Abstract:
Embodiments of the present invention provide systems, methods, and computer program products for managing clone data to increase system performance and reduce disk space wastage by selectively pre-allocating and initializing clone data blocks based on a likelihood of subsequent write operations being performed on those clone data blocks.
Abstract:
Resource management processes are implemented by a computer processor and logic executable by the computer processor. The logic is configured to calculate a performance weight for each end user of an application executing on the computer processor. The performance weight is calculated as a function of an activity level determined for each end user and a type of the application. The logic is also configured to calculate an input/output weight for each end user from a combination of an input/output requirement and the performance weight. The input/output requirement is indicative of an amount of storage resources of a multi-tiered storage system associated with anticipated activities of the end user. The logic is further configured to assign an amount of the storage resources for each end user based on the input/output weight.
Abstract:
A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier.
Abstract:
Identify the presence of people in a particular area and determine the object of visual attention of each person. Based on this information, select and deliver content through nearby adaptive content delivery devices based on characteristics of these objects when considered collectively, such as based on the object attracting the greatest amount of attention from passers-by. Content selection criteria may additionally be based on supplemental information, whether explicit or inferred, about the people in the area.
Abstract:
A file division and erasure code application executing in a controlling computational device generates data fragments and parity fragments of a file. Each of the generated data fragments and parity fragments are distributed in a different distributed computational device of a plurality of distributed computational devices, where distributing of a generated data fragment comprises determining whether any distributed computational device already stores a duplicate copy of the generated data fragment, and if any distributed computational device already stores the duplicate copy of the generated data fragment, placing the generated data fragment in the distributed computational device if no other data or parity fragment of the file has already been placed in the distributed computational device.
Abstract:
Provided are a computer program product, system, and method for defragmenting files having file blocks in multiple point-in-time copies. Multiple point-in-time copies for a file having file blocks ap. Maintained. Each point-in-time copy to the file has at least one different block in the storage for at least one of the file blocks in the file. For each of a plurality of the point-in-time copies for the file, moving the blocks for the file blocks in the point-in-time copy to contiguous locations on the storage.
Abstract:
Provided are a computer program product, system, and method for using file element accesses to select file elements in a file system to defragment. A determination is made of accesses to file elements in the file system. The determined accesses to the file elements are used to select the file elements to defragment and the selected file elements are defragmented.
Abstract:
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies.
Abstract:
Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application.
Abstract:
In one embodiment, a method includes receiving a block set comprising one or more blocks; generating a hash value for each block in the block set; determining whether physical blocks stored on computer readable storage media are duplicates of any block in the block set; and for each block in the block set that has a duplicate thereof: map the block to the duplicate when the duplicate is on one of the computer readable storage media that does not have any other block in the block set written and/or mapped thereto, and write the block to one of the computer readable storage media that does not have any other block in the block set written and/or mapped thereto when the duplicate is stored on a computer readable storage media that has another block in the block set written and/or mapped thereto, and map the duplicate to the written block.