Abstract:
The snapshot capability moving into the SAN fabric and being provided as a snapshot service. A well-known address is utilized to receive snapshot commands. Each switch in the fabric connected to a host contains a front end or service interface to receive the snapshot command. Each switch of the fabric connected to a storage device used in the snapshot process contains a write interceptor module which cooperates with hardware in the switch to capture any write operations which would occur to the snapshot data area. The write interceptor then holds these particular write operations until the original blocks are transferred to a snapshot or separate area so that the original read data is maintained. Should a read operation occur to the snapshot device and the original data from requested location has been relocated, a snapshot server captures these commands and redirects the read operation to occur from the snapshot area. If, however, the read operation is directed to the original drive, the read is provided from the original data areas, even if the data had been replaced. The snapshot server determines the existence of particular snapshot devices, allocates their storage locations, provides this information to both the service interfaces and the write interceptors and handles read and write operations to the snapshot device.
Abstract:
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service. The link authentication involves a multi-phase nonce exchange exploiting various derivations of the nonce and other information such as hashes and encryptions. The push-model secure time distribution departs from the traditional Fibre Channel pull mode time distribution and provides for secure and reliable distributed time so that various security attacks may be defeated.
Abstract:
The snapshot capability moving into the SAN fabric and being provided as a snapshot service. A well-known address is utilized to receive snapshot commands. Each switch in the fabric connected to a host contains a front end or service interface to receive the snapshot command. Each switch of the fabric connected to a storage device used in the snapshot process contains a write interceptor module which cooperates with hardware in the switch to capture any write operations which would occur to the snapshot data area. The write interceptor then holds these particular write operations until the original blocks are transferred to a snapshot or separate area so that the original read data is maintained. Should a read operation occur to the snapshot device and the original data from requested location has been relocated, a snapshot server captures these commands and redirects the read operation to occur from the snapshot area. If, however, the read operation is directed to the original drive, the read is provided from the original data areas, even if the data had been replaced. The snapshot server determines the existence of particular snapshot devices, allocates their storage locations, provides this information to both the service interfaces and the write interceptors and handles read and write operations to the snapshot device.
Abstract:
Techniques and systems are disclosed for detecting biomolecular interactions based on the motion of nanomotors. In one aspect, a method of detecting biomolecular interactions based on a motion of a nanomachine includes functionalizing a nanomachine with a capture probe adapted to interact with biological targets; and detecting a presence of the biological targets in an environment based on a motion of the nanomachine.
Abstract:
Among other things, methods, systems and apparatus are described for implementing nanomotor-based micro- and nanofabrication. In one aspect, a method of fabricating nanoobjects comprises functionalizing a nanomotor with a reagent. The method also includes controlling a movement of the functionalized nanomotor in a solution containing material to react with the reagent to induce a localized deposition or precipitation of a product onto a surface of a substrate or etching of the substrate.
Abstract:
A system and method integrates namespace management and storage management in a storage system environment. According to the invention, an integrated management framework provides an underlying infrastructure that supports various heterogenous storage access protocols within a single, logical namespace service. The logical namespace service is based on extensions to underlying storage management processes that cooperate to create the integrated management framework. Notably, these extensions are embodied as novel library functionality.
Abstract:
This invention relates to the identification of modified cytosine residues, such as 5-methylcytosine (5mC), 5-hydroxymethylcytosine (5hmC) and 5-formylcytosine (5fC) to be distinguished from cytosine (C) in a sample nucleotide sequence. Methods may comprise oxidising or reducing a first portion of polynucleotides which comprise the sample nucleotide sequence; treating the oxidised or reduced first portion and a second portion of polynucleotides with bisulfite; sequencing the polynucleotides in the first and second portions of the population following steps ii) and iii) to produce first and second nucleotide sequences, respectively and; identifying the residue in the first and second nucleotide sequences which corresponds to a cytosine residue in the sample nucleotide sequence. These methods may be useful, for example in the analysis of genomic DNA and/or of RNA.
Abstract:
A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a physical volume with a native snapshot program, reading the snapshot block by block, creating a blank virtual container on a deduplicated virtual storage device, and populating the blank virtual container block by block based on reading the snapshot.
Abstract:
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service. The link authentication involves a multi-phase nonce exchange exploiting various derivations of the nonce and other information such as hashes and encryptions. The push-model secure time distribution departs from the traditional Fibre Channel pull mode time distribution and provides for secure and reliable distributed time so that various security attacks may be defeated.