摘要:
A method is used in managing data deduplication in storage systems. A data deduplication process is performed by applying a deduplicating technique to data of a deduplication domain. The data deduplication process is scheduled based on a priority. Characteristics of data deduplication performed by the data deduplication process are evaluated. Based on the evaluation, execution of the data deduplication process is effected.
摘要:
A method, computer program product, and computing system for processing one or more data chunks on a host server. The one or more data chunks are destined for storage within a portion of a data array coupled to the host server. The one or more data chunks are stored within a host cache system included within the host server. Storage criteria concerning the portion of a data array is reviewed. The storage criteria includes an array bandwidth allotment that defines a maximum bandwidth between the host server and the portion of the data array. The one or more data chunks are written to the portion of the data array based, at least in part, upon the storage criteria.
摘要:
A technique for managing storage device rebuild in a data storage system is disclosed. A RAID group having multiple drives with unique identifiers is provided. A drive in the RAID group that becomes inactive is identified and a timer is activated. A persistent bitmap is maintained, wherein the bitmap includes a plurality of bits and each bit indicates whether a corresponding portion of the identified drive has changed as a result of an I/O request issued while the drive is identified as inactive. If the inactive drive is subsequently identified as active before the timer expires, the timer is stopped and a rebuild procedure initiated, wherein only portions of the identified drive corresponding to bits in the bitmap are rebuilt. The bitmap is cleared and the RAID group is marked as healthy. If the timer expires before the identified drive become active, a full rebuild procedure is initiated.
摘要:
Example embodiments of the present invention provide a method and an apparatus for problem analysis using a causal map. The method includes building a problem domain corresponding to a datacenter management problem and building a causal map corresponding to the problem domain. A causal event of the datacenter management problem then may be inferred according to the causal map.
摘要:
Checksum values are generated and used to verify the data integrity. A client executing in a parallel computing system stores a data chunk to a shared data object on a storage node in the parallel computing system. The client determines a checksum value for the data chunk; and provides the checksum value with the data chunk to the storage node that stores the shared object. The data chunk can be stored on the storage node with the corresponding checksum value as part of the shared object. The storage node may be part of a Parallel Log-Structured File System (PLFS), and the client may comprise, for example, a Log-Structured File System client on a compute node or burst buffer. The checksum value can be evaluated when the data chunk is read from the storage node to verify the integrity of the data that is read.
摘要:
A processing device in one embodiment comprises a processor coupled to a memory and is configured to detect at least one subject in a captured image, to provide a notification to the subject regarding the captured image, and to permit the subject to consent to a particular use of the captured image by another party. The providing of the notification is controlled based on at least one of a notification threshold and an automatic consent condition. Additionally or alternatively, at least portions of the captured image are provided to the subject for review only under certain conditions, such as upon receipt of a verification that a subject device associated with the subject was sufficiently near a location at which the image was captured at a time at which the image was captured, or responsive to a result of a comparison of the captured image to known information characterizing the subject.
摘要:
An improved technique involves providing protection of secrets by splitting the secret into secret shares and providing tokens for each secret share. Along these lines, a terminal splits a secret such as a credit card number into shares. The terminal then transmits each share to a separate and distinct token server. Each token server, upon receiving a secret share, generates a corresponding token and sends that token to an application server. In some cases, when a user at the application server requires access to the secret, the application server sends each token to the token server form which the token was generated. The token servers each send, in return, a secret share to the application server. The application server combines the secret shares to recover the secret.
摘要:
Techniques are presented for event-based host registration. Continuously performed standard path testing operations are able to cause an event signal upon detection of a newly-available path, and upon receiving such an event signal, a host is able to perform host registration along the newly-available path, obviating the need to periodically send out registration commands while simultaneously minimizing latency.
摘要:
A host-based memory is maintained for a host computing device. Data obtained from a storage array in response to one or more read requests is stored in the host-based memory. The storage array includes an array-based memory and is configured to perform one or more data pre-fetch operations. The host computing device monitors for the occurrence of a set of sequential read requests. The set of sequential read requests is sent from the host computing device to the storage array when one or more read requests of the set of sequential read requests match data stored in the host-based memory. Thus, the storage array is enabled to perform one or more data pre-fetch operations in accordance with the array-based memory and the set of sequential read requests.
摘要:
A processing device comprises a processor coupled to a memory and is configured to determine a first set of features from domain name system (DNS) information, the first set of features being defined over a domain, and to determine a second set of features from the DNS information, the second set of features being defined over internet protocol (IP) addresses returned for the domain. The processing device is further configured to compute a fast-flux score based on the first and second sets of features, and to utilize the fast-flux score to characterize fast-flux activity relating to the domain. For example, the processing device can be configured to compare the fast-flux score to a threshold, and to generate an indicator of the presence or absence of fast-flux activity based on a result of the comparison. The processing device may be implemented in a computer network or network security system.