摘要:
A network file system includes at least one unmodified client and at least one unmodified physical file server (PFS). Each PFS has at least one file that is identified by an associated physical file handle (PFH). The network file system includes virtual file servers (VFSs) in a data path between the client(s) and the PFS(s). The network file system also includes a virtualized name space that is mapped to the PFS(s) and is provided to the client(s) by the VFS(s). The network file system further includes a virtualized ID space that is established in response to a request from a client. Within the ID space, each file is identified by a physical file handle (PFH) on a PFS. The PFH and PFS pair are mapped to provide a virtual file handle (VFH), and the map of the VFHs is allocated among the VFSs.
摘要:
A system for controlling power consumption of a network includes at least one terminal to receive a plurality of requests to route data from a plurality of data sources to a plurality of data sinks, where the data sources and the data sinks are connected to each other through a plurality of network nodes forming the network, and a network configuration unit. The network configuration unit includes a selection module configured to select a configuration of the network nodes that allows the network to have a lowest overall power consumption of the network among a plurality of configurations of the network, and an output module configured to output a plurality of instruction signals to the network nodes to perform the network configuration. A network path for transmitting a network flow is selected that does not allow the network flow to be split and flow through another network path.
摘要:
Locations for deploying mesh nodes in a wireless network are determined based on a Terminal Steiner tree (TST). The TST that is formulated from an input graph and client locations in the wireless network is determined. The input graph includes signal strength values for pairs of mesh node-to-client location and mesh node-to-mesh node links and mesh node locations for deploying the mesh nodes are selected from the Steiner nodes in the TST.
摘要:
Provided are, among other things, systems, methods and techniques for generating a representative data string. In one representative implementation: (a) starting data positions are identified within input strings of data values; (b) a subsequence of output data values is determined based on the data values at data positions determined with reference to the starting data positions within the input strings; (c) an identification is made as to which of the input strings have segments that match the subsequence of output data values, based on a matching criterion; (d) steps (a)-(c) are repeated for a number of iterations; and (e) the subsequences of output data values are combined across the iterations to provide an output data string, with the determination in step (b) for a current iteration being based on the identification in step (c) for a previous iteration.
摘要:
A plurality of users may have access to a file. The file is encrypted with a key. Access for a user to the file is revoked. A new key is generated from the current key of the file in response to said revocation, and the file is encrypted with the new key.
摘要:
An embodiment of a method of managing a computer system begins with a step of placing a virtual machine monitor on a computer. The virtual machine monitor includes an interface for a module. The method continues with a step of forming a computing platform on the computer. The virtual machine monitor provides access control to the hardware resources for software executing on the computing platform. The method concludes with a step of adding a module to the virtual machine monitor through the interface. The module modifies the access control provided by the virtual machine monitor.
摘要:
An embodiment of a method of providing storage to a virtual computer cluster within a shared computing environment begins with a first step of combining storage resources within the shared computing environment into a virtual storage pool. The virtual storage pool comprises at least portions of storage devices in which at least one of the storage devices is not directly accessible by all computers which directly access any of the storage devices. The method continues with a second step of partitioning a virtual storage volume from the virtual storage pool. In a third step, the method assigns the virtual storage volume to the virtual computer cluster. The method concludes with a fourth step of making the virtual storage volume accessible to computing platforms of the virtual computer cluster using software. The software allows access to the virtual storage volume by the computing platforms while precluding access to remaining storage within the shared computing environment by the computing platforms.
摘要:
A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.