会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Data selection for movement from a source to a target
    • 从源到目标的数据选择
    • US09087011B2
    • 2015-07-21
    • US13484119
    • 2012-05-30
    • Matthew J. AnglinDavid M. CannonColin S. DawsonRobert S. Elder
    • Matthew J. AnglinDavid M. CannonColin S. DawsonRobert S. Elder
    • G06F17/00G06F11/14
    • G06F11/1453
    • In one aspect of the present description, in connection with storing a first deduplicated data object in a primary storage pool, described operations include determining the duration of time that the first data object has resided in the primary storage pool, and comparing the determined duration of time to a predetermined time interval. In addition, described operations include, after the determined duration of time meets or exceeds the predetermined time interval, determining if the first data object has an extent referenced by another data object, and determining whether to move the first data object from the primary storage pool to a secondary storage pool as a function of whether the first data object has an extent referenced by another data object after the determined duration of time meets or exceeds the predetermined time interval. Other features and aspects may be realized, depending upon the particular application.
    • 在本说明书的一个方面,结合将第一重复数据删除的数据对象存储在主存储池中,所描述的操作包括确定第一数据对象已经驻留在主存储池中的持续时间,以及将所确定的持续时间 时间到预定的时间间隔。 此外,所描述的操作包括在所确定的持续时间满足或超过预定时间间隔之后,确定第一数据对象是否具有由另一数据对象引用的范围,以及确定是否从主存储池移动第一数据对象 作为在所确定的持续时间达到或超过预定时间间隔之后第一数据对象是否具有由另一数据对象引用的盘区的函数的次级存储池。 可以根据具体应用实现其它特征和方面。
    • 3. 发明授权
    • Real-time feedback for policies for computing system management
    • 计算系统管理政策的实时反馈
    • US08930509B2
    • 2015-01-06
    • US13542564
    • 2012-07-05
    • David M. CannonMarshall L. Humphries
    • David M. CannonMarshall L. Humphries
    • G06F15/16G06F15/173H04L12/24
    • H04L41/0893H04L41/08H04L41/0886H04L41/22
    • One aspect of the invention is a method for providing real-time feedback regarding the effect of applying a policy definition used for management in a computing system. An example of the method includes receiving the policy definition, and accessing stored information regarding at least one managed entity in the computing system. This example also includes applying the policy definition to the information regarding the at least one managed entity. This example further includes outputting information providing real-time feedback regarding the effect of applying the policy definition to the information regarding the at least one managed entity. Another aspect of the invention is a method for defining a policy used for management in a computing system.
    • 本发明的一个方面是提供关于在计算系统中应用用于管理的策略定义的效果的实时反馈的方法。 该方法的示例包括接收策略定义,以及访问关于计算系统中的至少一个被管实体的存储信息。 该示例还包括将策略定义应用于关于至少一个被管实体的信息。 该示例还包括输出提供关于将策略定义应用于关于至少一个被管实体的信息的效果的实时反馈的信息。 本发明的另一方面是一种用于定义用于计算系统中的管理的策略的方法。
    • 5. 发明授权
    • Elimination of redundant objects in storage systems
    • 消除存储系统中的冗余对象
    • US08554744B2
    • 2013-10-08
    • US13092777
    • 2011-04-22
    • David M. CannonColin S. DawsonRobert C. Edwards, Jr.
    • David M. CannonColin S. DawsonRobert C. Edwards, Jr.
    • G06F17/30
    • G06F17/30489
    • Provided are a method, system, and article of manufacture, wherein a data structure corresponding to a set of client nodes selected from a plurality of client nodes is generated. Objects from the selected set of client nodes are stored in the data structure. A determination is made that an object corresponding to a client node of the selected set of client nodes has to be stored. An additional determination is made as to whether the object has already been stored in the data structure by any client node of the selected set of client nodes. The object is stored in the data structure, in response to determining that the object has not already been stored in the data structure by any client node of the selected set of client nodes.
    • 提供了一种方法,系统和制品,其中生成对应于从多个客户端节点中选择的一组客户机节点的数据结构。 来自所选择的一组客户端节点的对象被存储在数据结构中。 确定必须存储与所选择的一组客户端节点的客户端节点对应的对象。 另外确定对象是否已经被所选择的一组客户端节点的任何客户端节点存储在数据结构中。 响应于确定对象尚未被所选择的客户端节点集合的任何客户机节点存储在数据结构中,对象被存储在数据结构中。
    • 7. 发明申请
    • APPROACH FOR OPTIMIZING RESTORES OF DEDUPLICATED DATA
    • 优化复制数据恢复的方法
    • US20110218969A1
    • 2011-09-08
    • US12719108
    • 2010-03-08
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • G06F17/30
    • G06F11/1453G06F11/1402G06F11/1469G06F11/2089
    • Various techniques for improving the performance of restoring deduplicated data files from a server to a client within a storage management system are disclosed. In one embodiment, a chunk index is maintained on the client that tracks the chunks remaining on the client for each data file that is stored to and restored from the storage server. When a specific file is selected for restore from the storage server to the client, the client determines if any local copies of this specific file's chunks are stored in files already existing on the client data store. The file is then reconstructed from a combination of these local copies of the file chunks and chunks retrieved from the storage server. Therefore, only chunks that are not stored or are inaccessible to the client are retrieved from the server, reducing server-side processing requirements and the bandwidth required for data restore operations.
    • 公开了用于提高从存储管理系统中的服务器向客户端恢复重复数据消除的数据文件的性能的各种技术。 在一个实施例中,在客户机上维护块索引,其跟踪存储在存储服务器中并从存储服务器恢复的每个数据文件的客户端上剩余的块。 当选择特定文件从存储服务器恢复到客户端时,客户端确定该特定文件块的任何本地副本是否存储在客户端数据存储上已存在的文件中。 然后从文件块的这些本地副本和从存储服务器检索的块的组合重建文件。 因此,仅从服务器检索不存储或无法访问客户端的块,从而减少了数据恢复操作所需的服务器端处理要求和带宽。
    • 8. 发明申请
    • APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE
    • 分发分发软件的保护方法
    • US20110040732A1
    • 2011-02-17
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • G06F12/00G06F12/16G06F7/00
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。
    • 9. 发明申请
    • REAL-TIME FEEDBACK FOR POLICIES FOR COMPUTING SYSTEM MANAGEMENT
    • 计算机系统管理政策的实时反馈
    • US20100198958A1
    • 2010-08-05
    • US12760494
    • 2010-04-14
    • David M. CannonMarshall L. Humphries
    • David M. CannonMarshall L. Humphries
    • G06F15/173
    • H04L41/0893H04L41/08H04L41/0886H04L41/22
    • One aspect of the invention is a method for providing real-time feedback regarding the effect of applying a policy definition used for management in a computing system. An example of the method includes receiving the policy definition, and accessing stored information regarding at least one managed entity in the computing system. This example also includes applying the policy definition to the information regarding the at least one managed entity. This example further includes outputting information providing real-time feedback regarding the effect of applying the policy definition to the information regarding the at least one managed entity. Another aspect of the invention is a method for defining a policy used for management in a computing system.
    • 本发明的一个方面是提供关于在计算系统中应用用于管理的策略定义的效果的实时反馈的方法。 该方法的示例包括接收策略定义,以及访问关于计算系统中的至少一个被管实体的存储信息。 该示例还包括将策略定义应用于关于至少一个被管实体的信息。 该示例还包括输出提供关于将策略定义应用于关于至少一个被管实体的信息的效果的实时反馈的信息。 本发明的另一方面是一种用于定义用于计算系统中的管理的策略的方法。
    • 10. 发明授权
    • Real-time feedback for policies for computing system management
    • 计算系统管理政策的实时反馈
    • US07734750B2
    • 2010-06-08
    • US10741372
    • 2003-12-19
    • David M. CannonMarshall L. Humphries
    • David M. CannonMarshall L. Humphries
    • G06F15/173G06F15/177
    • H04L41/0893H04L41/08H04L41/0886H04L41/22
    • One aspect of the invention is a method for providing real-time feedback regarding the effect of applying a policy definition used for management in a computing system. An example of the method includes receiving the policy definition, and accessing stored information regarding at least one managed entity in the computing system. This example also includes applying the policy definition to the information regarding the at least one managed entity. This example further includes outputting information providing real-time feedback regarding the effect of applying the policy definition to the information regarding the at least one managed entity. Another aspect of the invention is a method for defining a policy used for management in a computing system.
    • 本发明的一个方面是提供关于在计算系统中应用用于管理的策略定义的效果的实时反馈的方法。 该方法的示例包括接收策略定义,以及访问关于计算系统中的至少一个被管实体的存储信息。 该示例还包括将策略定义应用于关于至少一个被管实体的信息。 该示例还包括输出提供关于将策略定义应用于关于至少一个被管实体的信息的效果的实时反馈的信息。 本发明的另一方面是一种用于定义用于计算系统中的管理的策略的方法。