摘要:
A data storage system including a central storage system, at least one endpoint computer system in network communication with the central storage system by a network infrastructure, and a storage accelerator in communication with a CPU of the computer system, wherein the storage accelerator provides endpoint caching of data on the central storage system that is accessible to the at least one endpoint computer. Preferably, the storage accelerator is positioned at a location where a throughput of data from the CPU to the storage accelerator is greater than the throughput of data through a connection from the CPU to the central storage system.
摘要:
A security service of computer networks having a policy builder, an LDAP-compliant database, a validator and an API. The policy builder component provides a graphical user interface to be used by a policy manager to define access policies for users seeking to access network services and resources. The graphical user interface has a grid of nodes representing access policies. The grid is arranged to correspond to a defined tree structure representing services and resources and a business relationship tree structure representing users. The graphical user interface permits the policy manager to define policy builder plug-ins for access policy customization. The LDAP-compliant database maintains the policy builder plug-ins. The validator component receives requests from users and queries the LDAP-compliant database to obtain relevant access policies as defined by the policy manager. The system provides for double inheritance of access policies such that where there is no express definition of an access policy for a node, the access policies are propagated according to the hierarchical structures of the data. The validator includes validator plug-ins for carrying out access policies corresponding to the access policies defined by policy builder plug-ins.
摘要:
A security service of computer networks having a policy builder, an LDAP-compliant database, a validator and an API. The policy builder component provides a graphical user interface to be used by a policy manager to define access policies for users seeking to access network services and resources. The graphical user interface has a grid of nodes representing access policies. The grid is arranged to correspond to a defined tree structure representing services and resources and a business relationship tree structure representing users. The graphical user interface permits the policy manager to define policy builder plug-ins for access policy customization. The LDAP-compliant database maintains the policy builder plug-ins. The validator component receives requests from users and queries the LDAP-compliant database to obtain relevant access policies as defined by the policy manager. The system provides for double inheritance of access policies such that where there is no express definition of an access policy for a node, the access policies are propagated according to the hierarchical structures of the data. The validator includes validator plug-ins for carrying out access policies corresponding to the access policies defined by policy builder plug-ins.
摘要:
A security service of computer networks having a policy builder, an LDAP-compliant database, a validator and an API. The policy builder component provides a graphical user interface to be used by a policy manager to define access policies for users seeking to access network services and resources. The graphical user interface has a grid of nodes representing access policies. The grid is arranged to correspond to a defined tree structure representing services and resources and a business relationship tree structure representing users. The graphical user interface permits the policy manager to define policy builder plug-ins for access policy customization. The LDAP-compliant database maintains the policy builder plug-ins. The validator component receives requests from users and queries the LDAP-compliant database to obtain relevant access policies as defined by the policy manager. The system provides for double inheritance of access policies such that where there is no express definition of an access policy for a node, the access policies are propagated according to the hierarchical structures of the data. The validator includes validator plug-ins for carrying out access policies corresponding to the access policies defined by policy builder plug-ins.
摘要:
A method and system for storing data for retrieval by an application running on a computer system including providing a tiered caching system including at least one cache tier and a base tier, storing data in at least one of said at least one cache tier and said base tier based on a policy, and presenting an application view of said data to the application by a means to organize data. The invention optionally provides an additional overflow tier, and preferably includes multiple cache tiers.
摘要:
A method and system for storing data for retrieval by an application running on a computer system including providing a tiered caching system including at least one cache tier and a base tier, storing data in at least one of said at least one cache tier and said base tier based on a policy, and presenting an application view of said data to the application by a means to organize data. The invention optionally provides an additional overflow tier, and preferably includes multiple cache tiers.
摘要:
A data storage system including a central storage system, at least one endpoint computer system in network communication with the central storage system by a network infrastructure, and a storage accelerator in communication with a CPU of the computer system, wherein the storage accelerator provides endpoint caching of data on the central storage system that is accessible to the at least one endpoint computer. Preferably, the storage accelerator is positioned at a location where a throughput of data from the CPU to the storage accelerator is greater than the throughput of data through a connection from the CPU to the central storage system.
摘要:
The present invention includes a nutritional supplement composition that may be used for livestock and the like, as well as to a livestock feed mixture containing same. Also included are methods of preparing the nutritional supplement composition, the livestock feed mixture, as well as methods of providing nutrition to livestock and the like. The livestock feed composition comprises: (a) a solid particulate livestock feed material and (b) a solidified particulate mixture of (i) free fatty acid and (ii) a magnesium salt of a fatty acid, the magnesium salt of a fatty acid being present in an amount in the range of from about 25% to about 55% of the amount of the free fatty acid based upon the theoretical requirement to accomplish the total neutralization of all of fatty acid present.
摘要:
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is stored in a database, and the user is permitted to access the user profile from a second location.
摘要:
A digital signature is generated in association with target data. The computer generating the digital data encrypts the digital signature using a public key encryption system. The private key is stored in dynamic memory in a secure manner. The public key associated with the private key is stored in an accessible database. The public key is accessed from the database and used by recipient computers to authenticate the target data by decrypting the encrypted digital signature. When the computer generating the digital signature is restarted, the private key stored in dynamic memory is lost. The computer obtains a new private and public key pair from the public key encryption system. The previously used public key is maintained in the database until a predefined time has elapsed, after which it is removed from the database.