Patent classifications
G06F16/13
Sketch-based image retrieval techniques using generative domain migration hashing
This disclosure relates to improved sketch-based image retrieval (SBIR) techniques. The SBIR techniques utilize a neural network architecture to train a domain migration function and a hashing function. The domain migration function is configured to transform sketches into synthetic images, and the hashing function is configured to generate hash codes from synthetic images and authentic images in a manner that preserves semantic consistency across the sketch and image domains. The hash codes generated from the synthetic images can be used for accurately identifying and retrieving authentic images corresponding to sketch queries, or vice versa.
File Storage Method and Apparatus, and Device and Readable Storage Medium
A file storage method, apparatus, device and a readable storage medium. The method includes: performing striping processing on a target file to obtain multiple target objects, and calculating fingerprint information of each target object; using a first target object and logical information of the target file to form a logical header object, and storing the logical header object in a storage system; using the fingerprint information of each second target object to determine whether the second target object has been stored in the storage system; and if the second target object has not been stored in the storage system, determining the second target object as a third target object and storing same in the storage system. According to the method, logical information of each file can be preserved, and files of some users can be prevented from being modified or deleted after deduplication is performed in the storage system.
File Storage Method and Apparatus, and Device and Readable Storage Medium
A file storage method, apparatus, device and a readable storage medium. The method includes: performing striping processing on a target file to obtain multiple target objects, and calculating fingerprint information of each target object; using a first target object and logical information of the target file to form a logical header object, and storing the logical header object in a storage system; using the fingerprint information of each second target object to determine whether the second target object has been stored in the storage system; and if the second target object has not been stored in the storage system, determining the second target object as a third target object and storing same in the storage system. According to the method, logical information of each file can be preserved, and files of some users can be prevented from being modified or deleted after deduplication is performed in the storage system.
Time-based partitioning to avoid in-place updates for data set copies
Time-based partitioning of a data set is applied to capture updates to the data set in a copy of the data set. Items that have been updated in a data set with in a time period are identified. Partitions of the data set that include the updated items are created according to a partitioning scheme. The created partitions are grouped in a storage location for the time period in a file structure that stores a copy of the database. A latest version of the copy of the data set may be accessed according to latest partitions of the data set stored in the different locations of the file structure.
Metadata management in storage systems
Techniques are disclosed for managing metadata of a storage system. A storage control system receives data to be written to primary storage, and writes the received data together with metadata to a write cache. The storage control system destages the metadata from the write cache to a primary metadata structure which is configured to persistently store and index the metadata. The primary metadata structure comprises (i) a first data structure that is configured to accumulate the metadata destaged from the write cache and organize the accumulated metadata in blocks of metadata sorted by index keys, and (ii) a second data structure that is configured to receive the accumulated metadata from the first data structure, and organize the received metadata using an index structure that enables random-access to the metadata using the index keys.
Metadata management in storage systems
Techniques are disclosed for managing metadata of a storage system. A storage control system receives data to be written to primary storage, and writes the received data together with metadata to a write cache. The storage control system destages the metadata from the write cache to a primary metadata structure which is configured to persistently store and index the metadata. The primary metadata structure comprises (i) a first data structure that is configured to accumulate the metadata destaged from the write cache and organize the accumulated metadata in blocks of metadata sorted by index keys, and (ii) a second data structure that is configured to receive the accumulated metadata from the first data structure, and organize the received metadata using an index structure that enables random-access to the metadata using the index keys.
Determining a storage location according to data retention policies
A method for determining a storage location includes one or more processing modules of one or more computing devices of a storage network (SN) receiving a data object to store in a storage network (SN) and determining whether the data object is subject to a legal restriction, where a data object is subject to a legal restriction based on the data object requiring storage in a jurisdiction that subjects the data object to a retention policy. The method continues by determining one or more attributes of a first storage location of a plurality of storage locations and based on a determination that the data object is subject to a legal restriction and at least one attribute of the one or more attributes of the first storage location, transmitting a write threshold number of write requests to a plurality of SUs at the first storage location.
Methods, systems, and computer readable mediums for implementing a data protection policy for a transferred enterprise application
Methods, systems, and computer readable mediums for logically remediating infrastructure resource components are disclosed. According to one example, the method includes capturing metadata specifying both a data protection policy applied to an enterprise application supported by a host computing system and a location of backup file data associated with the enterprise application and transferring the enterprise application and the metadata from the host computing system to a target computing system. The method further includes utilizing the metadata to reconstruct the data protection policy for the transferred enterprise application on the target computing system, wherein the metadata specifies a data protection solution for each of a plurality of resource components supporting the transferred enterprise application on the target computing system.
Methods, systems, and computer readable mediums for implementing a data protection policy for a transferred enterprise application
Methods, systems, and computer readable mediums for logically remediating infrastructure resource components are disclosed. According to one example, the method includes capturing metadata specifying both a data protection policy applied to an enterprise application supported by a host computing system and a location of backup file data associated with the enterprise application and transferring the enterprise application and the metadata from the host computing system to a target computing system. The method further includes utilizing the metadata to reconstruct the data protection policy for the transferred enterprise application on the target computing system, wherein the metadata specifies a data protection solution for each of a plurality of resource components supporting the transferred enterprise application on the target computing system.
3D printer and inventory control and distribution system for 3D designs
A digital platform enables 3D printing where the designs are protected from piracy/redistribution. A single board computer (SBC) communicates with a first server and a second server. The SBC requests a unique hardware ID from the first server, which assigns and sends the ID to the SBC. The SBC submits the ID and a secret key to the second server to request registration of a user and a printer, and the second server sends private certs, a client ID, and a unique public identifier to the SBC. The second server also receives and stores 3D print designs through a designer portal, and on-demand displays the designs in a GUI screen. The SBC user may purchase a 3D print design, and the second server, in response, sends an access token to the SBC. The SBC redeems the access token for a selected 3D print, and the second server adjusts geode for the selected 3D design for the particular printer, and streams the adjusted geode to the printer through the SBC, thereby protecting the code from unauthorized user/replication.