Abstract:
A system for distributing digital data among a plurality of customers is provided which comprises a modular software architecture to accommodate different data preview, search, data compression and encryption functions, and different purchase transactions. A software kernel creates an operating environment in conjunction with the host operating system of a customer computer to accommodate these different services and functions and allow for the storage and retrieval of datasets from a variety of storage locations, such as portable storage devices at customer computers and shared memory devices accessible via communication networks. Computer-dependent product codes for requesting datasets and release codes for decrypting datasets are generated to protect against unauthorized use of selected datasets.
Abstract:
Systems and methods efficiently distribute information, such as path name, attributes and object information, corresponding to changes in a content repository to remote nodes in a network using storage-layer/object-based protocols. A difference monitoring client monitors name space and object space changes by identifying inodes which have been modified on storage volumes between two or more snapshots. The monitoring client builds a list which may include name information, object space information and attributes such as file size and permissions for each of the changed inodes that is utilized to update the edge nodes. Systems and methods also provide for geo-scale content distribution from a central repository to edge nodes using a storage-layer/object protocol. A caching mechanism is utilized to cache requested content at an edge node. Cached content may be maintained at the edge node during use and/or for an additional predetermined period. Difference monitoring client may track such cached content.
Abstract:
A service level objective (SLO) subsystem that includes an SLO engine in a network storage system that allows new degrees of freedom to be added to the SLO subsystem, without requiring any modification of an associated SLO engine or the system's existing SLOs, and without requiring the SLO engine to have any a priori knowledge of the new degrees of freedom. In certain embodiments, the system has a modular design which includes the SLO engine and one or more SLO modules that interface with the SLO engine. Each SLO module corresponds to a different degree of freedom. Each SLO module evaluates SLO compliance and determines what specific action(s) within its corresponding degree of freedom should be taken to comply with an SLO.
Abstract:
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.
Abstract:
A system and method is described for managing data objects in a fixed-content storage system. Metadata is provided for each variable size packet and may include offset information, packet size data, reference content blocks, and the like. Using this information, intelligently decomposed objects, consolidated objects, differenced objects, and composite objects may be stored in the storage system. The data structure provided by these objects allows for the reduction of necessary storage resources and the total number of stored objects.
Abstract:
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.
Abstract:
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.
Abstract:
In the area of storage management, service automation can be realized through the use of “MAPE” loop(s). A Planner (P) interacts with the Monitoring (M), Analysis (A) and Execution (E) components in a closed loop. For each new option or potential planning action the Planner (P) invokes the Analysis (A) component. The correctness, as well as effectiveness, of the planning decision is dependent on the Analysis (A) component. Embodiments can utilize an adaptive Analysis (A) component (i.e., an analysis component that can be retrained) that also associates a value of confidence and a corresponding error in the evaluation along with a predicted impact. The Planner (P) component uses this additional information for quoting the final impact of a particular planning action as part of an adaptive MAPE loop to provide improved resource utilization and resource management.
Abstract:
Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster.
Abstract:
Systems and methods efficiently distribute information, such as path name, attributes and object information, corresponding to changes in a content repository to remote nodes in a network using storage-layer/object-based protocols. A difference monitoring client monitors name space and object space changes by identifying inodes which have been modified on storage volumes between two or more snapshots. The monitoring client builds a list which may include name information, object space information and attributes such as file size and permissions for each of the changed inodes that is utilized to update the edge nodes. Systems and methods also provide for geo-scale content distribution from a central repository to edge nodes using a storage-layer/object protocol. A caching mechanism is utilized to cache requested content at an edge node. Cached content may be maintained at the edge node during use and/or for an additional predetermined period. Difference monitoring client may track such cached content.