-
公开(公告)号:US10148745B2
公开(公告)日:2018-12-04
申请号:US15252439
申请日:2016-08-31
发明人: Jai Gahlot , Abhijit Toley
摘要: Disclosed herein are methods, systems, and processes to perform application aware input/output (I/O) fencing operations. A determination is made that an instance of an application is executing on a node that is part of a cluster. In response to the determination that the instance of the application is executing on the node, an identifier that associates the instance of the application and the node on which the instance of the application is executing is generated for the instance of the application. The identifier is installed on one or more coordination points.
-
62.
公开(公告)号:US10140370B1
公开(公告)日:2018-11-27
申请号:US15490051
申请日:2017-04-18
摘要: A computer-implemented method for maintaining encrypted search indexes on third party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10083176B1
公开(公告)日:2018-09-25
申请号:US15056616
申请日:2016-02-29
发明人: Malay Desai , Medha Shewale , Venkat Rangan
IPC分类号: G06F17/30
CPC分类号: G06F16/93 , G06F16/31 , G06F16/316 , G06F16/334 , G06F16/3344 , G06F16/3347
摘要: A set of trigrams can be generated for each document in a plurality of documents processed by an e-discovery system. Each trigram in the set of trigrams for a given document is a sequence of three terms in the given document. A set of trigrams for each similar document is then determined based on the set of trigrams for the original document. To facilitate identification of the similar documents, a full text index is then generated for the plurality of documents and the set of trigrams for each document are indexed into the full text index, as individual terms. Queries can be generated into the full text index based on trigrams of a document to determine other similar or near-duplicate documents. After a set of potentially similar documents are identified, a separate distance criteria can be applied to evaluate the level of similarity between the two documents in an efficient way.
-
公开(公告)号:US10031816B2
公开(公告)日:2018-07-24
申请号:US15282626
申请日:2016-09-30
发明人: Bin Liu , Xianbo Zhang , Shuai Cheng , Cheng Shan , Wen Feng Jiang
IPC分类号: G06F11/14
摘要: The disclosed computer-implemented method for healing images in deduplication storage may include (i) detecting that a data segment stored within deduplication storage is corrupted by executing an algorithm on the data segment to generate a numerical identifier for the data segment and determining that the numerical identifier does not match a previously stored numerical identifier for the data segment, (ii) checking, during a backup operation, whether a digital fingerprint of a data segment of an image being backed up matches a digital fingerprint of the corrupted data segment that was taken prior to corruption and that is already stored within the deduplication storage, and (iii) appending the data segment from the image being backed up to a container that already contains the corrupted data segment rather than replacing the corrupted data segment. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10002050B1
公开(公告)日:2018-06-19
申请号:US14745501
申请日:2015-06-22
发明人: Lei Hu Zhang
CPC分类号: G06F11/1453 , G06F11/1448 , G06F16/1748
摘要: The disclosed computer-implemented method for improving rehydration performance in data deduplication systems may include (1) identifying a set of data containers that include data segments referenced by a backup image stored in a data deduplication system, (2) determining the total number of data segments referenced by the backup image that are included in a data container within the set of data containers, (3) determining that the total number of data segments that are referenced by the backup image and included in the data container is below a certain threshold, and then (4) rebasing the data segments that are referenced by the backup image and included in the data container to at least one other data container to decrease the total number of data containers that include the data segments referenced by the backup image. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US09998394B2
公开(公告)日:2018-06-12
申请号:US14833590
申请日:2015-08-24
发明人: Mukund Agrawal , Sachin Dravid , Deepak Patil
IPC分类号: G06F15/173 , H04L12/925 , H04L12/26 , H04L29/08 , H04L12/835
CPC分类号: H04L47/722 , H04L43/0876 , H04L43/16 , H04L47/10 , H04L47/30 , H04L49/9052 , H04L67/1097
摘要: The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US09992118B2
公开(公告)日:2018-06-05
申请号:US14524656
申请日:2014-10-27
发明人: Yingsong Jia , Hongxing Guan , Xinbao Jin
IPC分类号: G06F15/173 , H04L12/801 , H04L12/26 , H04L12/805
CPC分类号: H04L47/12 , H04L43/0852 , H04L47/36 , H04L47/365
摘要: A system and method for efficient transfer of data over a network. A data source and a destination are coupled to one another via a network. The data source is configured to transmit data to the destination and determine a network latency associated with the transmission. In response to determining a first transmission parameter may not be optimized, the source is configured to modify the first transmission parameter and evaluate its effect on data throughput. The source may repeat such modifications as long as throughput is increased. Once the first transmission parameter is deemed optimized, the source may perform a similar procedure for a second transmission parameter. In various embodiments, the first transmission parameter may correspond to a packet size and the second transmission parameter may correspond to a number of streams being processed by the source.
-
公开(公告)号:US09977716B1
公开(公告)日:2018-05-22
申请号:US14754603
申请日:2015-06-29
发明人: Michael A. Payne , Steven R. DeVos
CPC分类号: G06F11/1451 , G06F11/3065 , G06F17/30088
摘要: Techniques relating to performing an incremental backup of a database relative to a previous backup are disclosed. The incremental backup may include initiating monitoring of a dirty list indicative of one or more portions of the database that have been modified since the previous backup, causing a reset of the dirty list, obtaining a copy of the dirty list, and backing up only portions of the database identified by the copy of the dirty list. The copy may be representative of the dirty list immediately prior to the reset.
-
公开(公告)号:US09946559B1
公开(公告)日:2018-04-17
申请号:US13372026
申请日:2012-02-13
CPC分类号: G06F9/455 , G06F9/45533 , G06F11/1448 , G06F11/1453
摘要: Techniques for managing virtual machine backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for managing virtual machine backups comprising opening a file containing a virtual disk of a virtual machine, parsing the file to identify one or more partitions of the virtual disk, determining file system type for each of one or more partitions, identifying a boot partition in the file, parsing, using at least one computer processor, file system information of the boot partition to identify volume information; and generating volume composition information using the identified volume information.
-
公开(公告)号:US09912783B2
公开(公告)日:2018-03-06
申请号:US15010487
申请日:2016-01-29
发明人: Vikas Goel
CPC分类号: H04L67/42 , G06F21/54 , G06F21/629 , H04L63/0227 , H04L67/32
摘要: Disclosed herein are methods, systems, and processes to secure internal services in a distributed environment. A service call initiated by a client process of a client is intercepted. In this example, the service call is a request for an internal service provided by a server deployed in a target appliance. The client is deployed in a source appliance. The service call includes an identifier, and the identifier identifies the internal service. If one or more rules are specified for the identifier, a service packet is generated by multiplexing client information associated with the client process as well as information in the service call. The service packet is forwarded to the target appliance.
-
-
-
-
-
-
-
-
-