-
公开(公告)号:US10917484B2
公开(公告)日:2021-02-09
申请号:US16431978
申请日:2019-06-05
Applicant: International Business Machines Corporation
Inventor: Sandeep Bazar , Sandeep R. Patil , Sachin C. Punadikar
IPC: H04L29/08
Abstract: A computer system receives digital content for communication to a user. Digital fingerprints are calculated from the digital content. The fingerprints are compared to identify redundant digital content. Digital identifications associated with the digital fingerprints are communicated to a user device to determine whether the digital content exists in local storage.
-
公开(公告)号:US20200218697A1
公开(公告)日:2020-07-09
申请号:US16239793
申请日:2019-01-04
Applicant: International Business Machines Corporation
Inventor: Deepak Ghuge , Chetan R Kulkarni , Sandeep R. Patil
IPC: G06F16/178 , G06F16/17 , G06F16/13
Abstract: A computer-implemented method according to one embodiment includes compiling log data from all nodes of a cluster, retrieving a timestamp table stored within the cluster, optimizing the timestamp table, and adjusting the log data from all the nodes of a cluster, utilizing the timestamp table.
-
73.
公开(公告)号:US20200218464A1
公开(公告)日:2020-07-09
申请号:US16242955
申请日:2019-01-08
Applicant: International Business Machines Corporation
Inventor: Sandeep R. Patil , Sasikanth Eda , Abhishek Jain , Digvijay Ukirde
IPC: G06F3/06
Abstract: A computer-implemented method, according to one embodiment, includes: receiving one or more suggestions which correspond to placement of data in storage, where the one or more suggestions are based on data workload characteristics. The one or more suggestions are used to identify portions of actual data stored in actual storage which correspond to the one or more suggestions. For each of the identified portions of the actual data stored in the first tier, the one or more suggestions is further used to determine whether to transfer the given identified portion of the actual data to the second tier. Moreover, in response to determining to transfer at least one of the identified portions of the actual data to the second tier, one or more instructions are sent to transfer the at least one of the identified portions of the actual data from the first tier to the second tier.
-
公开(公告)号:US10694435B2
公开(公告)日:2020-06-23
申请号:US16353945
申请日:2019-03-14
Applicant: International Business Machines Corporation
Inventor: Gandhi Sivakumar , Rajan Dilavar Mithani , Sandeep R. Patil , Sasikanth Eda , Abhishek Jain
Abstract: A computer-implemented method, according to one embodiment, includes: receiving, by the computer, information. The information that is received includes: an expiry time which corresponds to a communication request, and communication resources associated with the communication request. The communication resources further include a channel and/or a spectrum band which correspond to the communication request. The expiry time is packaged with the communication resources by the computer. Furthermore, the packaged expiry time and communication resources is passed, by the computer, to devices which correspond to each of one or more identities associated with the communication request. Other systems, methods, and computer program products are described in additional embodiments.
-
公开(公告)号:US10606763B2
公开(公告)日:2020-03-31
申请号:US15636155
申请日:2017-06-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Abhinay R. Nagpal , Sandeep R. Patil , Sri Ramanathan , Divyank Shukla , Matthew B. Trevathan
IPC: G06F12/14 , H04L29/06 , G06F3/06 , G06F12/1009
Abstract: Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.
-
公开(公告)号:US20200076922A1
公开(公告)日:2020-03-05
申请号:US16121399
申请日:2018-09-04
Applicant: International Business Machines Corporation
Inventor: Sachin C. Punadikar , Sandeep R. Patil , Pravin A. Junnarkar , Sudhir Alluri , Malahal Naineni
Abstract: Apparatuses, methods, and computer program products are provided for receiving a remote procedure call (RPC) processing request having a priority value from a client device and processing tasks from multiple clients according to the priority values. In certain embodiments, the apparatuses, methods, and computer program products receive a remote request, compare the priority value of the received RPC processing request with priority values of pending RPC processing requests, and assign the received RPC processing request to a queue of a plurality of queues in response to the comparing.
-
公开(公告)号:US10579436B2
公开(公告)日:2020-03-03
申请号:US15836210
申请日:2017-12-08
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bhushan P. Jain , Sandeep R. Patil , Sri Ramanathan , Matthew B. Trevathan , Ujwala P. Tulshigiri
Abstract: Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user. The method further includes transferring data of the user from a home data server near a home location of the user to the data server near the travel location.
-
公开(公告)号:US10565016B2
公开(公告)日:2020-02-18
申请号:US15270391
申请日:2016-09-20
Applicant: International Business Machines Corporation
Inventor: Duane M. Baldwin , Sasikanth Eda , John T. Olson , Sandeep R. Patil
IPC: G06F9/50
Abstract: A present invention embodiment manages resources of a distributed system to perform computational tasks within a specified time interval. A received object is classified into a type of computational processing, and a quantity of objects is maintained for each type. An execution time for processing a single object is estimated based on a corresponding computation resource template. A total execution time for the quantity of objects of a type of computational processing is determined based on the estimated execution time. In response to the total execution time exceeding a user-specified time interval, an amount of resources of the distributed system is determined to process the quantity of objects of the type within the user-specified time interval. Nodes of the distributed system with objects classified in the type use the determined amount of resources to process the quantity of objects for the type within the user-specified time interval.
-
公开(公告)号:US20200026611A1
公开(公告)日:2020-01-23
申请号:US16223509
申请日:2018-12-18
Applicant: International Business Machines Corporation
Inventor: Shekhar Amlekar , Sasikanth Eda , Karthik Iyer , Sandeep R. Patil , Sachin C. Punadikar
Abstract: A computer includes a storage segment fully allocated to an application. The storage segment initially includes a repeating initialization data pattern there within. After the application begins its workload, the application writes application data to a portion of the storage segment. A snapshot application takes a snapshot of the storage segment. After the snapshot, the application generates a post-snapshot-write to the storage segment. The snapshot application determines whether the post-snapshot-write modifies application data or modifies the repeating initialization data pattern. If the post-snapshot-write modifies the repeating initialization data pattern within the storage segment, the snapshot application blocks the repeating initialization data pattern from being copied and moved which resultantly blocks modification of the snapshot. If the post-snapshot-write modifies application data, the snapshot application copies and moves the application data to a destination storage location which resultantly modifies the snapshot to identify the destination storage location of the moved application data.
-
公开(公告)号:US10528527B2
公开(公告)日:2020-01-07
申请号:US15809571
申请日:2017-11-10
Applicant: International Business Machines Corporation
Inventor: Shah M. R. Islam , John T. Olson , Sandeep R. Patil , Riyazahamad M. Shiraguppi
IPC: G06F16/178 , G06F16/172
Abstract: A computing environment includes a home site and a cache site with nonhomogeneous thin-provisioned storage configurations. A file management system updates files stored at the cache site. Each updated file has an updated file size and a pre-update file size. When a resynchronization is needed between the cache site and the home site, for example due to an extended communication failure, the storage requirement changes for the updated files are calculated and a notification is sent to the home site. The notification identifies the updated files and the storage requirement changes. The home site sends a reply to the cache site. The reply identifies which files are approved for immediate processing. The cache site transfers resynchronization data for the approved files to the home site, and delays transferring resynchronization data for the unapproved files until subsequent replies from the home site indicate that the previously unapproved files are now approved.
-
-
-
-
-
-
-
-
-