-
公开(公告)号:US20180308145A1
公开(公告)日:2018-10-25
申请号:US15956106
申请日:2018-04-18
Applicant: Walmart Apollo, LLC
Inventor: Benjamin Tucker , Jimmie Bond , Kenneth Clark , David Terjak
CPC classification number: G06Q30/0625 , G06F17/3007 , G06Q30/0603
Abstract: A system for managing and updating an internal product catalog, including an internal product catalog database, at least one external product catalog database, and an application program interface. The internal product catalog database includes a plurality of existing item files in which each existing item file is associated with a product and includes at least one attribute of the product. The at least one external product catalog database includes a plurality of external item files in which each external item file is associated with a product and includes at least one attribute of the product. The application program interface is communicatively coupled with the internal product catalog database and the at least one external product catalog database. The application program interface is configured to accept a user search request to search for a new product in which the user search request includes at least one attribute of the new product.
-
公开(公告)号:US20180293180A1
公开(公告)日:2018-10-11
申请号:US16009512
申请日:2018-06-15
Applicant: OPSWAT, Inc.
Inventor: Benjamin Czarny , Jianpeng Mo , Boris Dynin
IPC: G06F12/14 , G06F17/30 , G06F3/06 , G06F7/02 , G06F21/85 , G06F21/62 , G06F21/60 , G06F3/12 , G06F21/00
CPC classification number: G06F12/1408 , G06F3/0623 , G06F3/0635 , G06F3/0673 , G06F3/1226 , G06F7/02 , G06F17/3007 , G06F17/30135 , G06F17/30312 , G06F17/30371 , G06F17/30386 , G06F17/30864 , G06F21/00 , G06F21/60 , G06F21/602 , G06F21/62 , G06F21/6209 , G06F21/6218 , G06F21/85 , G06F2212/1052 , G06F2221/2107
Abstract: A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.
-
公开(公告)号:US09959288B2
公开(公告)日:2018-05-01
申请号:US14941184
申请日:2015-11-13
Applicant: EMC IP Holding Company LLC
Inventor: Ashwin Kumar , Cimarron Taylor
IPC: G06F17/30
CPC classification number: G06F17/30224 , G06F17/3007 , G06F17/30377 , G06F17/30554 , G06F17/30572 , G06F17/30575
Abstract: A planning indication directed to a declaratively-described operation and a target MPP database is received where the operation includes multiple mid-operation states and the operation includes, for each state in the plurality of states, those types of devices in a MPP database which would be affected by that state if the operation were performed, including a first set of affected device types and a first mid-operation state. In response to receiving the planning indication, affected device(s) in the target MPP database which would be affected by the first mid-operation state if the operation were performed are determined without performing the operation on the target MPP database. This determination is based at least in part on the first set of affected device types included in the operation. The first mid-operation state and the affected devices are indicated in a display.
-
公开(公告)号:US20180101691A1
公开(公告)日:2018-04-12
申请号:US15288938
申请日:2016-10-07
Inventor: Debasish Das , Kunal Joshi , Matthew Meyer , Jeremy Seideman
CPC classification number: G06F21/6209 , G06F17/3007 , G06F17/30082 , G06F21/6218 , G06F2221/2141 , H04L63/102 , H04L63/104
Abstract: A system for applying access permissions to read requests may write a file to a storage media. The file may contain data, an embedded flag, and an embedded verification datum of the embedded flag. The embedded flag may indicate an access permissions requisite for file access. The system may also receive a request to access the file from a user and retrieve an access permission for the user. The system may also compare the embedded flag to the access permission for the user to determine the user has permission to access the file. A verification datum may be calculated, and the calculated verification datum may be compared to the embedded verification datum to determine the embedded flag has not changed.
-
公开(公告)号:US09940377B1
公开(公告)日:2018-04-10
申请号:US14487954
申请日:2014-09-16
Applicant: Amazon Technologies, Inc.
Inventor: Abdul Sathar Sait
CPC classification number: H04L67/1097 , G06F17/3007
Abstract: Techniques are described for allocating computing storage capacity to customers of a provider network. Storage capacity that is allocated to a customer is backed up with a replica of the allocated storage capacity. A request is received for a copy of contents of the allocated storage capacity. Responsive to the indication, the requested copy is provided and is configured to reference the replica when the requested copy is accessed.
-
公开(公告)号:US09922055B2
公开(公告)日:2018-03-20
申请号:US13597242
申请日:2012-08-28
Applicant: David M. Whitlock , Mark A. Little , Julie Booth , Chyna Trople
Inventor: David M. Whitlock , Mark A. Little , Julie Booth , Chyna Trople
CPC classification number: G06F17/30289 , G06F17/3007 , G06F17/30342 , H04L41/085
Abstract: Disclosed below are representative embodiments of methods, apparatus, and systems for managing and classifying assets in an information technology (“IT”) environment using a tag-based approach. The disclosed tag-based classification techniques can be implemented through a graphical user interface. Embodiments of the disclosed tag-based classification techniques can be used to allow a user to easily and quickly select and perform actions on groups of one or more assets (e.g., monitor policies, perform upgrades, etc.). For example, the tag-based classification techniques can automatically classify assets into “tag sets” (or “tagged sets”) based on node properties or user-selected criteria or conditions (e.g., criteria or conditions that are established in a user-created tagging profile or rule). The tagged assets can then be further filtered to identify even deeper relationships between the assets.
-
公开(公告)号:US09898468B2
公开(公告)日:2018-02-20
申请号:US14132324
申请日:2013-12-18
Applicant: Quantum Corporation
Inventor: Ken Preslan , Stephen Lord
CPC classification number: G06F17/3007
Abstract: Example apparatus and methods concern identifying an error in a file system. The error is identified during one or more b-tree traversals through the file system. A fix for the error is produced upon detecting the error. Data or metadata associated with the fix is not initially written to the file system, but instead is stored somewhere other than the file system using a copy on write approach. After the traversals are complete, the file system may be fixed using the data or metadata stored using the copy on write approach.
-
公开(公告)号:US20180018285A9
公开(公告)日:2018-01-18
申请号:US13270528
申请日:2011-10-11
Applicant: Ilya Volvovski , Andrew Baptist , Greg Dhuse
Inventor: Ilya Volvovski , Andrew Baptist , Greg Dhuse
CPC classification number: G06F12/1408 , G06F3/0652 , G06F17/3007 , G06F17/30073 , G06F17/30144 , G06F17/30244 , G06F17/30371 , G06F2212/7205 , H04L41/06 , H04L67/1097
Abstract: A method begins by a processing module receiving an encoded data slice for storage in memory that is organized as a plurality of log files and identifying a log file based on information regarding the encoded data slice to produce an identified log file, wherein the identified log file is storing at least one other encoded data slice. The method continues with the processing module comparing storage parameters of the identified log file with desired storage parameters associated with the encoded data slice. The method continues with the processing module attempting to identify a second log file based on an alternate log file storage protocol when the storage parameters of the identified log file compare unfavorably with the desired storage parameters and when the second log file is identified, storing the encoded data slice in the second log file.
-
公开(公告)号:US09858315B2
公开(公告)日:2018-01-02
申请号:US15389321
申请日:2016-12-22
Applicant: EMC IP Holding Company LLC
Inventor: Caleb E. Welton , Shengwen Yang
CPC classification number: G06F17/30445 , G06F17/30023 , G06F17/30067 , G06F17/3007 , G06F17/30073 , G06F17/30106 , G06F17/30194 , G06F17/30224 , G06F17/30283 , G06F17/30306 , G06F17/30424 , G06F17/30433 , G06F17/30442 , G06F17/30463 , G06F17/30477 , G06F17/30545 , G06F17/30997 , H04L65/60 , H04L67/1097
Abstract: Performing data analytics processing in the context of a large scale distributed system that includes a massively parallel processing (MPP) database and a distributed storage layer is disclosed. In various embodiments, a data analytics request is received. A plan is created to generate a response to the request. A corresponding portion of the plan is assigned to each of a plurality of distributed processing segments, including by invoking as indicated in the assignment one or more data analytical functions embedded in the processing segment.
-
公开(公告)号:US09858288B2
公开(公告)日:2018-01-02
申请号:US13958298
申请日:2013-08-02
Applicant: Egnyte, Inc.
Inventor: Ravi Wijayaratne , Remus Koos , Ray White , Manish Marathe , Markku Mielityinen , Amrit Jassal , Rajesh Ram , Sriram Gopalan , Aahz , Heikki J. Toivonen
IPC: G06F17/30
CPC classification number: G06F17/30174 , G06F17/3007
Abstract: A method for synchronizing a file system (FS) and a remote file system (RFS) includes monitoring the FS for FS events, generating FS event records, receiving RFS event records of RFS events, generating file system operations (FSOs) based on the FS and RFS event records, and communicating the FSOs to the FS and RFS to synchronize them. A method for generating the FSOs includes accessing a plurality of FS and/or RFS event records, processing the accessed records to generate processed event records, generating the FSOs based on the processed event records, and outputting the FSOs to cause synchronization of the FS and RFS. Systems are also described. The invention facilitates event-based, steady-state synchronization of local and remote file systems.
-
-
-
-
-
-
-
-
-