会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System, method, and apparatus for server-storage-network optimization for application service level agreements
    • 用于服务器存储的系统,方法和设备 - 应用服务级别协议的网络优化
    • US08140682B2
    • 2012-03-20
    • US12624913
    • 2009-12-22
    • Seshashayee MurthyAameek SinghSandeep M. Uttamchandani
    • Seshashayee MurthyAameek SinghSandeep M. Uttamchandani
    • G06Q99/00G06F15/173
    • G06F9/5061G06Q10/04G06Q10/06G06Q10/067G06Q30/016
    • A computer-implemented method for determining, from a system including a plurality of data center resources, at least one configuration of data center resources for an implementation of an application. The method includes receiving application information and receiving information regarding known internal features up the data center resources. The method also includes provisioning the system of data center resources and creating possible configurations of data center resources for implementing application. The method also includes correlating models and data center resources to create an interrelated representation of the models and the data center resources. The models predict a relationship of parameters for the possible configurations. The method also includes creating a multiple dimensional analysis of parameters for the possible configurations of data center resources using the interrelated representation and selecting a configuration of data center resources from the possible configurations using the multiple dimensional analysis of parameters.
    • 一种用于从包括多个数据中心资源的系统确定用于实现应用的数据中心资源的至少一个配置的计算机实现的方法。 该方法包括接收应用信息并接收与数据中心资源相关的已知内部特征的信息。 该方法还包括配置数据中心资源系统,并为实现应用程序创建数据中心资源的可能配置。 该方法还包括关联模型和数据中心资源,以创建模型和数据中心资源的相互关联的表示。 模型预测可能配置的参数关系。 该方法还包括使用相关表示创建用于数据中心资源的可能配置的参数的多维分析,并且使用参数的多维分析从可能的配置中选择数据中心资源的配置。
    • 6. 发明申请
    • OPTIMIZING STORAGE CLOUD ENVIRONMENTS THROUGH ADAPTIVE STATISTICAL MODELING
    • 通过自适应统计建模优化存储云环境
    • US20120116743A1
    • 2012-05-10
    • US12942011
    • 2010-11-08
    • Richard AyalaKavita ChavdaSandeep GopisettySeshashayee S. MurthyAameek SinghSandeep M. Uttamchandani
    • Richard AyalaKavita ChavdaSandeep GopisettySeshashayee S. MurthyAameek SinghSandeep M. Uttamchandani
    • G06G7/62
    • G06F17/30557
    • Embodiments of the present invention provide an approach for adapting an information extraction middleware for a clustered computing environment (e.g., a cloud environment) by creating and managing a set of statistical models generated from performance statistics of operating devices within the clustered computing environment. This approach takes into account the required accuracy in modeling, including computation cost of modeling, to pick the best modeling solution at a given point in time. When higher accuracy is desired (e.g., nearing workload saturation), the approach adapts to use an appropriate modeling algorithm. Adapting statistical models to the data characteristics ensures optimal accuracy with minimal computation time and resources for modeling. This approach provides intelligent selective refinement of models using accuracy-based and operating probability-based triggers to optimize the clustered computing environment, i.e., maximize accuracy and minimize computation time.
    • 本发明的实施例提供了一种用于通过创建和管理从群集计算环境内的操作设备的性能统计生成的一组统计模型来适配用于群集计算环境(例如,云环境)的信息提取中间件的方法。 这种方法考虑了所需的建模精度,包括建模的计算成本,以便在给定时间点选择最佳建模解决方案。 当需要更高的精度(例如,接近工作负载饱和)时,该方法适应于使用适当的建模算法。 将统计模型适应数据特征确保最佳精度,最小的计算时间和建模资源。 该方法提供使用基于精度和基于概率的触发器来优化群集计算环境(即,最大化精度和最小化计算时间)的模型的智能选择性细化。
    • 10. 发明授权
    • Detecting inadvertent or malicious data corruption in storage subsystems and recovering data
    • 检测存储子系统中的无意或恶意数据损坏并恢复数据
    • US08315991B2
    • 2012-11-20
    • US12763934
    • 2010-04-20
    • Nagapramod S. MandagereMark J. SeamanSandeep M. Uttamchandani
    • Nagapramod S. MandagereMark J. SeamanSandeep M. Uttamchandani
    • G06F17/30
    • G06F11/1435G06F17/30368G06F2201/84
    • Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
    • 本发明的实施例检测无意或恶意的数据损坏并且用于恢复数据,包括接收指定损坏的应用数据的查询; 分析事务日志以查找与数据相关的更新操作; 通过将表数据映射到文件系统内的位置并将文件系统位置映射到卷逻辑块来确定数据的存储位置; 并分析快照卷位图以确定位图是否显示存储在卷逻辑块中的表数据的更改。 反映在数据的位图中但在事务日志中没有相应条目的更改将被标记为未经授权的更改。 在从被标记的快照拍摄之前的时间起,数据的快照被识别用于在未经授权的更改之前将数据恢复到其状态。