Patent application number | Description | Published |
20130067174 | NONVOLATILE MEDIA JOURNALING OF VERIFIED DATA SETS - The storage of data sets in a storage set (e.g., data sets written to hard disk drives comprising a RAID array) may diminish the performance of the storage set through non-sequential writes, particularly if the storage devices promptly write data sets that are followed by sequentially following data sets. Additionally, storage sets may exhibit inconsistencies due to non-atomic writes of data sets and verifiers (e.g., checksums) and an intervening failure, such as an occurrence of the RAID write hole. Instead, data sets and verifiers may first be written to a stored on the nonvolatile media of a storage device before being committed to the storage set. Such writes may be sequentially written to the journal, irrespective of the locations of the data sets in the storage set; and recovery of a failure may simply involve re-committing the consistent records in the journal to correct incomplete writes to the storage set. | 03-14-2013 |
20130067179 | NONVOLATILE MEDIA DIRTY REGION TRACKING - A storage set (e.g., an array of hard disk drives) may experience a failure, such as a loss of power, a software crash, or a disconnection of a storage device, while writes to the storage set are in progress. Recover from the failure may involve scanning the storage set to detect and correct inconsistencies (e.g., comparing mirrors of a data set or testing checksums). However, lacking information about the locations of pending writes to the storage set during the failure, this “cleaning” process may involve scanning the entire storage set, resulting in protracted recovery processes. Presented herein are techniques for tracking writes to the storage set by apportioning the storage set into regions of a region size (e.g., one gigabyte), and storing on the nonvolatile storage medium descriptors of “dirty” regions comprising in-progress writes. The post-failure recovery process may then be limited to the regions identified as dirty. | 03-14-2013 |
20130067187 | ALLOCATION STRATEGIES FOR STORAGE DEVICE SETS - A storage device set may allocate capacity for spaces (e.g., logical volumes) according to an allocation strategy, e.g., allocating capacity from the storage device having the greatest available capacity, or maximizing the distribution of allocated capacity across the storage devices. However, such allocation strategies may be inefficient (e.g., limiting the capability of the storage device set to satisfy subsequent requests with constraints such as a minimum distribution of capacity across several storage devices). The techniques presented herein achieve efficient allocation by first allocating capacity on storage devices having ample available capacity using a round-robin technique, and if such storage devices do not satisfy the capacity request, allocating capacity on storage devices having limited available capacity. Additionally, the techniques presented herein facilitate thin provisioning through capacity reservations, wherein storage devices withhold unallocated storage for particular spaces that may be utilized as a reserve if unreserved capacity is exhausted. | 03-14-2013 |
20130067188 | STORAGE DEVICE DRIVERS AND CLUSTER PARTICIPATION - The representation of storage devices on computers (e.g., as logical volumes) may be complicated by the pooling of multiple storage devices in order to apply redundancy plans such as mirroring and checksumming. Presented herein is a storage device driver configured to operate as a storage device interface generating representations of the storage regions of the storage devices; to claim those regions as a storage controller; and to expose pooled storage regions as logical disks. Additionally, the storage device driver may support the inclusion of storage devices in a cluster, comprising nodes that may be appointed as managers of the storage pool configuration; as managers of the storage devices; as owners having exclusive read/write access to the storage pool or cluster resources; and as cluster resource writers having excusive write access to a cluster resource. The nodes of the cluster may interoperate to share the storage devices while avoiding write conflicts. | 03-14-2013 |
Patent application number | Description | Published |
20090327367 | Common Block Storage Infrastructure - Common block storage infrastructure techniques are described in which files are created through interaction with a file system to reserve extents in a volume on behalf of volume storage drivers, which may form a driver stack that resides logically on top of the volume. The files protect the reserved extents within the volume for use by the volume storage drivers, such as to store metadata related to operations performed by the drivers. When reserved extents are created, a location of the reserved extents is communicated through the driver stack to a corresponding volume storage driver. Volume storage drivers may also be configured to discover their corresponding reserved extents and communicate these to upper-level drivers and components. Accordingly, when a volume storage driver manipulates data in the volume, it may do so with awareness of the reserved extents of the other volume storage drivers. | 12-31-2009 |
20100082550 | AGGREGATION OF WRITE TRAFFIC TO A DATA STORE - A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions. | 04-01-2010 |
20100082918 | LOG MANAGER FOR AGGREGATING DATA - A processing device and a machine-implemented method may be provided for sequentially aggregating, or writing, data to a log included in a data store. The log may store multiple log entries. Each of the log entries may include an entry metadata portion, describing a respective log entry, and an entry payload data portion. The entry metadata portion may include a log sequence number, corresponding to a log entry at a particular position in the log. A library of log-related processes may be provided, along with an application program interface to permit a calling application program to call any of the log related processes. The log-related processes may be called during a boot mode, a user mode, and a kernel mode. | 04-01-2010 |
20100114990 | VIRTUALIZED BOOT BLOCK WITH DISCOVERY VOLUME - A file system independent virtualized boot block with discovery volume and cover files renders a volume visible when accessed by an accessing system which differs from a source system. For example, a downlevel operating system recognizes that data is present on a volume created in an uplevel operating system, even where the uplevel data itself may not be accessible. | 05-06-2010 |
20100125588 | MODIFYING DELETE NOTIFICATIONS IN A STORAGE STACK - A filter between a filesystem and a storage device in a storage stack can be configured to modify a delete notification, such as by modifying an existing delete notification or creating a new delete notification. A storage stack filter can receive an existing delete notification and determine a modified range of deleted data in response to receiving the existing notification, where a modified delete notification indicates the modified range of deleted data. A new delete notification can be created with a storage stack filter positioned below a filesystem in a storage stack, where the new delete notification indicates a range of deleted data. The new or modified delete notification can be passed down the storage stack. | 05-20-2010 |
20100125705 | USING DELETE NOTIFICATIONS TO FREE RELATED STORAGE RESOURCES - A storage stack delete notification can be received at a storage stack filter. The delete notification can indicate deletion of primary data in a primary storage region. Secondary data that is taking up storage resources managed by the storage stack filter can be identified. The secondary data can be associated with the primary storage region, and the storage resources can be resources other than the primary storage region. It can be determined whether it is useful to have the secondary data continue taking up the storage resources. If having the secondary data continue taking up the storage resources is not useful, then the storage resources can be freed. | 05-20-2010 |
20100125714 | DELETE NOTIFICATIONS FOR AN ENTIRE STORAGE VOLUME - A delete notification can be received at a storage stack filter in a storage stack. It can be determined whether the delete notification applies to an entire storage volume. If the delete notification does not apply to the entire storage volume, a first set of actions can be taken with the storage stack filter in response to the delete notification. If the delete notification does apply to the entire storage volume, a second set of actions can be taken with the storage stack filter in response to the delete notification. | 05-20-2010 |
20110197016 | Aggregation of Write Traffic to a Data Store - A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions. | 08-11-2011 |
20120102265 | Aggregation of Write Traffic to a Data Store - A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions. | 04-26-2012 |
20120311278 | DELETE NOTIFICATIONS FOR AN ENTIRE STORAGE DEVICE - A delete notification can be received at a storage stack filter in a storage stack. It can be determined whether the delete notification applies to an entire storage device. If the delete notification does not apply to the entire storage device, a first set of actions can be taken with the storage stack filter in response to the delete notification. If the delete notification does apply to the entire storage device, a second set of actions can be taken with the storage stack filter in response to the delete notification. | 12-06-2012 |
20130339717 | Virtualized Boot Block with Discovery Volume - A file system independent virtualized boot block with discovery volume and cover files renders a volume visible when accessed by an accessing system which differs from a source system. For example, a downlevel operating system recognizes that data is present on a volume created in an uplevel operating system, even where the uplevel data itself may not be accessible. | 12-19-2013 |
20140237173 | AGGREGATION OF WRITE TRAFFIC TO A DATA STORE - A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions. | 08-21-2014 |
20160026475 | Virtualized Boot Block with Discovery Volume - A file system independent virtualized boot block with discovery volume and cover files renders a volume visible when accessed by an accessing system which differs from a source system. For example, a downlevel operating system recognizes that data is present on a volume created in an uplevel operating system, even where the uplevel data itself may not be accessible. | 01-28-2016 |
Patent application number | Description | Published |
20100039909 | Host Initiated Background Formatting Of Optical Medium - A method and a host processing device are provided for background formatting, or de-icing, an optical medium with no de-icing assistance from an optical drive upon which the optical medium is mounted. In a foreground mode, an optical medium may be initially formatted, volume structures may be recorded on the optical medium, file system information may be written thereto, and quick grow formatting may be performed to make the optical medium writable, at least sequentially. Under initiation and control of a file system, executing on a host processing device, the optical medium may be formatted, or de-iced, in a background mode with no assistance from an optical drive, upon which the optical medium is mounted. Under control of the file system, blocked input or output activity, may be allowed to access the optical medium upon pausing the formatting, or de-icing. | 02-18-2010 |
20110296238 | DATA ENCRYPTION CONVERSION FOR INDEPENDENT AGENTS - The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An “in-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An “out-of-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected. | 12-01-2011 |
Patent application number | Description | Published |
20090182725 | DETERMINING ENTITY POPULARITY USING SEARCH QUERIES - Systems, methods, and computer-readable media for determining the Internet search popularity of an entity are provided. Embodiments of the present invention include receiving a group of Internet search records and assigning a popularity ranking based on the number of times an entity descriptor associated with an entity occurs within the group of Internet search records created over a designated time period. An entity descriptor is one or more terms commonly used to identify an entity. The trend in an entity's popularity rank may also be calculated. An entity's popularity rank and trend in popularity rank may be presented in a graph or in a list. | 07-16-2009 |
20100083155 | OBJECT SEARCH UI AND DRAGGING OBJECT RESULTS - A unique object navigation system, user interface, and method that facilitate faster and smoother navigation of objects are provided. For example, the system can generate a plurality of objects that can be rendered on a display space that spans a single page in length, thereby mitigating the need to navigate through multiple pages. The system can determine the length of the page according to the number of objects generated. To view off-screen objects, an infinite scroll component can be employed. The amount of scroll space needed to view the plurality of objects can be determined in part by the length of the page and/or by the number of objects. The objects can also be viewed in a film strip format that is infinitely scrollable. The film strip view allows a view of the objects to be maintained while also viewing a selected object in greater detail at the same time. | 04-01-2010 |
20130268482 | DETERMINING ENTITY POPULARITY USING SEARCH QUERIES - Systems, methods, and computer-readable media for determining the Internet search popularity of an entity are provided. Embodiments of the present invention include receiving a group of Internet search records and assigning a popularity ranking based on the number of times an entity descriptor associated with an entity occurs within the group of Internet search records created over a designated time period. An entity descriptor is one or more terms commonly used to identify an entity. The trend in an entity's popularity rank may also be calculated. An entity's popularity rank and trend in popularity rank may be presented in a graph or in a list. | 10-10-2013 |
20150149430 | Search Guided By Location And Context - The subject disclosure pertains to web searches and more particularly toward influencing resultant content to increase relevancy. The resultant content can be influenced by reconfiguring a query and/or filtering results based on user location and/or context information (e.g., user characteristics/profile, prior interaction/usage temporal, current events, and third party state/context . . . ). Furthermore, the disclosure provides for query execution on at least a subset of designated web content, for example as specified by a user. Still further yet, a localized marketing system is disclosed that provides discount offers to users that match merchant criteria including proximity. A system for actively probing populations of users with different parameters and monitoring responses can be employed to collect data for identifying the best discounts and deadlines to offer to users to achieve desired results. | 05-28-2015 |
Patent application number | Description | Published |
20090087439 | Compositions and methods for diagnosing or treating psoriasis - In one aspect, the present invention provides isolated nucleic acid molecules that encode a CAN-1 polypeptide, or an STG polypeptide. In another aspect, the present invention also provides isolated STG polypeptides, isolated CAN-1 polypeptides, and isolated SEEK-1 polypeptides. In another aspect, the present invention provides isolated antibodies that bind specifically to a CAN-1, SEEK-1 or STG polypeptide. In another aspect, the present invention provides methods of diagnosing or predicting the susceptibility to psoriasis of an individual. In another aspect, the present invention provides methods for ameliorating the symptoms and/or progression of psoriasis. | 04-02-2009 |
20100111961 | COMPOSITIONS AND METHODS FOR DIAGNOSING OR TREATING PSORIASIS - In one aspect, the present invention provides isolated nucleic acid molecules that encode a CAN-1 polypeptide, or an STG polypeptide. In another aspect, the present invention also provides isolated STG polypeptides, isolated CAN-1 polypeptides, and isolated SEEK-1 polypeptides. In another aspect, the present invention provides isolated antibodies that bind specifically to a CAN-1, SEEK-1 or STG polypeptide. In another aspect, the present invention provides methods of diagnosing or predicting the susceptibility to psoriasis of an individual. In another aspect, the present invention provides methods for ameliorating the symptoms and/or progression of psoriasis. | 05-06-2010 |