会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 43. 发明授权
    • Method and apparatus for assessing layered architecture principles compliance for business analytics in traditional and SOA based environments
    • 用于评估传统和基于SOA的环境中业务分析的分层架构原则合规性的方法和设备
    • US08739132B2
    • 2014-05-27
    • US13561160
    • 2012-07-30
    • Faried AbrahamsKerard R. HoggSandeep R. PatilGandhi Sivakumar
    • Faried AbrahamsKerard R. HoggSandeep R. PatilGandhi Sivakumar
    • G06F9/44
    • G06Q10/067
    • Computer-implemented methods, computer program products and computer systems that assess business logic architecture compliance by defining an ideal business logic architecture hierarchy of a desired application, retrieving one or more applications from a data repository, breaking down these applications into a plurality of processes and analyzing the plurality of processes for common inter-application processes. Common inter-application processes are located and store in the middleware layer. The desired application is developed using the applications and common inter-application processes from the middleware layer to provide a resultant application, followed by determining an actual business logic hierarchal structure of the resultant application. This actual business logic hierarchal structure of the resultant application is compared against the ideal business logic architecture hierarchy to calculate compliance thereof, which in turn, reflects the maturity level of the developed resultant application.
    • 计算机实现的方法,计算机程序产品和计算机系统,其通过定义期望应用的理想业务逻辑架构层次结构来评估业务逻辑架构的合规性,从数据存储库检索一个或多个应用程序,将这些应用程序分解成多个进程,以及 分析用于公共应用间过程的多个过程。 常见的应用程序间进程位于中间件层并存储。 使用来自中间件层的应用程序和通用的应用程序间隔开发所需的应用程序,以提供最终的应用程序,然后确定所得到的应用程序的实际业务逻辑分层结构。 将结果应用程序的这种实际业务逻辑分层结构与理想的业务逻辑体系结构层次结构进行比较,以计算其合规性,反过来又反映了开发的结果应用程序的成熟度级别。
    • 45. 发明申请
    • Method And Apparatus For Assessing Layered Architecture Principles Compliance For Business Analytics In Traditional And SOA Based Environments
    • 用于评估分层架构原理的方法和设备在基于传统和基于SOA的环境中的业务分析
    • US20140032276A1
    • 2014-01-30
    • US13561160
    • 2012-07-30
    • Faried AbrahamsKerard R. HoggSandeep R. PatilGandhi Sivakumar
    • Faried AbrahamsKerard R. HoggSandeep R. PatilGandhi Sivakumar
    • G06Q10/06
    • G06Q10/067
    • Computer-implemented methods, computer program products and computer systems that assess business logic architecture compliance by defining an ideal business logic architecture hierarchy of a desired application, retrieving one or more applications from a data repository, breaking down these applications into a plurality of processes and analyzing the plurality of processes for common inter-application processes. Common inter-application processes are located and store in the middleware layer. The desired application is developed using the applications and common inter-application processes from the middleware layer to provide a resultant application, followed by determining an actual business logic hierarchal structure of the resultant application. This actual business logic hierarchal structure of the resultant application is compared against the ideal business logic architecture hierarchy to calculate compliance thereof, which in turn, reflects the maturity level of the developed resultant application.
    • 计算机实现的方法,计算机程序产品和计算机系统,其通过定义期望应用的理想业务逻辑架构层次结构来评估业务逻辑架构的合规性,从数据存储库检索一个或多个应用程序,将这些应用程序分解成多个进程,以及 分析用于公共应用间过程的多个过程。 常见的应用程序间进程位于中间件层并存储。 使用来自中间件层的应用程序和通用的应用程序间隔开发所需的应用程序,以提供最终的应用程序,然后确定所得到的应用程序的实际业务逻辑分层结构。 将结果应用程序的这种实际业务逻辑分层结构与理想的业务逻辑体系结构层次结构进行比较,以计算其合规性,反过来又反映了开发的结果应用程序的成熟度级别。
    • 47. 发明授权
    • Deduplication in network storage with data residence compliance
    • 网络存储中的重复数据删除与数据保持一致
    • US08447732B2
    • 2013-05-21
    • US13196285
    • 2011-08-02
    • Abhinay R. NagpalSandeep R. PatilGandhi SivakumarCarolyn A. Whitehead
    • Abhinay R. NagpalSandeep R. PatilGandhi SivakumarCarolyn A. Whitehead
    • G06F17/30
    • G06F17/30156
    • Deduplication in a network storage environment includes, for files stored in a network, determining a location constraint status specified by a compliance agreement for each of the files. Location constraint statuses include a location of persistent residency and no residency restriction. Deduplication also includes selecting a file from the files in the network and identifying corresponding redundant files, the selected file and the corresponding redundant files representing a set. Deduplication further includes determining the location constraint status for each of the files in the set. For the files in the set having a location constraint status specifying a location of persistent residency, the deduplication includes retaining a master copy at the respective location of persistent residency, and removing the corresponding redundant files from the network.
    • 对于存储在网络中的文件,网络存储环境中的重复数据删除包括为每个文件确定由合规性协议指定的位置约束状态。 位置约束状态包括持续居住地的位置和没有驻留限制。 重复数据删除还包括从网络中的文件中选择文件,并识别相应的冗余文件,所选择的文件和表示集合的相应冗余文件。 重复数据删除还包括确定集合中每个文件的位置约束状态。 对于具有指定持久驻留的位置的位置约束状态的集合中的文件,重复数据消除包括将主副本保留在持久驻留的相应位置,以及从网络中移除相应的冗余文件。
    • 48. 发明申请
    • DEDUPLICATION IN NETWORK STORAGE WITH DATA RESIDENCE COMPLIANCE
    • 网络存储与数据存储兼容性的对照
    • US20130036100A1
    • 2013-02-07
    • US13196285
    • 2011-08-02
    • Abhinay R. NagpalSandeep R. PatilGandhi SivakumarCarolyn A. Whitehead
    • Abhinay R. NagpalSandeep R. PatilGandhi SivakumarCarolyn A. Whitehead
    • G06F17/30
    • G06F17/30156
    • Deduplication in a network storage environment includes, for files stored in a network, determining a location constraint status specified by a compliance agreement for each of the files. Location constraint statuses include a location of persistent residency and no residency restriction. Deduplication also includes selecting a file from the files in the network and identifying corresponding redundant files, the selected file and the corresponding redundant files representing a set. Deduplication further includes determining the location constraint status for each of the files in the set. For the files in the set having a location constraint status specifying a location of persistent residency, the deduplication includes retaining a master copy at the respective location of persistent residency, and removing the corresponding redundant files from the network.
    • 对于存储在网络中的文件,网络存储环境中的重复数据删除包括为每个文件确定由合规性协议指定的位置约束状态。 位置约束状态包括持续居住地的位置和没有驻留限制。 重复数据删除还包括从网络中的文件中选择文件,并识别相应的冗余文件,所选择的文件和表示集合的相应冗余文件。 重复数据删除还包括确定集合中每个文件的位置约束状态。 对于具有指定持久驻留的位置的位置约束状态的集合中的文件,重复数据消除包括将主副本保留在持久驻留的相应位置,以及从网络中移除相应的冗余文件。
    • 49. 发明申请
    • PREVENTION OF DATA LOSS DUE TO ADJACENT TRACK INTERFERENCE
    • 预防数据丢失由于邻近的跟踪干扰
    • US20130185498A1
    • 2013-07-18
    • US13352131
    • 2012-01-17
    • Shah M. R. IslamSandeep R. PatilRiyazahamad M. ShiraguppiGandhi Sivakumar
    • Shah M. R. IslamSandeep R. PatilRiyazahamad M. ShiraguppiGandhi Sivakumar
    • G06F12/00
    • G11B5/09
    • For limiting data loss due to ATI or ATE, an apparatus may include a storage module, a tracking module, and a refresh module. The storage module is configured to store a risk value for a tracked storage division. The risk value indicates a risk level of data loss for the tracked storage division. The tracked storage division is one of a plurality of storage divisions of a data storage device. The tracking module is configured to update the risk value to indicate a higher risk level based on a write to a physically proximal storage division. The physically proximal storage division is within an interference range of the tracked storage division. The tracking module is configured to reset the risk value based on a write to the tracked storage division. The refresh module is configured to refresh the tracked storage division based on the risk value meeting a threshold value.
    • 为了限制由于ATI或ATE引起的数据丢失,设备可以包括存储模块,跟踪模块和刷新模块。 存储模块被配置为存储跟踪的存储分区的风险值。 风险值表示跟踪的存储部门的数据丢失的风险级别。 跟踪存储部是数据存储装置的多个存储部之一。 跟踪模块被配置为基于对物理近端存储分区的写入来更新风险值以指示较高的风险水平。 身体近端存储部门在跟踪的存储部门的干扰范围内。 跟踪模块被配置为基于对跟踪的存储分区的写入来重置风险值。 刷新模块被配置为基于满足阈值的风险值来刷新所跟踪的存储部门。