Patent classifications
G06F3/0668
Storing data and associated metadata in a dispersed storage network
A method begins by a processing module generating metadata for a data object. The method continues by a first disperse storage error encoding the metadata to produce a set of metadata slices. The method continues by partitioning the data to produce a plurality of data segments. The method continues by a second disperse storage error encoding the plurality of data segments to produce a plurality of sets of encoded data slices. The method continues by applying a distributed agreement protocol function to a data object identifier for the data object to produce ranked scoring information with regards to a plurality of storage sets. The method continues by selecting a storage set of the plurality of storage sets based on the ranked scoring information. The method continues by facilitating storage of the set of metadata slices and the plurality of sets of encoded data slices in the selected storage set.
Data transfer priority levels
A method begins by a processing module receiving updated weighting factors for each of a plurality of storage sets. The method continues with the processing module identifying locally stored encoded data slices of a plurality of locally stored encoded data slices for transfer to one or more storage sets of the plurality of storage sets based on the updated weighting factors. The method continues with the processing module, for each identified locally stored encoded data slice, assigning a transfer priority level. The method continues with the processing module, for each identified locally stored encoded data slice, facilitating transfer of the identified locally stored encoded data slice to the one or more storage sets in accordance with the corresponding assigned transfer priority level.
COMPUTER MEMORY
Computer memory technology is disclosed. In one example, a method for isolating computer memory blocks in a memory array from one another can include forming an opening between adjacent blocks of memory structures. The method can also include forming a protective liner layer on at least the memory structures. The method can further include disposing isolating material in the opening and on the protective liner layer. The method can even further include removing the isolating material on the protective liner layer. The method can additionally include removing the protective liner layer on the memory structures. Associated devices and systems are also disclosed.
SECURITY ROLE IDENTIFIER POOLS ALLOCATION
Various systems and methods for Security Attributes of Initiator (SAI) pools allocation are described herein. A system for security attribute pool allocation includes an integrated circuit to: access a hardware block and store a security identifier in the hardware block, the security identifier being from a pool of security identifiers, the pool being one of a plurality of pools of security identifiers with each of the plurality of pools having mutually exclusive sets of security identifiers.
UNFAVORABLE STORAGE GROWTH RATE ABATEMENT
A method begins by a processing module determining, by a first storage unit, that a storage growth rate is unfavorable for the first storage unit over an estimated time frame of reallocating at least a portion of encoded data slices stored in the first storage unit to one or more additional storage units. The method continues with the processing module when the storage growth rate is unfavorable, selecting an unfavorable growth rate abatement approach to include prioritizing new deletes and outgoing allocations such that estimated required storage capacity is less than available storage capacity of the first storage unit for the estimated time frame of the reallocation of the at least a portion of encoded data slices. The method continues with the processing module facilitating implementation of the unfavorable growth rate abatement approach.
ASSISTED CONFIGURATION OF DATA CENTER INFRASTRUCTURE
A configuration assistance module(CAM) includes a configuration monitor (CM), a configuration analyzer (CA), and a data base of pre-defined configurations. The CM may access the local configuration database of supported platform configurations and collect's hardware and software inventory e.g., PCIe matrix information, DIMM matrix information, blade configuration information and configuration information for various resources. The CAM may compare the current configuration to offline support configuration and report discrepancies through alerts and create assist report. The assist report may be stored to remote share or master partition and report to a GUI, console interface, or the like., The CA module may take an assist report as input and create analytics report, which proactively provides inputs for future configurations.
Reallocating storage in a dispersed storage network
A method for execution by a dispersed storage and task (DST) execution unit includes updating a plurality of weighting factors corresponding to each of a plurality of memories in response to an indication of a change in memory capacity of one of the plurality of memories. At least one encoded data slice is received for storage by the DST execution unit. A plurality of scores are generated corresponding to each of the plurality of memories, wherein each of the plurality of scores is based on one of the plurality of weighting factors of a corresponding one of the plurality of memories. One of the plurality of memories is selected based on the plurality of scores, and the at least one encoded data slice is stored in the selected memory.
Memory array with flash and random access memory and method therefor, reading data from the flash memory without storing the data in the random access memory
Memory array, system and method for storing data. The memory array has a flash memory array, a random access memory array coupled to the flash memory and configured to receive the data, a memory management module and a data bus. The memory management module is coupled to the random access memory array and to the flash memory array, the memory management module being configured to transfer at least a portion of the data stored in the random access memory array to the flash memory array. The data bus is coupled to the flash memory array and configured to output at least a portion of the data originally stored in the random access memory array from the flash memory array.
PROXYING SLICE ACCESS REQUESTS DURING A DATA EVACUATION
A method begins by a processing module receiving a checked write slice request from a requesting entity. The method continues by determining that locally stored encoded data slices do not include the requested encoded data slice. The method continues by identifying an alternate location for the requested encoded data slice. The method continues by determining whether the alternate location is associated with storage of the encoded data slice. The method continues when the alternate location is associated with the storage of the encoded data slice, by issuing a favorable checked write slice response to a requesting entity. The method can include facilitating transfer of the requested encoded data slice from the alternate location to the storage unit for storage.
Unfavorable storage growth rate abatement
A method begins by a processing module determining, by a first storage unit, that a storage growth rate is unfavorable for the first storage unit over an estimated time frame of reallocating at least a portion of encoded data slices stored in the first storage unit to one or more additional storage units. The method continues with the processing module when the storage growth rate is unfavorable, selecting an unfavorable growth rate abatement approach such that estimated required storage capacity is less than available storage capacity of the first storage unit for the estimated time frame of the reallocation of the at least a portion of encoded data slices. The method continues with the processing module facilitating implementation of the unfavorable growth rate abatement approach.