Intrusion detection
    2.
    发明授权

    公开(公告)号:US12111935B2

    公开(公告)日:2024-10-08

    申请号:US18052085

    申请日:2022-11-02

    发明人: Kenneth Byrne

    摘要: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.

    Performance scale testing with I/O reuse

    公开(公告)号:US12105613B2

    公开(公告)日:2024-10-01

    申请号:US17234017

    申请日:2021-04-19

    IPC分类号: G06F11/34 G06F3/06 G06F11/30

    摘要: A host performs benchmark I/O operations for a storage system by an application on the host formulating a performance test command, providing the performance test command to a channel subsystem layer of the host that actuates communication hardware that provides signals to the storage system, and performing a plurality of benchmark I/O operations at the channel subsystem layer in response to a single performance test command by actuating the communication hardware that provides signals to the storage system. The single performance test command may result in actuating the communication hardware to read and write data at a plurality of addresses of the storage system. The channel subsystem layer may perform the plurality of benchmark I/O operations without receiving any additional data or commands from any applications on the host. A dispatch program that runs on the channel subsystem layer may receive operational data and may actuate the communication hardware.

    Cold tiering microservice for deduplicated data

    公开(公告)号:US12093136B2

    公开(公告)日:2024-09-17

    申请号:US16880216

    申请日:2020-05-21

    摘要: One example method includes identifying objects that each include one or more segments to be transferred from a source storage tier to a target storage tier, determining a total amount of data to be transferred, using a tiering controller to create worker nodes operable to transfer the segments to the target storage tier, where a number of worker nodes created is based on the amount of data, transferring, from the source storage tier to the target storage tier, only those segments of the objects not already present in the target storage tier, and the transferring of the segments is performed by the worker nodes, and for each of the objects, placing metadata associated with that object in a bucket.

    Queue management system and method

    公开(公告)号:US12086641B2

    公开(公告)日:2024-09-10

    申请号:US17243353

    申请日:2021-04-28

    IPC分类号: G06F9/50 G06F9/48

    摘要: A method, computer program product, and computing system for: receiving an indication that a specific request has been completely processed on an IT computing device; analyzing a plurality of queued requests within a pending queue of the IT computing device to identify a target queued request for processing based, at least in part, upon: a root request limit of the IT computing device, a global request limit of the IT computing device, and a sibling status of the specific request.

    Protecting databases in a clusterless availability group

    公开(公告)号:US12066901B2

    公开(公告)日:2024-08-20

    申请号:US17154268

    申请日:2021-01-21

    摘要: A determination is made that a backup of a database in an availability group provided by a relational database management system (RDBMS) should be performed. The availability group includes a node functioning as a primary node and hosting a primary replica of the database and one or more other nodes functioning as secondary nodes and hosting secondary replicas of the database. The availability group is a clusterless availability group in which the one or more other nodes functioning as secondary nodes are not available as automatic failover targets should the primary node become unavailable. A command is issued to a node in the availability group to obtain a globally unique identifier (GUID) of the availability group. The node is instructed to index a backup of the database against the GUID of the availability group.