Abstract:
Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.
Abstract:
Content-based navigation of an electronic device includes receiving supplemental content to an electronic book. The supplemental content is created separately from the electronic book. The content-based navigation also includes associating an identifier of the electronic book with the supplemental content, storing the supplemental content with the identifier in a storage device, and creating an index to the supplemental content that is searchable by the identifier of the electronic book. The content-based navigation further includes providing end user devices with access to the supplemental content in the storage device via the index.
Abstract:
Methods and systems for journaling and integrity in mobile clouded collaborative spaces are provided. A method includes receiving input data of a mobile device, caching the input data to a remote device, and receiving information associated with the mobile device. The method further includes sending a journaling mode command to the mobile device which instructs the mobile device to journal the input data, based on the information associated with the mobile device.
Abstract:
For limiting data loss due to ATI or ATE, an apparatus may include a storage module, a tracking module, and a refresh module. The storage module is configured to store a risk value for a tracked storage division. The risk value indicates a risk level of data loss for the tracked storage division. The tracked storage division is one of a plurality of storage divisions of a data storage device. The tracking module is configured to update the risk value to indicate a higher risk level based on a write to a physically proximal storage division. The physically proximal storage division is within an interference range of the tracked storage division. The tracking module is configured to reset the risk value based on a write to the tracked storage division. The refresh module is configured to refresh the tracked storage division based on the risk value meeting a threshold value.
Abstract:
A mechanism is provided in a data processing system for on-demand caching in a wide area network (WAN) separated distributed file system or clustered file system. The mechanism monitors file access by a plurality of cache sites in the WAN separated distributed file system or clustered file system. The mechanism identifies access patterns by cache sites. The mechanism shares the access patterns with the plurality of cache sites. A given cache site within the plurality of cache sites combines the access patterns with local access information and identifies files to pre-fetch based on the combined information.
Abstract:
Adaptive index density in a database management system is provided, which includes receiving a number of partitions for an index for a database table, the index subject to creation. The adaptive index density also includes selecting a column from the database table, the column selected based upon an estimated frequency of execution of database queries for the column. The adaptive index density further includes calculating an estimated cost of executing each of the database queries for the column, and determining data to reside in each of the partitions of the index responsive to the estimated cost.
Abstract:
Vehicle horn functions are implemented by a computer processor integral with a vehicle and logic executable by the computer processor. The logic derives a current value associated with a component defined by a policy, retrieves from a data file a volume setting mapped to the current value, and modifies operation of a horn in the vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn.
Abstract:
Ambient sound-based call functions include calculating, via a computer processor on a mobile communications device, a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the ambient sound-based call functions include determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device.
Abstract:
Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining.
Abstract:
A method implemented in a computer infrastructure includes: determining a current location of a mobile communication device; determining a route of a user associated with the mobile communication device; and determining mobile call rates for the user at locations along the route.