Patent classifications
G06F16/122
Methods for replicating data and enabling instantaneous access to data and devices thereof
A method, non-transitory computer readable medium, and device that replicates data and provides instantaneous access to data includes receiving in a destination volume one or more named data extents and one or more references to the one or more named data extents associated with a file in parallel from a source volume. A determination is made to check whether the one or more references arrive before the one or more named data extents arrive. Each of the received one or more references which are determined to have arrived prior to the one or more data extents is allocated as absent by the storage management computing device. An instantaneous access to the file is provided during the allocation.
Information processing method and apparatus, storage medium, and electronic device
An information processing method, comprising: in response to that a third party application receives an information display instruction, generating a download instruction; transmitting the download instruction to a processing platform, for prompting the processing platform to download a configuration file according to the download instruction; controlling the processing platform to parse the configuration file to generate display parameters; obtaining target information by analyzing the display parameters, and displaying the target information in the third party application.
Event driven migration, recall, and data placement optimization based on custom metadata
A computer-implemented method includes receiving custom metadata for several data items, the data items having system metadata associated therewith, selecting, based on the custom metadata, some of the data items to move between a primary storage system and a secondary storage system, and moving the selected data item(s) between the primary storage system and the secondary storage system. A computer program product includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.
Efficient filename storage and retrieval
The disclosed technology relates to a system configured to detect a modification to a node in a tree data structure. The node is associated with a content item managed by a content management service as well as a filename. The system may append the filename and a separator to a filename array, determine a location of the filename in the filename array, and store the location of the filename in the node.
SYSTEMS AND METHODS FOR MACHINE LEARNING CLASSIFICATION-BASED AUTOMATED REMEDIATIONS AND HANDLING OF DATA ITEMS
A machine learning-informed method executing automated workflows for digital file handling includes computing, by file classification machine learning models, a machine learning classification inference for each of a plurality of distinct digital files of a corpus of digital files; curating a plurality of distinct sub-corpora of digital files based on the machine learning classification inference associated with each of the plurality of distinct digital files, wherein the at least one machine learning classification inference comprises a digital file type classification inference of a plurality of distinct digital file type classification inferences; and selectiyely executing an automated digital file handling workflow for at least one sub-corpus based on the digital file type classification inference, wherein the automated digital file handling workflow includes a sequence of computer-executable tasks that, when executed, operates to modify one or more of a residency, permissions, and file metadata associated with each of the distinct digital files.
Session templates
Techniques are disclosed herein for identifying, recording and restoring the state of a database session and various aspects thereof. A session template data structure is generated that includes session attribute values describing various aspects of the session that is established between a client system and a database management system (DBMS and enables the client system to issue to the DBMS commands for execution. Based on the session attribute values, DBMS may generate a template identifier corresponding to the session template data structure. The template identifier may be stored in an association with the session state that it partially (or in whole) represents. In an embodiment, when another state of a session is captured, if the template identifier for the state is the same, then rather than storing the attribute-value pairs for the other state, the template identifier is further associated with the other state. In an embodiment, a request boundary is detected where the session is known to be at a recoverable point. If recovery of the session is needed, the session state is restored, and replay of commands start from this point. Each command replayed is verified to produce the same session state as it produced at original execution. If the session is determined to be a safe point, then all the commands recorded for replay prior to the safe point may be deleted. In an embodiment, the template is used to set the initial state when borrowing from a session pool The state tracking is also used to know that the session can be failed over safely during planned operation as the session is unlikely to drain by itself even when not used.
Information processing apparatus for registered files and issuing identification information for tracking an evaluation of a user using the files
An information processing apparatus includes: a processor configured to: when performing control of outputting a file from a storage unit in accordance with a request from a using user, issue second identification information to the using user, the file having been stored by a registering user in the storage unit, the file being associated with first identification information for identifying the file, the second identification information to be used for recording information related to use of the file; and upon receipt of the second identification information from the using user, perform control of recording the information related to the use of the file.
Storage System that Drives an Orchestrator based on Events in the Storage System
An illustrative method includes a storage management system detecting an event within a storage system, determining an operation based on the event, and providing a notification of the operation to an orchestration system configured to manage an execution of the operation by a computing system associated with the storage system.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Facilitating outlier object detection in tiered storage systems
Facilitating outlier object detection in tiered storage systems is provided herein. A system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise determining respective parameters associated with objects of a group of objects of a tiered storage system. The respective parameters can comprise at least one of a size, an access percentage, or a cost. The operations also can comprise using the respective parameters associated with the objects of the group of objects as inputs and performing data clustering on the group of objects, resulting in at least one data cluster. Further, the operations can comprise selecting at least one object from the group of objects as at least one outlier object within the tiered storage system based on the at least one data cluster.