Abstract:
A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a physical volume with a native snapshot program, determining which blocks have changed since a previous snapshot with a change block tracker, creating a child virtual container, populating the child virtual container with the changed blocks, and linking the child virtual container with a parent virtual container.
Abstract:
The present invention pertains to a hemolysis sensor, a hemolysis sensor system and methods of utilizing the hemolysis sensor or hemolysis sensor system to monitor or detect hemolysis in a sample, such as a whole blood sample, a plasma sample, a serum sample or hemolyzed blood. The hemolysis sensor responds to extracellular hemoglobin levels, for example, extracellular hemoglobin in a whole blood sample as a method for detecting hemolysis in whole blood.
Abstract:
Techniques, systems, devices and materials are disclosed for capturing, isolating and transporting target biomolecules and living organisms. In one aspect, a device includes a tube structured to include a large opening and a small opening that are on opposite ends of the tube, and a tube body connecting the openings and having a cross section spatially reducing in size from the large opening to the small opening, in which the tube includes a layered wall including an inner layer having a catalyst material that is reactive with a fuel fluid to produce bubbles exiting the tube from the large opening to propel the tube to move in the fuel fluid and an external layer formed of a material capable of being functionalized, and a molecular layer functionalized onto the external layer of the tube and structured to attach to a targeted molecule in the fuel fluid.
Abstract:
A system and method for data protection in a logical namespace of a storage system environment is provided. An integrated management framework implements a data protection technique that monitors failures in the logical namespace at a managed data object granularity, e.g., a share. In the event of a failure to the data object, e.g., a primary share, the data protection technique enables automatic failover for a link point to the object (primary share) that is protected by a backup copy of the data object, e.g., a secondary share. That is, the data protection technique enables failover from the primary share to a secondary share and corresponding linking of the secondary share to the link point in the logical namespace.
Abstract:
The snapshot capability moving into the SAN fabric and being provided as a snapshot service. A well-known address is utilized to receive snapshot commands. Each switch in the fabric connected to a host contains a front end or service interface to receive the snapshot command. Each switch of the fabric connected to a storage device used in the snapshot process contains a write interceptor module which cooperates with hardware in the switch to capture any write operations which would occur to the snapshot data area. The write interceptor then holds these particular write operations until the original blocks are transferred to a snapshot or separate area so that the original read data is maintained. Should a read operation occur to the snapshot device and the original data from requested location has been relocated, a snapshot server captures these commands and redirects the read operation to occur from the snapshot area. If, however, the read operation is directed to the original drive, the read is provided from the original data areas, even if the data had been replaced. The snapshot server determines the existence of particular snapshot devices, allocates their storage locations, provides this information to both the service interfaces and the write interceptors and handles read and write operations to the snapshot device.
Abstract:
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service. The link authentication involves a multi-phase nonce exchange exploiting various derivations of the nonce and other information such as hashes and encryptions. The push-model secure time distribution departs from the traditional Fibre Channel pull mode time distribution and provides for secure and reliable distributed time so that various security attacks may be defeated.
Abstract:
Techniques and systems are disclosed for detecting biomolecular interactions based on the motion of nanomotors. In one aspect, a method of detecting biomolecular interactions based on a motion of a nanomachine includes functionalizing a nanomachine with a capture probe adapted to interact with biological targets; and detecting a presence of the biological targets in an environment based on a motion of the nanomachine.
Abstract:
Among other things, methods, systems and apparatus are described for implementing nanomotor-based micro- and nanofabrication. In one aspect, a method of fabricating nanoobjects comprises functionalizing a nanomotor with a reagent. The method also includes controlling a movement of the functionalized nanomotor in a solution containing material to react with the reagent to induce a localized deposition or precipitation of a product onto a surface of a substrate or etching of the substrate.