会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • On-demand operations
    • 按需操作
    • US09128942B1
    • 2015-09-08
    • US12978436
    • 2010-12-24
    • Jeffrey PfauDevang K. ShahAmber PalekarAshish Prakash
    • Jeffrey PfauDevang K. ShahAmber PalekarAshish Prakash
    • G06F17/30G06F3/06
    • G06F17/30091G06F3/0629G06F3/0647G06F17/30079
    • Many applications and computing environments allow users to migrate data from a source object to a target object (e.g., a file may be cut/pasted, copied, etc.). It may be advantageous to provide users with access to the data (e.g., migrated data at the target object and/or data that has yet to be migrated from the source object) before all of the data is completely migrated (e.g., a user may otherwise have to wait hours for a 2 TB file to be copied between various data volumes). Accordingly, as provided herein, migration of a source object to a target object may be declared as completed, even though the target object may not comprise all of the data that is to be migrated. In this way, an I/O request may be satisfied based upon migrated data within the target object and/or data, not yet migrated, retrieved on-demand from the source object.
    • 许多应用和计算环境允许用户将数据从源对象迁移到目标对象(例如,文件可以被剪切/粘贴,复制等)。 在所有数据被完全迁移之前(例如,用户可以将用户可以在用户可能的情况下)向用户提供对数据的访问(例如,目标对象的迁移数据和/或尚未从源对象迁移的数据) 否则需要等待几个小时才能在各种数据卷之间复制2 TB文件)。 因此,如本文所提供的,即使目标对象可能不包括要迁移的所有数据,源对象到目标对象的迁移也可以被声明为完成。 以这种方式,可以基于目标对象内的迁移的数据和/或尚未迁移的数据来满足I / O请求,从源对象按需检索。
    • 4. 发明授权
    • System and method for hijacking inodes based on replication operations received in an arbitrary order
    • 基于以任意顺序接收的复制操作来劫持inode的系统和方法
    • US08671072B1
    • 2014-03-11
    • US12559483
    • 2009-09-14
    • Devang K. ShahAlan S. Driscoll
    • Devang K. ShahAlan S. Driscoll
    • G06F17/30
    • G06F3/0619G06F3/065G06F3/067G06F17/30174G06F17/30371G06F17/30575
    • A system and method for hijacking inodes based on replication operations received in an arbitrary order is used to assist a data replication operation from a source storage system to a destination storage system. The source storage system generates a set of replication operations as part of a replication process and transmits the replication operations in an arbitrary order. After receiving a replication operation, the system determines whether the operation is inconsistent with a corresponding destination inode. If an inconsistency exists, the system hijacks the destination inode by replacing the destination inode's metadata with data determined based on the replication operation. The system may also delete metadata from the inode and/or initialize metadata to default values if the metadata was not replaced based on the replication operation. The system then waits for a second replication operation that contains the remaining metadata and replaces the metadata based on the second replication operation. In addition, data blocks associated with the previous version of the inode are freed.
    • 使用基于以任意顺序接收的复制操作来劫持inode的系统和方法来辅助从源存储系统到目的地存储系统的数据复制操作。 源存储系统作为复制过程的一部分生成一组复制操作,并以任意顺序发送复制操作。 收到复制操作后,系统确定该操作是否与相应的目的地inode不一致。 如果存在不一致,则系统通过使用基于复制操作确定的数据替换目的地inode的元数据来劫持目的地inode。 如果没有基于复制操作替换元数据,系统还可以从inode中删除元数据和/或将元数据初始化为默认值。 然后,系统等待包含剩余元数据的第二个复制操作,并根据第二次复制操作替换元数据。 此外,与先前版本的inode相关联的数据块将被释放。
    • 5. 发明授权
    • Fileshot management
    • 文件管理
    • US09183208B1
    • 2015-11-10
    • US12978444
    • 2010-12-24
    • Anuja JaiswalNikul PatelDevang K. Shah
    • Anuja JaiswalNikul PatelDevang K. Shah
    • G06F17/30G06F11/14
    • G06F11/1458G06F11/1446G06F11/1448G06F11/1451G06F17/30067G06F17/3007G06F17/30088G06F17/3023G06F2201/84
    • Many applications and computing environments, such as data storage systems, provide data backup and restoration features. It may be advantageous to provide file level backups that may be accessible to a user through a directory structure of a file system. Accordingly, fileshots comprising backup data of a file may be stored as metadata of the file. For example, a fileshot may be stored within a stream directory as a hidden stream linked off of the file. Fileshots may be associated within a directory interface (e.g., a command prompt or graphical user interface), which may be presented to a user. In this way, the user may access and/or manage fileshots through the directory interface (e.g., the user may create fileshots, restore files with fileshots, copy fileshots, etc.). Additionally, fileshot metadata may be maintained for fileshots. The fileshot metadata may be used to locate fileshot and/or perform fileshot commands.
    • 许多应用程序和计算环境(如数据存储系统)可提供数据备份和恢复功能。 提供可以通过文件系统的目录结构对用户可访问的文件级备份可能是有利的。 因此,包括文件的备份数据的文件截图可以被存储为文件的元数据。 例如,文件照片可以作为从文件关联的隐藏流存储在流目录中。 文件截图可以在可以呈现给用户的目录界面(例如,命令提示符或图形用户界面)中相关联。 以这种方式,用户可以通过目录界面访问和/或管理文件截图(例如,用户可以创建文件截图,使用文件快照恢复文件,复制文件截图等)。 此外,可以维护文件照片元数据。 文件照片元数据可用于定位文件和/或执行文件照片命令。