METHOD AND SYSTEM FOR STORING DATA IN COMPLIANCE WITH A COMPRESSION HANDLING INSTRUCTION
Granted: January 24, 2013
Application Number:
20130024432
A method for storing data in a storage system. In one embodiment, implementation of a method for storing data in compliance with a compression handling instruction includes: at a storage controller, receiving an object for storage within a data storage, wherein the object is in an original state; determining whether a compression handling instruction is received in association with the object; and executing the compression handling instruction when storing the object.
SYSTEMS AND METHODS FOR GENERATING MACHINE LEARNING-BASED CLASSIFIERS FOR DETECTING SPECIFIC CATEGORIES OF SENSITIVE INFORMATION
Granted: November 29, 2012
Application Number:
20120303558
A computer-implemented method may include (1) identifying a plurality of specific categories of sensitive information to be protected by a DLP system, (2) obtaining a training data set for each specific category of sensitive information that includes a plurality of positive and a plurality of negative examples of the specific category of sensitive information, (3) using machine learning to train, based on an analysis of the training data sets, at least one machine learning-based…
DYNAMIC INSERTION AND REMOVAL OF VIRTUAL SOFTWARE SUB-LAYERS
Granted: November 22, 2012
Application Number:
20120297374
The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the…
Techniques for Providing Access to Data in Dynamic Shared Accounts
Granted: November 8, 2012
Application Number:
20120284776
Techniques for providing access to data in dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic shared accounts. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a first user associated with an account, identify a second user to have access to the account associated with the first user in the event…
METHOD AND SYSTEM FOR MIGRATING A SELECTED SET OF A VIRTUAL MACHINES BETWEEN VOLUMES
Granted: November 8, 2012
Application Number:
20120284707
A method for migrating a selected set of virtual machines from a first volume to a second volume. The method includes receiving a list of virtual machines which are not migrating from a first volume to a second volume, accessing a host file system usage map of a host machine that indicates active blocks of the host file system, and accessing virtual file system usage maps of a plurality of virtual machines that indicate active blocks. A filter usage map that identifies the active blocks…
DATA STORAGE RECLAMATION SYSTEMS AND METHODS
Granted: November 1, 2012
Application Number:
20120278580
Storage systems and methods are presented. In one embodiment, a storage reclamation method comprises performing a potential reclamation identification process, wherein the potential reclamation identification process includes determining if there is the potential for reclaiming storage resources; performing a reclamation process, wherein reclamation is performed on storage resources identified by the potential reclamation identification process as being eligible for reclamation, and…
METHOD AND SYSTEM FOR MANAGING DUPLICATE ITEM DISPLAY
Granted: November 1, 2012
Application Number:
20120278761
A system and method for displaying items in a list includes displaying a representation of duplicate items within the list as a visual attribute, wherein the duplicate items include a common body portion. In response to user interaction with the visual attribute, the list is expanded, wherein the expanding causes the display of the duplicate items. In response to user interaction with the visual attribute, the list is collapsed, wherein the collapsing causes the removal of the display of…
REFERENCE VOLUME FOR INITIAL SYNCHRONIZATION OF A REPLICATED VOLUME GROUP
Granted: October 25, 2012
Application Number:
20120271797
A method for using a reference volume for initial synchronization of a replicated volume group. The method includes initiating a replication and synchronization operation between a parent virtual machine and a child virtual machine, and specifying a parent virtual machine to be used for replication and a subsequent synchronization. The method further includes accessing a point in time snapshot of the parent virtual machine, coordinating with a secondary site to obtain an image of the…
METHOD AND SYSTEM FOR RECLAIMING STORAGE ON A SHARED STORAGE DEVICE OR INDEPENDENT OF THE MOUNT STATE OF A FILE SYSTEM
Granted: October 25, 2012
Application Number:
20120271870
A method for storage reclamation in a shared storage device. The method includes executing a distributed computer system having a plurality of file systems accessing storage on a shared storage device, and initiating a reclamation operation by using a reclamation agent that accesses the shared storage device. The method further includes reading the file system data structure that represent unallocated storage blocks of one of the plurality of file systems that will undergo a reclamation…
METHOD AND APPARATUS FOR CREATING AN INFORMATION SECURITY POLICY BASED ON A PRE-CONFIGURED TEMPLATE
Granted: October 18, 2012
Application Number:
20120266210
A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is identified. Further, one of multiple policy templates is used to automatically create a policy for detecting information from any one or more rows within the tabular structure of the source data.
METHOD AND SYSTEM FOR PERFORMING A CLEAN FILE LOCK RECOVERY DURING A NETWORK FILESYSTEM SERVER MIGRATION OR FAILOVER
Granted: October 11, 2012
Application Number:
20120259819
A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server migration from one node of the cluster to a different node of the cluster. A migration count is incremented, wherein the migration count is stored at each of the nodes comprising the cluster. File lock services are paused at each of the nodes comprising the cluster. The…
METHOD AND SYSTEM FOR RESTARTING FILE LOCK SERVICES AT AN ADOPTIVE NODE DURING A NETWORK FILESYSTEM SERVER MIGRATION OR FAILOVER
Granted: October 11, 2012
Application Number:
20120259820
A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server fail over from one node of the cluster to an adoptive node of the cluster. File lock services are then stopped at the adoptive node. File lock services are subsequently restarted at the adoptive node, wherein the restart causes the adoptive node to commence a grace period…
DETERMINING FILE OWNERSHIP OF ACTIVE AND INACTIVE FILES BASED ON FILE ACCESS HISTORY
Granted: October 11, 2012
Application Number:
20120259849
File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period;…
SERVER AND METHOD FOR THE SERVER TO ACCESS A VOLUME
Granted: October 11, 2012
Application Number:
20120259941
Embodiments of the present technical solution relate to the technique field of storage, and disclose a server and a method for the server to access a volume. The method comprises: determining, from a first list, a block that needs to be accessed according to an access offset of a volume that needs to be accessed; determining, from a second list, a storage controller corresponding to the block that needs to be accessed according to the determined block; and sending a data reading request…
STORAGE MANAGEMENT SYSTEMS AND METHODS
Granted: October 11, 2012
Application Number:
20120260036
Storage management systems and methods are presented. In one embodiment, a storage management method comprises: establishing a cluster including one or more logical unit number storage components (LUNs) communicatively coupled to one or more host nodes, wherein one of the one or more nodes is a master host node; performing a LUN naming process wherein a master host node assigns a name to each of the one or more LUNs respectively, even if the one or more LUNS are communicatively coupled…
POLICY FOR STORING DATA OBJECTS IN A MULTI-TIER STORAGE SYSTEM
Granted: October 11, 2012
Application Number:
20120260040
A sliding window policy is implemented to manage database objects. At a first time, a first portion of a database object is allocated to a first tier of a multi-tier storage system. The first portion corresponds to a first specified percentage of the size of the database object at the first time and is selected according to information associated with the database object. The remaining portion of the database object at the first time is allocated to one or more other tiers. At a second…
DATA STORAGE RESOURCE MANAGEMENT SYSTEMS AND METHODS
Granted: October 11, 2012
Application Number:
20120260050
Storage systems and methods are presented. In one embodiment, a data storage resource management method comprises: performing a data update process, including communicating a data update input output packet between a primary storage resource and a secondary storage resource, wherein corresponding data updates in the secondary storage resource are a mirror of data updates in the primary storage resource; and performing a reclamation process, including: communicating reclamation…
CONTEXT SENSITIVE POWER MANAGEMENT FOR A RESOURCE
Granted: October 11, 2012
Application Number:
20120260112
Power management systems and methods are presented. In one embodiment, implementation of a method for context specific power management of a resource, comprises: defining a context within which a resource operates, wherein the context is defined by one or more parameters; tracking a usage history of the resource operating within the context to determine passive user feedback related to a plurality of timeout values; and determining a timeout value for a current operation of the resource…
SELECTING AN ALTERNATIVE PATH FOR AN INPUT/OUTPUT REQUEST
Granted: October 11, 2012
Application Number:
20120260121
A first path for forwarding an I/O request from a host device to a disk in a disk array is identified. The first path includes two endpoints (a first initiator endpoint on the host device and a first target endpoint on the disk array) separated by a storage area network. In response to an indication that the first path is non-functional, a second path to the disk for the I/O request is identified as an alternative to the first path. The second path includes a second initiator endpoint…
MULTI-DISK FAULT-TOLERANT SYSTEM, METHOD FOR GENERATING A CHECK BLOCK, AND METHOD FOR RECOVERING A DATA BLOCK
Granted: October 11, 2012
Application Number:
20120260125
A multi-disk fault-tolerant system, a method for generating a check block, and a method for recovering a data block are provided. The multi-disk fault-tolerant system includes a disk array and a calculation module connected through a system bus, the disk array is formed by p disks, and a fault-tolerant disk amount of the disk array is q; data in the disk array is arranged according to a form of a matrix M of (m+q)×p, where m is a prime number smaller than or equal to p?q; in the matrix…