Abstract:
A method and system for managing stored data on a computer network organizes data into logical volumes, and each logical volume has a friendly name associated with it. A domain controller keeps track of the friendly names of the logical volumes and associates those friendly names with the actual physical paths of the logical volumes. When a client computer on the network wishes to access a logical volume, it sends a look-up request having the friendly name to the domain controller. The domain controller may fulfill the request by sending the path of the logical volume to the client computer.
Abstract:
A system and method for purposing a computing device is disclosed. A management controller system is used to copy a system image from a library of system images to a target partition of the computer to be repurposed. The system image may include a configured copy of an operating system and an application program. The system image may also include logic for generating and assigning a unique security identifier to the computer. The invention includes a managed node service for monitoring the status of the computer and for performing some of the necessary steps in purposing the computer. Additionally, the invention includes facilities for loading a default operating system on the computer when the computer is first connected to a network.
Abstract:
A method and system for recovering from a system failure wherein the failed system is restored to a new system that has different hardware. Hardware state is preserved during a backup process, and following a failure, a restore is performed to the extent possible using that hardware state but on a system having a different hardware configuration. Rules are provided for handling the differences through selective merging, arranging, and replacement of data, with the logic and work performed transparently to the user. Hardware state includes hard disk configuration information, the location (partition) of the operating system, devices installed on the system and any additional drivers to load. When restored, for hardware that is identical, the hardware state is restored as specified in the file. If the hardware state is not identical, then a set of rules are used to restore the hardware state. Via these rules, hard disks may be restored to differently sized or a different number of hard disks, disk mirror pairs may be handled appropriately, and so on. Critical devices that are required to restore the system are merged as necessary during the restore process, while new or different non-critical devices are preserved during the restore process for future use. Updated drivers may be used.
Abstract:
A system and related methods for automatically configuring a computing system includes receiving an identifier associated with a computing system, identifying the authorized and available resources for the computing system, assessing the current resources of the computing system, and downloading, installing and configuring zero or more needed resources on the computing system based, at least in part, on the assessment.
Abstract:
The innovation enables generation of an index of cloud-based resources (e.g., data, services, applications). The index can be used to retrieve a subset of the cloud-based resources by analyzing a user-generated or standing query. ‘Identity’ and contextual factors can be incorporated to enable rich indexing as well as subsequent retrieval of meaningful resources. The cloud-based resources can be indexed and/or searched in accordance with diverse criteria including, but not limited to, type, size, data created, date modified, author core identity, object size, etc. As well, the innovation can provide for dynamically indexing and/or searching resources in accordance with current contextual factors including, but not limited to, author current acting capacity (e.g., current identity), current engaged activity of a user, location, time, date, etc. All of these criteria can facilitate indexing and categorizing of the resources for later retrieval and rendering via a rich index view.
Abstract:
A method and system for managing image files is provided. The image files include a plurality of streams such as a control stream, a data stream, a bitmap stream, and a cluster map stream. An audit trail stream, properties stream and fix-up stream may also be provided. An image driver translates requests from the operating system so that the image can be read, edited or otherwise manipulated.
Abstract:
An apparatus and method to automate the deployment, provisioning, and management of a programmable device for the life cycle states of the programmable device is presented. The system includes an automation interface for a developer to develop modules to aid in the automation of the deployment, provisioning, and management of the programmable device and for a user to direct the system to enter into a state of the life cycle. A controller moves the programmable device into states of the life cycle in response to triggering events occurring.
Abstract:
A method for transporting an image file over a network is provided. The network may include two or more computers, and the image file may include a control stream, a data stream, and a cluster map stream. The method may include parsing the image file into two or more segments. A first segment may include the control stream, the cluster map stream and a first portion of the data stream. A second segment includes a second portion of the data stream. The method may also include sending the first segment from a first computer to a second computer, and sending the second segment from the first computer to the second computer.
Abstract:
A system and method that facilitates and effectuates communications between disparate clients that reside in a network topology (e.g., cloud). The system and method provides a component that receives one or more prospective end points, a set of desired communication criteria/characteristics, and desired content extant on one of the clients that reside on network topology. Additionally, the system and method provides a component that establishes communications pathways to one or more prospective end points or to subsequently identified end points to facilitate transfer of desired content from the end point to a requesting client.
Abstract:
Innovative aspects provided herein pertain to digital rights management (DRM) and/or enforcement in conjunction with remote network clouds and services. Digital rights management licenses/rights/policies can be applied to personal files to facilitate worry free remote storage and/or file sharing. These rights can be identity-centric rather than machine centric, thereby facilitating access and usage from any network device anywhere. Various mechanisms are also disclosed to deter assorted uses of content and/or encourage rights acquisition as an alternative or in addition to technologically prohibitive means. Additionally, a system and method are provided that can afford a frictionless marketplace for file distribution, wherein content is protected and freely distributed and identity-centric rights can be purchased to access the content.