-
公开(公告)号:US20180348973A1
公开(公告)日:2018-12-06
申请号:US16101615
申请日:2018-08-13
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Vishal Anand , Sahadev Dey , Rajneesh Kumar , Vijay S. Patil , Amit Patra
IPC: G06F3/0482 , G06F17/30 , G06F3/0484
CPC classification number: G06F3/0482 , G06F3/04842 , G06F17/30082
Abstract: An approach is provided for monitoring disk utilization at an object level. At a first time a first size of an object in a System i computing platform is determined by calling an application programming interface (API). At a second time a second size of the object is determined by calling the API. A difference between the first and second sizes is determined. The difference is determined to be greater than a threshold. Based on the difference exceeding the threshold, an alert is sent indicating growth at the object level rather than at an auxiliary storage pool level. The API is called to obtain the sizes of objects in an integrated file system in the System i computing platform. Differences between the sizes of the objects at a user-entered start date and the current time are determined and presented. A report including the differences is generated and sent.
-
公开(公告)号:US20180217997A1
公开(公告)日:2018-08-02
申请号:US15937694
申请日:2018-03-27
Applicant: CryptoMove, Inc.
Inventor: Boris Burshteyn
CPC classification number: G06F17/30082 , G06F21/6218 , H04L63/0428 , H04L63/06 , H04L2209/16
Abstract: Methods, apparatuses, and embodiments related to improving security of data that is stored at a data store distributed over a computer network or remote cloud-based environment. For example, source data to be protected is partitioned into multiple data files. Additionally, each file may be obfuscated, such as by being encrypted, to created multiple obfuscated data files. Information as to how each obfuscated data file was obfuscated is stored in an associated trace file. The multiple obfuscated data files are moved around a computer network or remote cloud-based environment via a data movement process.
-
公开(公告)号:US20180183664A1
公开(公告)日:2018-06-28
申请号:US15390146
申请日:2016-12-23
Applicant: Microsoft Technology Licensing, LLC
Inventor: Joaquin Vano Newman
CPC classification number: H04L67/1097 , G06F17/30082 , H04L43/0817 , H04L67/32
Abstract: Embodiments are directed to client-side enforcement of storage quotas in a cloud service or distributed computing environment. A storage driver is configured to monitor access to an external storage system by a cloud process and to enforce storage limits for the external storage system. The storage driver intercepts reads and writes from the process to the external storage system and updates a local state to track the process's usage of the external storage system. A storage quota database is periodically checked for an updated storage usage and, if the updated storage usage is not present, then the external storage is scanned to obtain the updated storage usage. The updated storage usage is provided to the storage driver, which overwriting the local state. The storage driver continues to update the local state based upon the intercepted reads and writes.
-
公开(公告)号:US20180173733A1
公开(公告)日:2018-06-21
申请号:US15847674
申请日:2017-12-19
Applicant: CAPITAL ONE SERVICES, LLC
Inventor: Yatindra NATH , Ankur Garg , Rajeev Tiwari , Pranav Vrat , Amit Mohanty
CPC classification number: G06F17/30303 , G06F15/18 , G06F17/30038 , G06F17/30082 , G06F17/30371
Abstract: A system for providing data quality management may include a processor configured to execute instructions to: extract a plurality of first data elements from a data source; generate a data profile based on the first data elements; automatically create a first set of rules based on the first data elements and the data profile, the first set of rules assessing data quality according to a threshold; generate a second set of rules based on the first data elements and the first set of rules; extract a plurality of second data elements; assess the second data elements based on a comparison of the second data elements to the second set of rules; detect defects based on the comparison; analyze data quality according to the detected defects; and transmit signals representing the data quality analysis to a client device for display to a user.
-
公开(公告)号:US09983973B2
公开(公告)日:2018-05-29
申请号:US15047554
申请日:2016-02-18
Applicant: Unravel Data Systems, Inc.
Inventor: Shivnath Babu , Kunal Agarwal
CPC classification number: G06F11/3495 , G06F11/302 , G06F17/30082 , G06F17/30194
Abstract: A system and method for analyzing big data activities are disclosed. According to one embodiment, a system comprises a distributed file system for the entities and applications, wherein the applications include one or more of script applications, structured query language (SQL) applications, Not Only (NO) SQL applications, stream applications, search applications, and in-memory applications. The system further comprises a data processing platform that gathers, analyzes, and stores data relating to entities and applications. The data processing platform includes an application manager having one or more of a MapReduce Manage, a script applications manager, a structured query language (SQL) applications manager, a Not Only (NO) SQL applications manager, a stream applications manager, a search applications manager, and an in-memory applications manager. The application manager identifies if the applications are one or more of slow-running, failed, killed, unpredictable, and malfunctioning.
-
公开(公告)号:US20180137130A1
公开(公告)日:2018-05-17
申请号:US15851644
申请日:2017-12-21
Applicant: CryptoMove, Inc.
Inventor: Boris Burshteyn
CPC classification number: G06F17/30082 , G06F21/6218 , H04L9/0631 , H04L9/0643 , H04L9/0891 , H04L9/0894 , H04L63/0428 , H04L63/06 , H04L2209/16
Abstract: Methods, apparatuses, and embodiments related to improving security of data that is stored at a data store distributed over a computer network. In an example, source data to be protected is partitioned into multiple files, and each file is obfuscated, such as by being encrypted, to created multiple obfuscated data files. Information as to how each obfuscated data file was obfuscated is stored in an associated trace file. The multiple obfuscated data files are moved around a computer network via a data movement process that includes sending each of the multiple obfuscated data files to a different randomly selected computer, where the computer further obfuscates the obfuscated data the trace file, and sends the further obfuscated data and trace file to a next randomly selected computer.
-
公开(公告)号:US09924002B1
公开(公告)日:2018-03-20
申请号:US13625182
申请日:2012-09-24
Applicant: EMC IP Holding Company LLC
Inventor: Michael D. Hartway
CPC classification number: H04L69/329 , G06F9/44552 , G06F17/30067 , G06F17/3007 , G06F17/30082 , G06F17/30168 , G06F17/30174 , G06F17/30371 , G06F17/30578 , G06F21/6218 , H04L67/1002 , H04L67/2814 , H04L67/42
Abstract: A method, article of manufacture, and apparatus for managing stateless processes is disclosed. In some embodiments, a file system view request is sent to a process manager. A check is then made to ensure that a connection to the requested file system is available. A stateless process to interact with the file system is created and a stateless process to display the file system is also created. A plurality of operational requests to interact with the file system is sent to the process manager. For each operational request, a check is made to ensure that the request is valid. The valid requests are then performed. In some embodiments, software components are removed from the file system. In some embodiments, software components are added to the file system.
-
公开(公告)号:US09922034B2
公开(公告)日:2018-03-20
申请号:US14823611
申请日:2015-08-11
Applicant: International Business Machines Corporation
Inventor: Paul R. Bastide , Sean Callanan , Patrick J. O'Sullivan
CPC classification number: G06F17/30082 , G06F17/30713 , H04L51/22
Abstract: Displaying at least one categorized message based on a percentage includes retrieving a number of messages, categorizing at least one message from the number of messages into at least one category to create categorized messages, identifying a percentage, the percentage representing a portion of a display utilized for displaying the at least one category associated with the categorized messages, determining, based on the percentage, at least one of the categorized messages to present in the portion of the display, and presenting, in the portion of the display, the at least one of the categorized messages.
-
公开(公告)号:US09898485B2
公开(公告)日:2018-02-20
申请号:US14696149
申请日:2015-04-24
Applicant: DataDirect Networks, Inc.
Inventor: Rajkumar Joshi , David Fellinger , Jean-Luc Chatelain
IPC: G06F17/30
CPC classification number: G06F17/30215 , G06F17/30082 , G06F17/30091
Abstract: Systems and methods for storing data in a data storage system that allows dynamic context-based data protection and distribution are disclosed. The method includes receiving a storage request and evaluating whether a storage policy is specified in the storage request. When the storage request specifies a storage policy, the data is stored according to the specified policy. When the storage request does not specify a storage policy, meta data and/or the data item itself may be evaluated to identify a storage policy. When a storage policy has been identified, store the data is stored according to the identified policy. When a storage policy has not been specified and cannot be identified, an error is returned.
-
公开(公告)号:US09898473B2
公开(公告)日:2018-02-20
申请号:US15668459
申请日:2017-08-03
Applicant: CryptoMove, Inc.
Inventor: Boris Burshteyn
CPC classification number: G06F17/30082 , G06F21/6218 , H04L9/0631 , H04L9/0643 , H04L9/0891 , H04L9/0894 , H04L63/0428 , H04L63/06 , H04L2209/16
Abstract: Methods, apparatuses, and embodiments related to improving security of data that is stored at a data store distributed over a computer network. In an example, source data to be protected is partitioned into multiple files, and each file is obfuscated, such as by being encrypted, to created multiple obfuscated data files. Information as to how each obfuscated data file was obfuscated is stored in an associated trace file. The multiple obfuscated data files are moved around a computer network via a data movement process that includes sending each of the multiple obfuscated data files to a different randomly selected computer, where the computer further obfuscates the obfuscated data the trace file, and sends the further obfuscated data and trace file to a next randomly selected computer.
-
-
-
-
-
-
-
-
-