Application aware input/output fencing

    公开(公告)号:US10148745B2

    公开(公告)日:2018-12-04

    申请号:US15252439

    申请日:2016-08-31

    IPC分类号: H04L29/08 H04L12/24

    摘要: Disclosed herein are methods, systems, and processes to perform application aware input/output (I/O) fencing operations. A determination is made that an instance of an application is executing on a node that is part of a cluster. In response to the determination that the instance of the application is executing on the node, an identifier that associates the instance of the application and the node on which the instance of the application is executing is generated for the instance of the application. The identifier is installed on one or more coordination points.

    Systems and methods for maintaining encrypted search indexes on third-party storage systems

    公开(公告)号:US10140370B1

    公开(公告)日:2018-11-27

    申请号:US15490051

    申请日:2017-04-18

    IPC分类号: G06F17/30 G06F21/60 H04L9/06

    摘要: A computer-implemented method for maintaining encrypted search indexes on third party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.

    Methods and systems to efficiently find similar and near-duplicate emails and files

    公开(公告)号:US10083176B1

    公开(公告)日:2018-09-25

    申请号:US15056616

    申请日:2016-02-29

    IPC分类号: G06F17/30

    摘要: A set of trigrams can be generated for each document in a plurality of documents processed by an e-discovery system. Each trigram in the set of trigrams for a given document is a sequence of three terms in the given document. A set of trigrams for each similar document is then determined based on the set of trigrams for the original document. To facilitate identification of the similar documents, a full text index is then generated for the plurality of documents and the set of trigrams for each document are indexed into the full text index, as individual terms. Queries can be generated into the full text index based on trigrams of a document to determine other similar or near-duplicate documents. After a set of potentially similar documents are identified, a separate distance criteria can be applied to evaluate the level of similarity between the two documents in an efficient way.

    Systems and methods for healing images in deduplication storage

    公开(公告)号:US10031816B2

    公开(公告)日:2018-07-24

    申请号:US15282626

    申请日:2016-09-30

    IPC分类号: G06F11/14

    摘要: The disclosed computer-implemented method for healing images in deduplication storage may include (i) detecting that a data segment stored within deduplication storage is corrupted by executing an algorithm on the data segment to generate a numerical identifier for the data segment and determining that the numerical identifier does not match a previously stored numerical identifier for the data segment, (ii) checking, during a backup operation, whether a digital fingerprint of a data segment of an image being backed up matches a digital fingerprint of the corrupted data segment that was taken prior to corruption and that is already stored within the deduplication storage, and (iii) appending the data segment from the image being backed up to a container that already contains the corrupted data segment rather than replacing the corrupted data segment. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for improving rehydration performance in data deduplication systems

    公开(公告)号:US10002050B1

    公开(公告)日:2018-06-19

    申请号:US14745501

    申请日:2015-06-22

    发明人: Lei Hu Zhang

    摘要: The disclosed computer-implemented method for improving rehydration performance in data deduplication systems may include (1) identifying a set of data containers that include data segments referenced by a backup image stored in a data deduplication system, (2) determining the total number of data segments referenced by the backup image that are included in a data container within the set of data containers, (3) determining that the total number of data segments that are referenced by the backup image and included in the data container is below a certain threshold, and then (4) rebasing the data segments that are referenced by the backup image and included in the data container to at least one other data container to decrease the total number of data containers that include the data segments referenced by the backup image. Various other methods, systems, and computer-readable media are also disclosed.

    System and method for optimizing transportation over networks

    公开(公告)号:US09992118B2

    公开(公告)日:2018-06-05

    申请号:US14524656

    申请日:2014-10-27

    摘要: A system and method for efficient transfer of data over a network. A data source and a destination are coupled to one another via a network. The data source is configured to transmit data to the destination and determine a network latency associated with the transmission. In response to determining a first transmission parameter may not be optimized, the source is configured to modify the first transmission parameter and evaluate its effect on data throughput. The source may repeat such modifications as long as throughput is increased. Once the first transmission parameter is deemed optimized, the source may perform a similar procedure for a second transmission parameter. In various embodiments, the first transmission parameter may correspond to a packet size and the second transmission parameter may correspond to a number of streams being processed by the source.

    Incremental backup system
    68.
    发明授权

    公开(公告)号:US09977716B1

    公开(公告)日:2018-05-22

    申请号:US14754603

    申请日:2015-06-29

    摘要: Techniques relating to performing an incremental backup of a database relative to a previous backup are disclosed. The incremental backup may include initiating monitoring of a dirty list indicative of one or more portions of the database that have been modified since the previous backup, causing a reset of the dirty list, obtaining a copy of the dirty list, and backing up only portions of the database identified by the copy of the dirty list. The copy may be representative of the dirty list immediately prior to the reset.

    Securing internal services in a distributed environment

    公开(公告)号:US09912783B2

    公开(公告)日:2018-03-06

    申请号:US15010487

    申请日:2016-01-29

    发明人: Vikas Goel

    摘要: Disclosed herein are methods, systems, and processes to secure internal services in a distributed environment. A service call initiated by a client process of a client is intercepted. In this example, the service call is a request for an internal service provided by a server deployed in a target appliance. The client is deployed in a source appliance. The service call includes an identifier, and the identifier identifies the internal service. If one or more rules are specified for the identifier, a service packet is generated by multiplexing client information associated with the client process as well as information in the service call. The service packet is forwarded to the target appliance.