may be created and stored on the storage system. The reflection identifies the deleted content unit and may include additional information, such as a portion of the content of the content unit and audit information regarding the deletion of the content unit. | 06-17-2010 |
20100083369 | METHOD AND APPARATUS PROVIDING A FRAMEWORK FOR SECURE INFORMATION LIFECYCLE - A method, apparatus and computer program product for handling secure information (e.g., a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored) is presented. Secure information is stored in a software container. A plurality of representations of the secure information is provided, each of the plurality of representations for use under different conditions. Dependent on the particular condition, at least one of the plurality of representations of the secure information is provided by the container. The container holds the secure information during all stages of processing in a manner that prevents unauthorized parties from gaining access to the secret in clear form. | 04-01-2010 |
20090271589 | STORAGE VIRTUALIZATION SYSTEM - Storage virtualization systems and methods that allow customers to manage storage as a utility rather than as islands of storage which are independent of each other. A demand mapped virtual disk image of up to an arbitrarily large size is presented to a host system. The virtualization system allocates physical storage from a storage pool dynamically in response to host IO requests, e.g., SCSI I/O requests, allowing for the amortization of storage resources-through a disk subsystem while maintaining coherency amongst I/O RAID traffic. In one embodiment, the virtualization functionality is implemented in a controller device, such as a controller card residing in a switch device or other network device, coupled to a storage system on a storage area network (SAN). The resulting virtual disk image that is observed by the host computer is larger than the amount of physical storage actually consumed. | 10-29-2009 |
20090132476 | POLICY BASED INFORMATION LIFECYCLE MANAGEMENT - A method, article of manufacture, and apparatus for managing a lifecycle of an auditory communication is disclosed. In an embodiment, this comprises receiving an auditory communication with associated data representing identified keywords in the communication and call transport information. A data for a disposition of the communication is determined from a portion of the identified keywords, a portion of the call transport information, or a portion of the policies invoked. The communication is associated with the date(s). | 05-21-2009 |
20090089862 | Cross domain delegation by a storage virtualization system - The present is a system and method for preserving user account security privileges during a migration or re-direction of data from one network attached storage (“NAS”) system to another. Certain NAS systems authenticate user accounts using Kerberos Delegation Technology. In addition, some NAS systems feature the ability to constrain delegation to certain services. While effective in limiting access and promoting network security, this constrained delegation restricts the ability of a storage virtualization system to migrate or re-direct data to other NAS systems, especially if the other NAS system resides or is identified by a different domain name. The present invention is a system and method for storing user account credentials that work with the former NAS system, and providing a way to translate these credentials to a new NAS system with a new domain, permitting seamless data migration and re-direction across domains. | 04-02-2009 |
20090089522 | System and method for dynamic storage device reconfiguration - A system and method provides for recovery of a backup process that has been interrupted by an address change for a connected backup storage device. A backup server may manage a data backup process from client computers to backup storage devices, each device having a unique address. Devices may be managed by storage node computers, which may occasionally reorganize its associated devices, causing some device address changes. This will interrupt the backup process since the server will not be able to match reorganized devices to known addresses. The present invention provides a method for querying the backup storage device, updating the server with the new address change, and continuing with the backup process. The present invention also provides a method for disabling the device from the backup process if the problem cannot be solved, then resuming the backup process. | 04-02-2009 |
20090089395 | System and method for absolute path discovery by a storage virtualization system - A system and method provides for enabling a storage virtualization system to dynamically discover shares on a network attached storage file system is disclosed. Certain network attached storage systems represent user shares using abbreviated symbolic path names rather than full absolute path names. These network attached storage systems can correctly map the abbreviated path address to the actual file location; however, when a storage virtualization system is implemented to manage shares or files in these shares, it cannot access these files because it does not have the absolute path address. An embodiment of the present invention provides software instructions to augment the capabilities of the storage virtualization system, enabling it to map files with abbreviated share names, and therefore provide it with the ability to access these types of network attached storage systems. | 04-02-2009 |
20090089344 | Network accessed storage files system query/set proxy service for a storage virtualization system - A system and method provides for querying and setting file attributes between Network File System and Common Internet File System network attached storage systems. Aspects of the present invention may be performed by a storage virtualization system that acts as an intermediary between one or more network attached storage systems. By querying and setting file attributes, files may be migrated between network attached storage systems while keeping the file attributes and primary location of the file contents intact. In addition, the present invention provides an additional aspect of ensuring that file names of multi-protocol files are compatible across every protocol. | 04-02-2009 |
20090063795 | DE-DUPLICATION IN A VIRTUALIZED STORAGE ENVIRONMENT - A data de-duplication application de-duplicates redundant data in the pooled storage capacity of a virtualized storage environment. The virtualized storage environment includes a plurality of storage devices and a virtualization or abstraction layer that aggregates all or a portion of the storage capacity of each storage device into a single pool of storage capacity, all or portions of which can be allocated to one or more host systems. For each host system, the virtualization layer presents a representation of at least a portion of the pooled storage capacity wherein the corresponding host system can read and write data. The data de-duplication application identifies redundant data in the pooled storage capacity and replaces it with one or more pointers pointing to a single instance of the data. The de-duplication application can operate on fixed or variable size blocks of data and can de-duplicate data either post-process or in-line. | 03-05-2009 |
20090063528 | DE-DUPLICATION IN A VIRTUALIZED SERVER ENVIRONMENT - A data de-duplication application de-duplicates redundant data on the primary storage read/write pathway of a virtualized server environment. The virtualized server environment comprises one or more server applications operating on a virtualization layer provided on a computer architecture that includes memory (e.g., RAM, cache memory) for temporarily storing data and storage (e.g., disk storage) for persistently storing data. The one or more server applications use the read-write pathway to read data into memory from storage and to write data to storage from memory. The de-duplication application identifies redundant data in memory, storage, or both, and replaces the redundant data with one or more pointers pointing to a single copy of the data. The de-duplication application can operate on fixed or variable size blocks of data and can de-duplicate data either post-process or in-line. | 03-05-2009 |
20080219093 | Sensing System - The present invention relates to a sensing system, in particular to sensing system for sensing undersea seismic events. A vibration sensor is provided for sensing seismic vibrations on the sea bed is provided. The vibration sensor is electrically coupled to a transmitter unit, the transmitter unit being arranged to transmit, in use, an acoustic wave from which the presence of a seismic vibration can be inferred. The acoustic wave modulates light travelling along a nearby optical cable, the modulation being recovered at a distant monitoring station. A flotation arrangement is provide for retaining the transmitter unit in a raised position relative to the sea bed to facilitate the coupling of the acoustic wave to the optical cable. | 09-11-2008 |