摘要:
The present invention includes one or more clients in communication with a server. The client desires to send a storage construct to the server for storage. The client negotiates a transmission key with the server. The client generates a storage key associated specifically with the storage construct. The client encrypts the storage construct using the storage key and encrypts the storage key using the transmission key. The encrypted storage construct and encrypted storage key are sent to the server. The server decrypts the storage key using the transmission key. The server stores the storage construct on a storage device separate from a storage device storing the storage key. Preferably, any changes to the storage construct location, the storage key location, or the storage construct name are tracked and proper modifications are made to an association relating the location of the storage construct and the location for the corresponding storage key.
摘要:
Provided are techniques for, under control of a backup application, identifying one or more columns to be used by a row based operation. A row map is created that includes indicators which indicate the identified one or more columns. The row based operation is generated, wherein the row map is input as an argument to the row based operation, and the row based operation is forwarded to a database abstraction component. Under control of the database abstraction component, the row based operation is used to generate a database statement, wherein the row map is used to generate a portion of the database statement.
摘要:
An apparatus, system, and method are disclosed for data access management on a storage device connected to a storage area network. A client includes network connections to a first and second network, where the second network comprises a storage area network (SAN). The client also includes a storage management client and a storage agent. The storage agent is configured to minimize the amount of metadata processing that occurs on the client by sending the metadata or a copy thereof to a storage server to be stored in a centralized metadata database. The storage server also includes a storage manager that is configured to manage data access by the storage agent to the requested storage device.
摘要:
An article of manufacture and system are provided for allocating storage space to a storage pool. A request for storage space for the storage pool is received. A list of locations associated with the storage pool is obtained, wherein the locations are capable of spanning multiple file systems or multiple directories within a single file system. One or more allocation techniques are applied to select one or more locations at which storage space is to be allocated. The storage space is allocated at the selected one or more locations.
摘要:
A data recovery method that uses a minimum number of recovery streams is provided. The method comprises defining a minimum number of recovery streams to be read from during restoration of data from one or more storage volumes in a communication network, wherein the minimum number is determined according to one or more parameters defining availability of one or more resources in the communication network; restoring the data using at least the minimum number of recovery streams to optimize the rate at which the data is restored; and dynamically changing the minimum number of recovery streams, in response to determining that the availability of the one or more resources has changed.
摘要:
Provided are a method, system, and article of manufacture, wherein a data structure corresponding to a set of client nodes selected from a plurality of client nodes is generated. Objects from the selected set of client nodes are stored in the data structure. A determination is made that an object corresponding to a client node of the selected set of client nodes has to be stored. An additional determination is made as to whether the object has already been stored in the data structure by any client node of the selected set of client nodes. The object is stored in the data structure, in response to determining that the object has not already been stored in the data structure by any client node of the selected set of client nodes.
摘要:
Provided are a method, system, and article of manufacture, wherein a determination is made that an object corresponding to a first client node has to be stored. A further determination is made as to whether the object has already been sent to a server node by a second client node, wherein the sent object is stored in the server node and is represented by a first entry, and wherein objects and representations of objects stored in the server node form a plurality of groups. The server node receives the object from the first client node, in response to determining that the object has not already been stored in the server node by the second client node. A second entry representing the object is stored at the server node, wherein the second entry references the first entry, in response to determining that the object has already been stored in the server node by the second client node.
摘要:
Any node in a multi-node processing system may be employed to route commands to a selected group of one or more nodes, and initiate local command execution if permitted by local security provisions. The system includes multiple application nodes interconnected by a network, and one or more administrator nodes each coupled to at least one application node. Each administrator node has assigned security credentials. The process starts when the administrator node transmits input to one of the application nodes (an “entry” node). The input includes a command and routing information specifying a list of desired application nodes (“destination” nodes) to execute the command. In response to this input, the entry node transmits messages to all destination nodes to (1) log-in to the destination nodes as the originating administrator node, and (2) request the destination nodes to execute the command. Consulting locally stored security information, each destination node determines whether the entry node's log-in should succeed. If so, the destination node consults locally stored authority information to determine whether the initiating administrator node has authority to execute the requested command. If so, the destination node executes the command. The destination node sends the entry node a response representing the outcome of command execution. The entry node organizes such responses and provides a representative output.
摘要:
Disclosed are a method, embodiable in computer readable program code, and a system for providing server-to-server event logging. A server-to-server event message is generated including 1) an event identifier, 2) any text insert pertinent to the event message, and 3) a source trail indicating the origin and history of the event, the source trail comprising an identifier of any server forwarding the event, each identifier separated by a special character, so that the origin and any subsequently transmitting servers may be known. Further, the source trail of a received server-to-server event message is parsed to determine each identifier in the source trail, and the event message transmitted to a receiving server only if the receiving server identifier is absent from the parsed source trail, thus preventing any loops which might cause the event to be repeated. Additionally, a receiving server has a listing of events by event identifier with corresponding text messages in the text language of the receiving server. The received event identifier is found in the listing, and the receiving server logs the event, using the identified text message in the listing in the text language of the receiving server, and employing the text inserts.
摘要:
An apparatus, system, and method are disclosed that provides a user-specific transportable computing environment. The apparatus, system, and method facilitate users configuring their own personal computing environment on a properly configured computing host. Users can insert a personal environment key into the computing host and automatically activate and configure any software they are licensed to use. The personal environment key may include all the data, licenses, and keys necessary to activate software that the user has rights to use.