Patent classifications
G06F16/11
Transient software error handling in a distributed system
A method for use in a storage system is disclosed, comprising: receiving, at a first server in the storage system, a given block layer request for reservation of a storage resource, by the first server, an identifier corresponding to the given block layer request; performing a search of a database to detect whether the given block layer request has been completed, the search being performed by the first server, the search being performed based on the identifier corresponding to the given block layer request; when the database indicates that the given block layer request has not been completed: completing the given block layer request and transmitting a notification that the given block layer request is completed; and when the database indicates that given block layer request has been completed, re-transmitting a notification that the given block layer request is completed.
Method, device, and computer program product for managing file system
Techniques for managing a file system involve in response to receiving, at a first backup device of the file system, a request for replicating data of the file system from the first backup device to a second backup device of the file system, determining a synchronization state between the first backup device and the file system, the second backup device being a backup device located downstream of the first backup device; creating, based on the synchronization state, a target snapshot associated with the file system; and causing the data to be replicated from the first backup device to the second backup device based on the target snapshot. Therefore, the data backup flexibility and accuracy of a file system can be significantly improved and therefore the reliability of the whole system may be enhanced.
Identifying a software vulnerability
Systems and methods to identify a software vulnerability are described. The system receives a message identifying a software vulnerability. The system identifies snapshot images taken of a production machine and stored in a database. The snapshot images include a snapshot image including a virtual machine. The snapshot images are identified being based on the message. The system identifies whether the snapshot images include the software vulnerability. The system registers the software vulnerability in association with a snapshot image in the database responsive to the identification of the snapshot image of the virtual machine including the software vulnerability.
System and method for managing B tree node sharing using operation sequence numbers
System and method for managing copy-on-write (COW) B tree structures for metadata of storage objects stored in a storage system determine, when a request to modify a target storage object stored in the storage system that requires a modification of a target leaf node in a B tree structure for metadata of the target storage object is received, whether an operation sequence number of the target leaf node is greater than a snapshot sequence number of a parent snapshot of a running point of the B tree structure. When the operation sequence number is greater than the snapshot sequence number, the target leaf mode is modified in place without copying the target leaf node. When the operation sequence number is not greater than the snapshot sequence number, the target leaf node is copied as a new leaf node for the B tree structure and the new leaf node is modified.
Migration of network file copy operations between host computing devices
A method of migrating a network file copy (NFC) operation from a first host computing device to a second host computing device includes the steps of: transmitting a first request to the first host computing device to execute the NFC operation, wherein the NFC operation comprises transferring data from a shared datastore to another datastore; after transmitting the first request, selecting the second host computing device to complete the NFC operation in place of the first host computing device, and transmitting a second request to the first host computing device to stop executing the NFC operation; after transmitting the second request, detecting a message indicating that the first host computing device completed the copying of a first portion of the data; and in response to the detection of the message, transmitting a third request to the second host computing device to perform the remainder of the NFC operation.
SEARCH FILTERED FILE SYSTEM USING SECONDARY STORAGE, INCLUDING MULTI-DIMENSIONAL INDEXING AND SEARCHING OF ARCHIVED FILES
Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
PARALLEL PROCESSING DATABASE SYSTEM
A method and system for executing database queries in parallel using a shared metadata store. The metadata store may reside on a master node, where the master node is the root node in a tree. The master node may distribute query plans and query metadata to other nodes in the cluster. These additional nodes may request additional metadata from each other or the master nodes as necessary.
Automatically Reorganize Folder/File Visualizations Based on Natural Language-Derived Intent
A method, system and computer-usable medium are disclosed for computing file system management. A corpus of content is processed to extract metadata associated with folders and files referenced by a directory structure. Natural Language Processing (NLP) operations are then performed on the corpus to generate concept and entity data associated with each folder and file, followed by performing Natural Language (NL) classification operations to generate intent classification data, which in turn is processed. to determine ranked, dominant intents for each folder and file. The corpus content, extracted metadata, concept and entity data, and ranked dominant intents are then processed to generate indexed content and term data. Application context data associated with an interaction is collected and processed to determine a user intent, which is then processed with the indexed content and term data to identify a corresponding folder and file, which in turn are provided to the user.
Secure data broker
The present disclosure is directed to for secure data access between multiple entities, and includes actions of receiving, by a secure file storage system, a set of metafiles including one or more metafiles that define actions to be performed and conditions to be satisfied before granting a first system use of data that is resident at a second system, the set of metafiles being provided by the second system, receiving, by the secure file storage system and from a central exchange, an indication that the actions are performed and the conditions are satisfied for use of the data by the first system, wherein the central exchange accesses the set of metafiles from the secure file storage without accessing the data, and in response to the indication, permitting use of the data by the first system.
ARCHITECTURE FOR MANAGEMENT OF DIGITAL FILES ACROSS DISTRIBUTED NETWORK
A server system, based on content of a first file stored on a first client device being modified, automatically receives a copy of the modified first file from a first transfer client, implemented on the first client device, the copy of the modified first file being an updated version of the first file generated from content of the first file being modified. The server system receives, from the first transfer client, first metadata associated with the updated version of the first file, the first metadata being assigned a first priority greater than a second priority assigned to the copy of the modified first file. The server system automatically transfers the first metadata to a second transfer client, implemented on a second client device, before the copy of the modified first file is transferred to the second transfer client to be stored on the second client device.