Space efficient data protection
    181.
    发明授权

    公开(公告)号:US11334456B1

    公开(公告)日:2022-05-17

    申请号:US16252181

    申请日:2019-01-18

    Abstract: A system identifies a data object, stored in a client, for replication. The system identifies a redundancy number associated with a protected amount of failed storage nodes. The system determines whether the total count of available storage nodes is at least two greater than the redundancy number. The system determines a distribution number that is at most the total count minus the redundancy number, in response to a determination that the total count of available storage nodes is at least two greater than the redundancy number. The system creates erasure code for the data object. The system allocates the distribution number of sections of a replica of the data object to a corresponding distribution number of available storage nodes and the redundancy number of sections of the erasure code to the redundancy number of available storage nodes, which excludes the corresponding distribution number of available storage nodes.

    Methods and systems for serverless data deduplication

    公开(公告)号:US11263087B2

    公开(公告)日:2022-03-01

    申请号:US16028324

    申请日:2018-07-05

    Abstract: Methods and systems for serverless data deduplication are disclosed. A blob of data is received at a cloud services platform, where the blob of data includes incremental data. The blob of data is used to create an object in a first object store included in the cloud services platform. A function as a service (FaaS) function is triggered when the object is created. The FaaS function deduplicates the object to generate a deduplicated object. The deduplicated object is stored in a second object store included in the cloud services platform.

    Dynamic honeypots for computer program execution environments

    公开(公告)号:US11240268B1

    公开(公告)日:2022-02-01

    申请号:US15716836

    申请日:2017-09-27

    Abstract: Dynamic honeypots for computer program execution environments are described. A determination is made whether a time period has expired since a computer program execution environment, of multiple computer program execution environments, began executing a computer program that provides a user service. The computer program execution environment is changed into a computer security mechanism that counteracts an attempt of unauthorized use of a system that comprises the computer program execution environment, in response to a determination that the time period has expired since the computer program execution environment began executing the computer program that provides the user service.

    DETECT AND TRIAGE DATA INTEGRITY ISSUE FOR VIRTUAL MACHINE

    公开(公告)号:US20210382783A1

    公开(公告)日:2021-12-09

    申请号:US17405568

    申请日:2021-08-18

    Abstract: One example method includes receiving an IO request that specifies an operation to be performed concerning a data block, determining if a policy exists for a device that made the IO request, when a policy is determined to exist for the device, comparing the IO request to the policy, recording the IO request, and passing the IO request to a disk driver regardless of whether the IO request is determined to violate the policy or not.

    Method and system for managing virtual datacenters

    公开(公告)号:US11196624B2

    公开(公告)日:2021-12-07

    申请号:US17104527

    申请日:2020-11-25

    Inventor: Assaf Natanzon

    Abstract: Example embodiments of the present invention relate to methods, systems, and a computer program product for managing a virtual datacenter. The method includes tracking configuration metadata for a virtual datacenter operating at a first site and simulating the virtual datacenter at a second site according to the tracked virtual datacenter configuration metadata. An analysis then may be performed on operation of the simulated virtual datacenter at the second site.

    Method and system for performance-driven load shifting

    公开(公告)号:US11153373B2

    公开(公告)日:2021-10-19

    申请号:US16403365

    申请日:2019-05-03

    Abstract: A method and system for performance-driven load shifting. Specifically, the method and system disclosed herein entail transferring user program workloads, for processing, between local computing resources available on a client device and cloud computing resources available on an offload domain based on the assessed performance score of the client device at any given point in time. Seamless load shifting is further guaranteed due substantively to the employment of a mobile network facilitating communications between the client device and the offload domain.

Patent Agency Ranking