-
31.
公开(公告)号:US20190332292A1
公开(公告)日:2019-10-31
申请号:US15964178
申请日:2018-04-27
IPC分类号: G06F3/06
摘要: The disclosed computer-implemented method for rebalancing striped information across multiple storage devices may include (1) allocating “Y” contiguous storage spaces on “Y” physical devices, (2) dividing, at the computing device, the “Y” continuous storage spaces into “N” subvolumes, (3) allocating the “N” subvolumes to “X” logical stripes, (4) allocating each of the first “Y” logical stripes to a respective physical stripe in each of the “Y” physical stripes, (5) distributing remaining subvolumes to respective logical stripes, and (6) allocating the respective subvolumes across the “Y” physical stripes. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10372919B1
公开(公告)日:2019-08-06
申请号:US15893931
申请日:2018-02-12
发明人: Soumya Tripathy , Subhadeep Ghosh
IPC分类号: H04L29/06 , G06F21/60 , G06F9/4401 , G06F9/455
摘要: Various systems, methods, and processes to protect virtual machine data in cloud computing environments are disclosed. A request for application data is received. The application data is encrypted, the request is received at an encryption virtual machine, and the encryption virtual machine is configured to receive the request from application virtual machines via loaders. A map file is accessed to identify an application virtual machine for which the application data is requested and the application data is accessed in a storage volume. The storage volume is communicatively coupled to the encryption virtual machine, and the encryption virtual machine is coupled between the application virtual machines and the storage volume. The application data is received from the storage volume and decrypted at the encryption virtual machine. The decrypted application data is sent to the loaders.
-
公开(公告)号:US20190235897A1
公开(公告)日:2019-08-01
申请号:US15883286
申请日:2018-01-30
发明人: Vikas Goel
CPC分类号: G06F9/45558 , G06F8/61 , G06F9/45533 , G06F9/45545 , G06F9/545 , G06F2009/45575
摘要: The disclosed computer-implemented method for updating containers may include (i) identifying an application container that is instantiated from a static application container image, (ii) identifying ancillary code that is designed to modify execution of the application executing in the application container, (iii) packaging the ancillary code into a data volume container image to be deployed to the host system that hosts the application container, (iv) discovering, by the application container, a data volume container instantiated from the data volume container image on the host system, and (v) modifying, by the application container, the execution of the application executing in the application container with the ancillary code, without modifying the static application container image, at least in part by instantiating the application container with a pointer to the location of the data volume container that contains the ancillary code. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10360053B1
公开(公告)日:2019-07-23
申请号:US15432582
申请日:2017-02-14
发明人: Aaron Christensen , Kirk Searls
摘要: The disclosed computer-implemented method for completing sets of computing tasks may include (i) defining a set of computing tasks to be performed in a specified order, (ii) configuring a set of containers such that each container within the set of containers is configured to perform a task within the set of computing tasks, where each container isolates user space of a deployment system from other software on the deployment system while sharing kernel space with the other software, (iii) receiving a request to initiate the set of computing tasks, and (iv) completing, in response to the request, the set of computing tasks by launching the set of containers in the specified order. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10341252B2
公开(公告)日:2019-07-02
申请号:US14870956
申请日:2015-09-30
发明人: Jai Gahlot , Amol S. Katkar , Udipta Das , Pranav Peshwe
摘要: Various systems, methods, and processes to optimize partition arbitration are disclosed. In response to a cluster being partitioned into multiple network partitions, a determination is made, using a first node in a first network partition, whether the first node wins one or more coordination points. The determination of the first node is then transmitted to a second node in the first network partition. Further, another determination is made using the second node whether the second node wins one or more other coordination points other than the one or more coordination points won by the first node.
-
公开(公告)号:US10324628B2
公开(公告)日:2019-06-18
申请号:US15491626
申请日:2017-04-19
发明人: Shuangmin Zhang , Shengzhao Li , Xianbo Zhang , Kai Li , Weibao Wu
IPC分类号: G06F13/00 , G06F3/06 , G06F16/903 , G06F16/23 , G06F11/14
摘要: The disclosed computer-implemented method for reducing data fragmentation may include (1) identifying update data which updates an initial data set; (2) categorizing, using a database manager, the update data based on how the update data is expected to impact digital storage device resources; (3) storing the update data in a physical storage device in a physical order based on the category of the update data; and (4) updating, after storing the update data, an extent map indicating a mapping of logical locations of the update data to physical locations at which the update data is stored. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10318203B1
公开(公告)日:2019-06-11
申请号:US15953608
申请日:2018-04-16
发明人: Thomas G. Clifford
摘要: Disclosed herein are methods, systems, and processes to improve the duplication of data between disparate deduplication systems. Source fingerprints are generated for data blocks using a source fingerprint algorithm at a source deduplication system. The source fingerprints and previously-generated source fingerprints are used to determine whether the data blocks are new or modified. If the data blocks are new or modified, target fingerprints are generated for the data blocks using a target fingerprint algorithm associated with a target deduplication system. The target fingerprints are sent to the target deduplication system.
-
公开(公告)号:US10303556B1
公开(公告)日:2019-05-28
申请号:US14526745
申请日:2014-10-29
摘要: Various systems and methods for modifying the contents of a snapshot after the snapshot has been created are disclosed. One such method involves attaching a volume filter driver to a snapshot volume. The method detects one or more modifications intended for data in a read-only snapshot. Upon detecting the modification(s) intended for data in the read-only snapshot, the method performs a write operation, which includes the modification(s), to a secondary storage device instead of a primary storage device.
-
公开(公告)号:US10296520B1
公开(公告)日:2019-05-21
申请号:US14108154
申请日:2013-12-16
IPC分类号: G06F16/20 , G06F16/28 , G06F17/30 , G06F16/901 , G06F16/176 , G06F16/335
摘要: An analyzer module may identify a plurality of users and a plurality of files that have been accessed by at least one of the users. Pairs of users may be identified where each user of a pair has accessed at least one same file. A weight value may be calculated for each of the identified pairs. The weight value may be calculated based on a number of same files that each of the users of an identified pair have accessed. Collaboration information associated with the users may be determined based on the weight values.
-
公开(公告)号:US10255217B2
公开(公告)日:2019-04-09
申请号:US14945309
申请日:2015-11-18
IPC分类号: G06F3/06 , G06F13/40 , G06F9/455 , G06F11/14 , G06F12/0804 , G06F12/0815
摘要: A method for two level quality of service scheduling for latency and queue depth control in a storage system is provided. The method includes determining queue depth as input/output operations per unit time that a storage subsystem can sustain, for each of a plurality of queues corresponding to storage subsystems in the storage system and determining system capacity as total input and output operations per unit time that the storage system can sustain, based on the queue depth of each of the plurality of queues. The method includes determining whether to accept or deny an input/output request for placement onto an input/output stack, based on a comparison of credits of the input/output request to the system capacity as determined on an ongoing basis, and placing the input/output request from the input/output stack onto one of the plurality of queues based on whether doing so maintains the queue depth of the one of the plurality of queues.
-
-
-
-
-
-
-
-
-