-
公开(公告)号:US10019452B2
公开(公告)日:2018-07-10
申请号:US15159480
申请日:2016-05-19
Applicant: MORGAN STANLEY
Inventor: Glenn M. Judd
IPC: G06F17/30
CPC classification number: G06F16/137
Abstract: A topology aware distributed storage system includes a plurality of storage nodes, at least one client node, and a storage manager and metadata store. A user-defined storage policy specifies where data is stored within a topological hierarchy of nodes within the network. A hierarchical ring topology including a hierarchical structure of rings representing an organizational structure of nodes is computed and flattened into a single global ring divided into segments corresponding to a unique range of integers and associated with a replica set responsible for storing a key corresponding to one of the integers. A hash function is performed on a user key received from the client node, and the hashed key is looked up on the flattened global ring stored on each storage node to identify the replica set responsible for storing data corresponding to the hashed key.
-
52.
公开(公告)号:US20180032540A1
公开(公告)日:2018-02-01
申请号:US15221887
申请日:2016-07-28
Applicant: Dell Products L.P.
Inventor: Lev GELDMAN , Ofir CARNY , Daniel KRAUTHGAMER
IPC: G06F17/30
CPC classification number: G06F16/152 , G06F16/137
Abstract: A method and a system for implementing a reverse directory lookup using hash table, the method comprising: calculating using a hash function, a hash value of file name, upon creating a new file in a file system; writing the calculated hash value to the metadata of the file; reading the hash value at a meta data of a file of a desirable identifier (ID), responsive to an inquiry of a file name associated with the desirable ID; and searching for a corresponding file name for the desirable ID at a bucket storing all files associated with this bucket according to their filename's hash values, based on a hash function.
-
53.
公开(公告)号:US20180018165A1
公开(公告)日:2018-01-18
申请号:US15541591
申请日:2016-01-05
Applicant: FASOO. COM CO., LTD
Inventor: Sungjin KIM , Kyeongcheol KIM , Wonsuk CHOI , Jongyun JUNG
CPC classification number: G06F8/71 , G06F8/75 , G06F16/137
Abstract: Disclosed is a source code transfer control method, a computer program therefor, and a recording medium therefor. The source code transfer control method is a method executed in a configuration management system interworking with a static analyzer server. The method includes: (a) receiving a source code transfer request; (b) transmitting file identification information on a source code that is requested for transfer, to a static analyzer server; (c) receiving a return value from the static analyzer server on the basis of the file identification information, the return value being produced from an analysis result associated with the transfer-requested source code and loaded on the static analyzer server, the return value being a value produced for each check item that is preset for transfer control; and (d) providing information on whether the transfer-requested source code can be normally transferred on the basis of the return value.
-
公开(公告)号:US20170322972A1
公开(公告)日:2017-11-09
申请号:US15150075
申请日:2016-05-09
Applicant: SAP SE
Inventor: Chul Won Lee , Juchang Lee , Myunggon Park , Wonyoung Kwak , Jeong Hee Won , Ki Hong Kim , Kyu Hwan Kim , Beomsoo Kim
IPC: G06F17/30
CPC classification number: G06F16/24532 , G06F16/116 , G06F16/137 , G06F16/1727 , G06F16/21
Abstract: Technologies are described for facilitating data workload capture, workload replay, and comparing the performance of a plurality of database systems. A plurality of requests for database operations are received from one or more database clients. The requests for database operations are executed. For the plurality of requests for database operations, execution context information is generated for a plurality of execution contexts. For the plurality of requests for database operations, a plurality of performance measures are generated. The execution context information and the performance measures are stored in a workload capture store, such as a file. The workload capture file is useable to replay the captured workload at a second database system using at least a portion of the execution context information and at least a portion of the performance measures.
-
公开(公告)号:US20160359891A1
公开(公告)日:2016-12-08
申请号:US15173477
申请日:2016-06-03
Applicant: Cisco Technology, Inc.
Inventor: Jackson Ngoc Ki Pang , Navindra Yadav , Anubhav Gupta , Shashidhar Gandham , Supreeth Hosur Nagesh Rao , Sunil Kumar Gupta
IPC: H04L29/06 , H04L12/851 , G06F17/30 , H04L12/26
CPC classification number: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/566 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/2007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/10 , H04L67/1002 , H04L67/12 , H04L67/16 , H04L67/22 , H04L67/36 , H04L67/42 , H04L69/16 , H04L69/22 , H04W72/08 , H04W84/18
Abstract: An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
Abstract translation: 建立网络端点优先级排序的方法。 在端点受到攻击后对端点进行分类时,这可能很有用。 确保最关键和最脆弱的端点首先被分类,可以帮助维护网络的稳定性,并在端点受到破坏后减轻网络端点的损坏。 本技术涉及确定数据中心中的第一端点的关键性排序和次要值。 可以将关键性排名和次要值组合以形成第一端点的优先级排序,然后将其与第二端点的优先级排序进行比较,以确定第一端点或第二端点是否应首先被分类。
-
公开(公告)号:US20160359701A1
公开(公告)日:2016-12-08
申请号:US15173466
申请日:2016-06-03
Applicant: Cisco Technology, Inc.
Inventor: Jackson Ngoc Ki Pang , Michael Standish Watts , Ali Parandehgheibi
IPC: H04L12/26
CPC classification number: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/566 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/2007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/10 , H04L67/1002 , H04L67/12 , H04L67/16 , H04L67/22 , H04L67/36 , H04L67/42 , H04L69/16 , H04L69/22 , H04W72/08 , H04W84/18
Abstract: Presenting data flows in a parallel coordinate chart. The parallel coordinate chart allows a user to search for data flows. Exploration occurs by providing visualization of a searched data flow(s) to ascertain the typical from the atypical flow. Each data flow represented in a parallel coordinate chart is measured against various attributes represented among parallel lines. A single chart could be used to visualize thousands of flows at once. Overlaying data flows in on top of each other in the parallel coordinate chart can reveal a concentration of flows. The concentration of flows allows a user to visualize, among other things, the relationship between the flows and observe typical and atypical flows. Additionally the user can filter specific dimensions (to observe joint distributions between a pair of dimensions—combined probabilities of what is occurring between two dimensions) or a specific window of time.
Abstract translation: 以平行坐标图表示数据流。 并行坐标图允许用户搜索数据流。 通过提供搜索到的数据流的可视化来确定来自非典型流的典型性来进行勘探。 以平行线表示的各种属性测量以平行坐标图表示的每个数据流。 可以使用单个图表来一次显示数千个流量。 平行坐标图中叠加的数据流可以显示出流量的集中。 流量的集中允许用户除了别的以外可视化流动之间的关系,并观察典型和非典型的流动。 此外,用户可以过滤特定维度(以观察一对维度之间的联合分布 - 两维之间发生的组合概率)或特定时间窗口。
-
公开(公告)号:US20160359658A1
公开(公告)日:2016-12-08
申请号:US15170765
申请日:2016-06-01
Applicant: Cisco Technology, Inc.
Inventor: Navindra Yadav , Abhishek Ranjan Singh , Anubhav Gupta , Shashidhar Gandham , Jackson Ngoc Ki Pang , Shih-Chun Chang , Hai Trong Vu
CPC classification number: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/566 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/2007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/10 , H04L67/1002 , H04L67/12 , H04L67/16 , H04L67/22 , H04L67/36 , H04L67/42 , H04L69/16 , H04L69/22 , H04W72/08 , H04W84/18
Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.
Abstract translation: 用于更新在多层虚拟化环境中部署的传感器中的配置的系统,方法和计算机可读介质。 在一些示例中,系统可以跟踪网络中的传感器和收集器的信息。 响应于确定特定收集器变得不可用(例如,特定收集器关闭,离线或不被支持),系统可以确定与特定收集器相对应的受影响的传感器,确定网络的活动收集器中的每个的新收集器 受影响的传感器,并动态更新受影响的传感器的配置和设置,以便在受影响的传感器上保持适当的收集器到传感器的映射和其他设置。
-
公开(公告)号:US20160350301A1
公开(公告)日:2016-12-01
申请号:US14722914
申请日:2015-05-27
Applicant: Dell Software, Inc.
Inventor: Tarun K. Tripathy , Murali Bashyam
CPC classification number: G06F16/2255 , G06F11/1453 , G06F16/137 , G06F16/1744 , G06F16/1748 , G06F16/1752 , G06F16/1756 , G06F17/2705
Abstract: Techniques and mechanisms described herein facilitate the strengthening of a data fingerprint. According to various embodiments, a data stream may be parsed into a plurality of data chunks. A hash function may be applied to each of the data chunks to determine a respective data chunk hash value. A respective data chunk fingerprint for each of the plurality of data chunks may be transmitted to a remote server. Each data chunk fingerprint may include the respective data chunk hash value and one or more respective intermediate hash values.
Abstract translation: 这里描述的技术和机制有助于加强数据指纹。 根据各种实施例,数据流可以被解析成多个数据块。 散列函数可以应用于每个数据块以确定相应的数据块哈希值。 可以将多个数据块中的每一个的相应数据块指纹发送到远程服务器。 每个数据块指纹可以包括相应的数据块哈希值和一个或多个相应的中间散列值。
-
公开(公告)号:US20160285905A1
公开(公告)日:2016-09-29
申请号:US15171256
申请日:2016-06-02
Applicant: KOREA INTERNET & SECURITY AGENCY
Inventor: Byung Ik KIM , Tai Jin LEE , Hong Koo KANG , Seul Gi LEE , Hyei Sun CHO
IPC: H04L29/06
CPC classification number: H04L63/1425 , G06F16/137 , G06F16/9566 , H04L51/08 , H04L63/1416 , H04L63/145 , H04W4/12 , H04W4/60 , H04W88/184
Abstract: A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company servers to produce text message detection information, to collect URL information based on real-time search words provided by search portals to produce URL detection information, and to collect basic information of application files being sold in application market servers to produce APK detection information; and a detection information DB adapted to receive, store and manage the text message detection information, the URL detection information and the APK detection information produced from the mobile incident collection server.
-
公开(公告)号:US20160253322A1
公开(公告)日:2016-09-01
申请号:US15028554
申请日:2013-10-18
Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
Inventor: Qingsong Li
IPC: G06F17/30
CPC classification number: G06F16/2255 , G06F12/0864 , G06F16/137
Abstract: Methods and apparatuses for data storage and retrieval have been provided. More specifically, a hash table is provided. The hash table comprises a first level slot array with a constant number of slots and at least one second level slot array with a variant number of slots. Each slot of the first level slot array is associated with a hash code range, and each slot of the first level slot array is linked to at most one second level slot array. Various operations, such as PUT, GET, RANGE_SEARCH of the hash table have been described. Moreover, a hash method has been provided for network management information to use the proposed hash table.
Abstract translation: 已经提供了用于数据存储和检索的方法和装置。 更具体地,提供了散列表。 哈希表包括具有恒定数量的时隙的第一级时隙阵列和具有不同数目的时隙的至少一个第二级时隙阵列。 第一级时隙阵列的每个时隙与散列码范围相关联,并且第一级时隙阵列的每个时隙被链接到至多一个第二级时隙阵列。 已经描述了各种操作,例如散列表的PUT,GET,RANGE_SEARCH。 此外,已经提供了一种用于网络管理信息以使用所提出的散列表的哈希方法。
-
-
-
-
-
-
-
-
-