Patent classifications
G06F16/119
Non-disruptive and efficient migration of data across cloud providers
An index associates fingerprints of file segments to container numbers of containers within which the file segments are stored. At a start of migration, a boundary is created identifying a current container number. At least a subset of file segments at a source storage tier are packed into a new container to be written to a destination storage tier. A new container number is generated for the new container. The index is updated to associate fingerprints of the at least subset of file segments to the new container number. A request is received to read a file segment. The index is queried with a fingerprint of the file segment to determine whether the request should be directed to the source or destination storage tier based on a container number of a container within which the file segment is stored.
MANAGEMENT OF ACCESS CONTROL IN MULTI-CLOUD ENVIRONMENTS
A computer-implemented to control access to data on an off-premises storage system. The method includes defining an access policy for a plurality of files in a file system stored in an on-premises storage system. The method further includes registering the access policy with a first off-premises storage system. The method also includes creating a resource-based cloud access policy based on an on-premise access policy. The method includes determining a set of files from the plurality of files to migrate to the off-premises storage. The method also includes obtaining, for the set of files, an access policy as access metadata. The method further includes migrating the set of files and the access metadata to the off-premises storage.
INFORMATION MANAGEMENT SYSTEM
One embodiment is an information management system which is capable of routing and/or delivering the information to a user. The system can include a notification system for providing a notification to the user associated with the information.
File system warnings application programing interface (API)
The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.
Dynamically moving virtual machine (VM) data based upon context
Systems and methods for dynamically moving virtual machine (VM) data based upon context are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: select a VM having a plurality of VM files; identify, among the plurality of VM files, a movable VM file; and transfer the movable VM file from a first storage tier to a second storage tier based upon a usage classification associated with the movable VM file.
Methods and systems for adapting multiple key-value stores
A method of adapting a first key-value store to a second key-value store may include determining a conversion strategy based on one or more characteristics of the first key-value store and one or more characteristics of the second key-value store, converting the second key-value store to a converted key-value store based on the conversion strategy, and mapping the first key-value store to the converted key-value store based on a mapping function. The converted key-value store may be accessed on-the-fly. A data storage system may include a key-value interface configured to provide access to a lower key-value store, and a key-value adapter coupled to the key-value interface and configured to adapt an upper key-value store to the lower key-value store, wherein the key-value adapter may be configured to adapt at least two different types of the upper key-value store to the lower key-value store.
FILE TIERING TO DIFFERENT STORAGE CLASSES OF A CLOUD STORAGE PROVIDER
A method comprises receiving an input specifying one or more rules for archiving a plurality of files from a source storage location to a target storage location, wherein the target storage location comprises a cloud storage platform comprising a plurality of storage classes. In the method, one or more of the plurality of files are retrieved from the source storage location for migration to the target storage location based at least in part on the one or more rules. Assignment of the one or more of the plurality of files to respective ones of the plurality of storage classes is controlled based at least in part on the one or more rules. The one or more rules specify one or more constraints for the assignment of the one or more of the plurality of the files to the respective ones of the plurality of storage classes.
TECHNOLOGIES FOR DYNAMIC ACCELERATOR SELECTION
Technologies for dynamic accelerator selection include a compute sled. The compute sled includes a network interface controller to communicate with a remote accelerator of an accelerator sled over a network, where the network interface controller includes a local accelerator and a compute engine. The compute engine is to obtain network telemetry data indicative of a level of bandwidth saturation of the network. The compute engine is also to determine whether to accelerate a function managed by the compute sled. The compute engine is further to determine, in response to a determination to accelerate the function, whether to offload the function to the remote accelerator of the accelerator sled based on the telemetry data. Also the compute engine is to assign, in response a determination not to offload the function to the remote accelerator, the function to the local accelerator of the network interface controller.
Continuous data protection
Providing continuous data protection includes maintaining a database having substantially all data modifications made to a primary volume over a recovery interval. The database is maintained in conjunction with a copying operation where the data of the primary volume are mirrored to a remote volume to permit recovery of mirrored data in the event of loss of primary volume data. The contents of the remote volume generally lag behind the contents of the primary volume by substantially the recovery interval. Providing continuous data protection also includes providing data roll-back to a precise point in time within the recovery interval by applying, to the contents of the remote volume, all data modifications in the database that occurred between the latest data modification to the remote volume and the precise point in time within the recovery interval. A time stamp mechanism of sufficient precision and granularity may be used.
INTEGRATED HIERARCHICAL STORAGE MANAGEMENT
A tree data structure for a file is maintained. The tree data structure is used to capture different versions of the file at different moments of time. An access pattern associated with the file stored on a storage system is determined based at least in part on time-series data associated with the file using the tree data structure that captures different versions of the file at different moments in time. The determined access pattern indicates a period for which the file is likely to be accessed. The file is migrated from a secondary storage tier to a primary storage tier.