Patent application number | Description | Published |
20130174172 | DATACENTER DATA TRANSFER MANAGEMENT SYSTEM AND METHOD - An exemplary data transfer manager includes a datacenter configured to communicate over at least one link and a scheduler that is configured to schedule a plurality of jobs for communicating data from the datacenter. The scheduler determines a minimum bandwidth requirement of each job and determines a maximum bandwidth limit of each job. The scheduler determines a flex parameter of each job. The flex parameter indicates how much a data transfer rate can vary between adjacent data transfer periods for the job. | 07-04-2013 |
20130185257 | CLOUD DATA RESILIENCY SYSTEM AND METHOD - An exemplary cloud data system includes a primary datacenter device that maintains a complete copy of a file. A plurality of secondary datacenter devices maintain respective encoded, partial copies of the file. At least some of the encoded partial copies are sufficient to recreate the complete copy of the file. The primary datacenter device makes any changes to the complete copy of the file responsive to any write operation on the file. The primary datacenter device provides correspondingly changed encoded partial copies to the respective secondary datacenter devices. | 07-18-2013 |
20130185414 | Method And Apparatus For Network And Storage-Aware Virtual Machine Placement - Various embodiments provide a method and apparatus of providing a network and storage-aware virtual machine (VM) placement that optimizes placement based on network layer metrics, performance characteristics of the storage arrays and application constraints. Advantageously, since storage is often necessary in servicing application requests, basing VM placement on performance characteristics of the storage arrays as well as network layer metrics can lead to a significant improvement in VM performance. | 07-18-2013 |
20130185530 | Method And Apparatus For A Frugal Cloud File System - Various embodiments provide a method and apparatus of providing a frugal cloud file system that efficiently uses the blocks of different types of storage devices with different properties for different purposes. The efficient use of the different types of available storage devices reduces the storage and bandwidth overhead. Advantageously, the reduction in storage and bandwidth overhead achieved using the frugal cloud file system reduces the economic costs of running the file system while maintaining high performance. | 07-18-2013 |
20130204903 | PROBABILISTIC FINGERPRINT CHECKING FOR PREVENTING DATA LEAKAGE - A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of files, from a secure network using online fingerprint checking of data flows at a boundary of the secure network. The online fingerprint checking is performed using a set of data structures configured for the file set. The data structures for the file set are configured based on file set characteristics information of the file set and a target detection lag indicative of a maximum number of bits within which a data leakage event for the file set is to be determined. The data structure configuration is computed for a plurality of data structures configured for use in monitoring the files of the file set. The data structure configuration includes a plurality of data structure locations and data structure sizes for the respective plurality of data structures. | 08-08-2013 |
20130212710 | Data Leakage Prevention for Cloud and Enterprise Networks - Apparatuses, methods and articles of manufacture for performing data leakage prevention are provided. Data leakage prevention may be performed by determining a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary. The signature of the transmitted document is compared with one or more signatures of documents authorized to be transmitted beyond the network boundary. The transmitted document is prevented from being transmitted beyond the network boundary if the signature of the document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary. | 08-15-2013 |
20130219043 | METHOD AND APPARATUS FOR AUTOMATIC MIGRATION OF APPLICATION SERVICE - A method and apparatus for dynamically migrating a virtual desktop (VD) user from a first data center (DC) to a second DC in response to a determination made using DC management information and communications network management information that a user quality of experience (QoE) is deficient. | 08-22-2013 |
20130275618 | METHOD AND APPARATUS FOR REDUCING CONTENT REDUNDANCY IN CONTENT-CENTRIC NETWORKING - A method for reducing content redundancy in CCN includes distributing named media content or another type of content from sources to consumers through host devices and intermediate devices via a communication network using object messages that carry fingerprint names and data chunks. The named content is divisible into data chunks represented by fingerprint names such that a content fingerprint list for content identifies data chunks for the content using fingerprint names. The fingerprint names are based on content data in the data chunk such that data chunks with the same content data for the named content and for other content are represented by the same fingerprint name and data chunks with different content data are represented by different fingerprint names. A subsystem associated with the method includes consumer and source communication modules; a local storage device; message routing, fingerprint list processing, and object caching modules; and a message processing controller. | 10-17-2013 |
20130275669 | APPARATUS AND METHOD FOR MEETING PERFORMANCE METRICS FOR USERS IN FILE SYSTEMS - A data block storage management capability is presented. A file system includes a plurality of data blocks which are managed using a first storage service and a second storage service, where the first storage service has a lower storage cost and a higher input-output cost than the second storage service. The data blocks stored using the second storage service have associated therewith respective expected storage durations indicative of respective lengths of time for which the data blocks are to be stored using the second storage service (which may be the same or different across the ones of the data blocks stored using the second storage service). The expected storage durations of the data blocks are modified based on a comparison of an expected hit rate of the second storage service and a current hit rate of the second storage service or current hit rates of the data blocks. | 10-17-2013 |
20130305311 | APPARATUS AND METHOD FOR PROVIDING A FLUID SECURITY LAYER - A security management capability enables migration of individual security rules between storage/application locations. The migration of a security rule may include selection of a location at which the security rule is to be applied and migration of the security rule to the selected location at which the security rule is to be applied. The selection of the location at which the security rule is to be applied may be performed based on security rule policies and/or security rule location selection information. The security rule is migrated from a current location (e.g., a location at which the security rule is currently applied, a management system, or the like) to the selected location at which the security rule is to be applied. In this manner, a fluid security layer may be provided. The fluid security layer may be optimized for one or more of security level, performance, cost, or the like. | 11-14-2013 |
20140095605 | METHOD AND APPARATUS FOR INCREASING LOCALIZATION OF PEER-TO-PEER TRAFFIC FOR CONTENT DISTRIBUTION IN COMMUNICATION NETWORK - A method for increasing localization of P2P traffic for content distribution includes distributing named content from hosting peers to requesting peers in conjunction with tracking nodes using fingerprint chunk messages that carry fingerprint names and data chunks. The named content is divisible into data chunks identified by fingerprint names such that a content fingerprint list for named content identifies the fingerprint name for each data chunk. Fingerprint names are based on content data in the data chunk such that data chunks with the same content data are represented by the same fingerprint name and data chunks with different content data are represented by different fingerprint names. When a data chunk is available from multiple hosting peers, selection of a hosting peer is based on comparing localization characteristics for the requesting peer to localization characteristics for the multiple hosting peers with preference to the hosting peer that localizes P2P traffic. | 04-03-2014 |
20140351531 | APPARATUS AND METHOD FOR MANAGING STORAGE OF DATA BLOCKS - A data block storage management capability is presented. A cloud file system management capability manages storage of data blocks of a file system across multiple cloud storage services (e.g., including determining, for each data block to be stored, a storage location and a storage duration for the data block). A cloud file system management capability manages movement of data blocks of a file system between storage volumes of cloud storage services. A cloud file system management capability provides a probabilistic eviction scheme for evicting data blocks from storage volumes of cloud storage services in advance of storage deadlines by which the data blocks are to be removed from the storage volumes. A cloud file system management capability enables dynamic adaptation of the storage volume sizes of the storage volumes of the cloud storage services. | 11-27-2014 |