G06F16/172

Prefetching and/or computing resource allocation based on predicting classification labels with temporal data

Methods, systems and computer program products are provided for prefetching information and/or (pre)allocating computing resources based on predicting classification labels with temporal data. A trained temporal classification model forecasts events (e.g., too numerous for individual modeling) by predicting classification labels indicating whether events will occur, or a number of occurrences of the events, during each of a plurality of future time intervals. Time-series datasets, indicating whether events occurred, or a number of occurrences of the events, during each of a plurality of past time intervals, are transformed into temporal classification datasets. Classifications may be based, at least in part, on extracted features, such as data seasonality, temporal representation, statistical and/or real-time features. Classification labels are used to determine whether to take one or more actions, such as, for example, prefetching information or (pre)allocating a computing resource.

VIRTUALIZATION ENGINE FOR VIRTUALIZATION OPERATIONS IN A VIRTUALIZATION SYSTEM
20220413888 · 2022-12-29 ·

Methods, systems, and computer storage media for providing virtualization operations—including an activate operation, suspend operation, and resume operation for virtualization in a virtualization system. In operation, a unique identifier and file metadata associated with a first file stored in a cache engine. The cache engine manages the first file of an application running on the virtual machine to circumvent writing file data of the first file to an OS disk during a suspend operation of the virtual machine and circumvents reading file data of the first file from the OS disk during a resume operation of the virtual machine. Based on a resume operation associated with the virtual machine and the file metadata, file data of the first file that is stored in the cache engine is accessed. The file data is communicated to the virtual machine, the virtual machine is associated with the suspend and the resume operation.

INTELLIGENT CACHE MANAGEMENT FOR MOUNTED SNAPSHOTS BASED ON A BEHAVIOR MODEL

A client computing device receives a behavior model corresponding to a user group associated with a user. The behavior model has been trained with monitored user interactions of one or more files associated with the user group. The client computing device further mounts a snapshot of a file and determines, based on the behavior model, which files of the mounted snapshot to transfer to a locally accessible cache. During use of the client computing device, the client computing device may determine whether the mounted snapshot is accessible. If the mounted snapshot is not accessible, the client computing device may selectively delete, based on the behavior model, one or more of the files stored in the locally accessible cache. If the mounted snapshot is accessible, the client computing device may update the one or more files of the locally accessible cache with monitored user interactions with the mounted snapshot.

Techniques for handling letter case in file systems

Described herein are technologies that provide an element of security related to file system operations. Individual nodes in a file system, such as a directory or a file, can be associated with information that describes how to handle letter case when a file name included in a file system operation request is used to locate a file in the file system. For example, a case sensitive designation associated with a directory can require a case sensitive match between a file name included in a request and a file name included in the directory, in order to perform the requested file system operation. In another example, a case preferring designation associated with a directory first checks for a case sensitive match between file names. If a case sensitive match does not exist, then a case insensitive match between the file names can be used to perform the requested file system operation.

Techniques for handling letter case in file systems

Described herein are technologies that provide an element of security related to file system operations. Individual nodes in a file system, such as a directory or a file, can be associated with information that describes how to handle letter case when a file name included in a file system operation request is used to locate a file in the file system. For example, a case sensitive designation associated with a directory can require a case sensitive match between a file name included in a request and a file name included in the directory, in order to perform the requested file system operation. In another example, a case preferring designation associated with a directory first checks for a case sensitive match between file names. If a case sensitive match does not exist, then a case insensitive match between the file names can be used to perform the requested file system operation.

BATCH DELETION METHOD AND APPARATUS FOR CACHE CONTENTS, DEVICE AND READABLE STORAGE MEDIUM
20220405244 · 2022-12-22 ·

A batch deletion method, apparatus, and device for cached content and a non-transitory computer-readable storage medium are disclosed. The method may include: adding keywords to content identifiers which correspond to cached resources (S101); saving the content identifiers separately (S102); finding, through a keyword-based query, content identifiers meeting at least one condition (S103); locating storage paths of cached resources by using the content identifiers meeting the at least one condition (S104); and deleting the located cached resources one by one (S105).

BATCH DELETION METHOD AND APPARATUS FOR CACHE CONTENTS, DEVICE AND READABLE STORAGE MEDIUM
20220405244 · 2022-12-22 ·

A batch deletion method, apparatus, and device for cached content and a non-transitory computer-readable storage medium are disclosed. The method may include: adding keywords to content identifiers which correspond to cached resources (S101); saving the content identifiers separately (S102); finding, through a keyword-based query, content identifiers meeting at least one condition (S103); locating storage paths of cached resources by using the content identifiers meeting the at least one condition (S104); and deleting the located cached resources one by one (S105).

SYSTEM AND METHOD FOR INSTANT ACCESS AND MANAGEMENT OF DATA IN FILE BASED BACKUPS IN A BACKUP STORAGE SYSTEM USING TEMPORARY STORAGE DEVICES
20220398164 · 2022-12-15 ·

A method for managing file based backups (FBBs) includes obtaining, by a FBB metadata file manager and by an application, a file request for a file stored in a FBB, wherein the FBB is stored in a backup storage system, identifying, using a FBB metadata file of the FBB, a storage location of the file, initiating generation of a temporary storage device, storing a copy of the file in the temporary storage device using the storage location and the FBB, and initiating, after the storing, access to the copy of the file for the application.

TRANSIENT CACHING TO SUPPORT SHORT-TERM RECALL OF TIERED FILES

A method comprises receiving a request to configure a temporary cache associated with at least one storage array and configuring the temporary cache in response to the request. In the method, the temporary cache is exposed to a tiering software portion of a tiering appliance for a designated time period, and a portion of data from one or more cloud storage platforms is stored in the temporary cache. The method also includes retrieving the portion of the data from the temporary cache in response to one or more read requests from one or more user devices, and removing the temporary cache in response to expiration of the designated time period.

TRANSIENT CACHING TO SUPPORT SHORT-TERM RECALL OF TIERED FILES

A method comprises receiving a request to configure a temporary cache associated with at least one storage array and configuring the temporary cache in response to the request. In the method, the temporary cache is exposed to a tiering software portion of a tiering appliance for a designated time period, and a portion of data from one or more cloud storage platforms is stored in the temporary cache. The method also includes retrieving the portion of the data from the temporary cache in response to one or more read requests from one or more user devices, and removing the temporary cache in response to expiration of the designated time period.