摘要:
An apparatus, system, and method are disclosed for establishing an agency relationship to perform delegated computing tasks. The apparatus system and method provide for initiation of the agency relationship, establishment of credentials to perform a delegated computing task, and performance of the delegated computing task. Benefits of establishing an agency relationship in a computing environment include improved security, efficiency, and reliability in performing delegated computing tasks.
摘要:
A detectibility service for a storage infrastructure manager (SIM) operating on a storage area network (SAN) is disclosed directed to addressing a situation where there may be multiple sources of duplicate or contradictory information to the SIM about the presence and condition of an element in the SAN. The service can account for both authoritative as well as nonauthoritative sources of information in a SAN, which participate in the discovery process scanning for SAN elements. Both authoritative and nonauthoritative sources of information can be used to report a given SAN element during a probe, taking advantage of the more efficient processing of information from authoritative sources to override information from nonauthoritative sources regardless of the order in which the various scans may occur.
摘要:
The present invention includes one or more clients in communication with a server. The client desires to send a storage construct to the server for storage. The client negotiates a transmission key with the server. The client generates a storage key associated specifically with the storage construct. The client encrypts the storage construct using the storage key and encrypts the storage key using the transmission key. The encrypted storage construct and encrypted storage key are sent to the server. The server decrypts the storage key using the transmission key. The server stores the storage construct on a storage device separate from a storage device storing the storage key. Preferably, any changes to the storage construct location, the storage key location, or the storage construct name are tracked and proper modifications are made to an association relating the location of the storage construct and the location for the corresponding storage key.
摘要:
The present invention includes one or more clients in communication with a server. The client desires to send a storage construct to the server for storage. The client negotiates a transmission key with the server. The client generates a storage key associated specifically with the storage construct. The client encrypts the storage construct using the storage key and encrypts the storage key using the transmission key. The encrypted storage construct and encrypted storage key are sent to the server. The server decrypts the storage key using the transmission key. The server stores the storage construct on a storage device separate from a storage device storing the storage key. Preferably, any changes to the storage construct location, the storage key location, or the storage construct name are tracked and proper modifications are made to an association relating the location of the storage construct and the location for the corresponding storage key.
摘要:
A detectibility service for a storage infrastructure manager (SIM) operating on a storage area network (SAN) is disclosed directed to addressing a situation where there may be multiple sources of duplicate or contradictory information to the SIM about the presence and condition of an element in the SAN. The service can account for both authoritative as well as nonauthoritative sources of information in a SAN, which participate in the discovery process scanning for SAN elements. Both authoritative and nonauthoritative sources of information can be used to report a given SAN element during a probe, taking advantage of the more efficient processing of information from authoritative sources to override information from nonauthoritative sources regardless of the order in which the various scans may occur.
摘要:
Provided is a method for performing scheduled backups of a backup node associated with a plurality of agent nodes. Backup data sets on at least one machine in a network are associated with a backup node and a plurality of agent nodes in the network are associated with the backup node. The agent nodes are associated with machines in the network capable of backing up the backup data sets associated with the backup node. A schedule indicating a scheduled backup to backup scheduled data sets associated with the backup node is processed. At least one of the agent nodes is contacted to request the at least one agent node to perform the scheduled backup and backup the scheduled data sets, wherein the at least one contacted agent node performs the scheduled backup to backup the scheduled backup sets.
摘要:
An apparatus, system, and method are disclosed for detecting entity changes in a storage area network. A discovery module probes a plurality of entities of the storage area network to detect an event in response to a policy, stores attributes of the probed entities, and reports the event with a probe event reference. A monitor module receives a self-announced event reference of the event if an entity communicates the event. A configuration module records the event as an initiated event reference if the event is initiated by an administrator. An event manager synthesizes a report of the event from the event references.
摘要:
An example of a method for error tracking includes sending a data object to a first location. This example also includes determining if the data object was successfully stored at the first location, and if so, storing meta data corresponding with the data object, wherein the meta data includes first path information. This example of the method also includes sending the data object to a second location. This example further includes determining if the data object was successfully stored at the second location, and if so, adding second path information to the meta data corresponding with the data object, to update the meta data. Some examples of the invention may be called a data centric error tracking and problem analysis method (and system), because the error tracking is generally based on the path traveled by the data.
摘要:
Provided are a method, system, and program for performing scheduled backups of a backup node associated with a plurality of agent nodes. Backup data sets on at least one machine in a network are associated with a backup node and a plurality of agent nodes in the network are associated with the backup node. The agent nodes are associated with machines in the network capable of backing up the backup data sets associated with the backup node. A schedule indicating a scheduled backup to backup scheduled data sets associated with the backup node is processed. At least one of the agent nodes is contacted to request the at least one agent node to perform the scheduled backup and backup the scheduled data sets, wherein the at least one contacted agent node performs the scheduled backup to backup the scheduled backup sets.
摘要:
An example of a method for error tracking includes sending a data object to a first location. This example also includes determining if the data object was successfully stored at the first location, and if so, storing meta data corresponding with the data object, wherein the meta data includes first path information. This example of the method also includes sending the data object to a second location. This example further includes determining if the data object was successfully stored at the second location, and if so, adding second path information to the meta data corresponding with the data object, to update the meta data. Some examples of the invention may be called a data centric error tracking and problem analysis method (and system), because the error tracking is generally based on the path traveled by the data.