Abstract:
A method includes determining conference data associated with a conference and determining an optimum congestion control technique for a call leg of the conference based on the conference data. The determining the conference data includes obtaining or receiving the conference data from at least one of: a Home Subscriber Service (HSS), a presence server, and a conference object. The conference is a Session Initiated Protocol (SIP) conference.
Abstract:
Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
Abstract:
Provided are a computer program product, system, and method for determining priorities for cached objects to order the transfer of modifications of cached objects based on measured network bandwidth. Objects are copied from a primary site to a secondary site to cache at the secondary site. The primary site includes a primary server and primary storage and the secondary site includes a secondary server and a secondary storage. Priorities are received from the secondary server for the objects at the secondary site based on determinations made by the secondary server with respect to the objects cached at the secondary storage. A determination is made of modifications to the objects at the primary storage that are cached at the secondary storage. The received priorities for the objects from the secondary server are used to control a transfer of the determined modifications to the objects to the secondary server.
Abstract:
An embodiment of the invention provides a method for storage management in a cloud computing system. More specifically, locations of storage components in the cloud computing system and storage properties of the storage components are identified. The storage properties include the amount of available storage space and/or the cost of storage space. A storage quota for a user of the cloud computing system is generated with a cloud quota management module based on the locations of the storage components and/or the storage properties of the storage components. In at least one embodiment, the storage quota includes the maximum amount of storage allocated to the user in at least one of the storage components.
Abstract:
Implementing calendar-based power reserve includes identifying a new calendar entry scheduled into a calendar application of a mobile communications device. The new calendar entry specifies a telephone call. Upon determining a priority indicator has been set for the new calendar entry in the calendar application, the calendar-based power reserve also includes directing a power management component of the mobile communications device to reserve an amount of power for the telephone call, and updating a battery power indicator on the mobile communications device to reflect a capacity of a battery of the mobile communications device. The capacity reflects a current amount of available power for the battery minus the amount of power to reserve.
Abstract:
A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to securely delete a file. The method also includes determining the file is deduplicated. The method further includes determining one of: the file is referred to by at least one other file, and the file is not referred to by another file. The method additionally includes securely deleting links associating the file with the local computing device without deleting the file when the file is referred to by at least one other file. The method also includes securely deleting the file when the file is not referred to by another file.
Abstract:
Systems and methods for authentication in a data management system are provided. In one embodiment, the method comprises identifying a plurality of data ciphers based on a pre-defined set of properties associated with a plurality of data sources; and generating an authentication response having at least a subset of the identified plurality of data ciphers, wherein the authentication response authenticates access to at least some data sources from among the plurality of data sources.
Abstract:
Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method and system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution.
Abstract:
Adaptive index density in a database management system is provided, which includes receiving a number of partitions for an index for a database table, the index subject to creation. The adaptive index density also includes selecting a column from the database table, the column selected based upon an estimated frequency of execution of database queries for the column. The adaptive index density further includes calculating an estimated cost of executing each of the database queries for the column, and determining data to reside in each of the partitions of the index responsive to the estimated cost.
Abstract:
Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.