Patent classifications
G06F16/1734
LOCAL INDEXING FOR METADATA REPOSITORY OBJECTS
A method, a system, and a computer program product for retrieving metadata files using a local metadata index. A request to access one or more metadata files associated with at least one computing component is received. At least one primary key and at least secondary key identifying the computing component are determined. An identifier of a storage location storing the metadata files is associated with the primary key and the secondary key. A metadata index for the metadata files is generated. The metadata index includes the primary key, the secondary key, and the associated identifier of the storage location. The metadata index is stored in a memory location associated with the computing component. The stored metadata index is accessed and the metadata files are retrieved using the stored metadata index.
Distributed management of file modification-time field
A method for data storage includes assigning multiple different portions of a given object, which is stored in non-volatile storage, for access by multiple respective software modules running on one or more processors. Storage operations are performed by the software modules in the portions of the given object. Respective local values, which are indicative of most recent times the storage operations were performed in the given object by the respective software modules, are updated by the software modules. A global value is updated for the given object, by consolidating updates of the local values performed by the software modules.
Performing quantum file concatenation
Performing quantum file concatenation is disclosed herein. In one example, a quantum file manager receives a request to concatenate a first quantum file comprising a first plurality of qubits and a second quantum file comprising a second plurality of qubits. Responsive to receiving the request, the quantum file manager concatenates the first quantum file and the second quantum file into a concatenated quantum file comprising a third plurality of qubits, wherein the third plurality of qubits comprises a same number of qubits as a union of the first plurality of qubits and the second plurality of qubits, and stores an identical sequence of data values as the first plurality of qubits followed by the second plurality of qubits.
METHODS AND SYSTEMS FOR REDUCING THE STORAGE VOLUME OF LOG MESSAGES
Automated methods and systems for compressing log messages stored in a log message databased are described herein. The automated methods and systems perform lossy compression of an original set of log messages by identifying log messages that represent each of the various types of events recorded in the original set. The log messages in the original set are overwritten by corresponding representative log messages. Source coding is used to construct a source coding scheme and variable length binary codewords for each of the representative log messages. The representative log messages are replaced by the codewords, which occupies significantly less storage space than the original set. The lossy compressed set of log messages can be decompressed to obtain the representative log messages using the source coding scheme.
System and method for content synchronization
One embodiment of a system comprises a client device and a remote content management system. The client device comprises a synchronization manager that maintains a remote virtual model that models a synchronization state of a remote peer resource at the content management system and a local virtual model that models a synchronization state of a local peer resource in the local file system. The synchronization manager determines that the remote peer resource and local peer resource are out of sync based on a comparison of the remote virtual model and the local virtual model and synchronizes changes from the local cache to the content management system to update the remote peer resource or synchronizes changes from the content management system to update the local peer resource.
Detection of encrypting malware attacks
A computer-implemented method includes monitoring file access activity and generating an audit log based on the file access activity. The method also includes collecting samples of file usage activity, running a pattern recognition algorithm on the samples of the file usage activity for detecting malware activity, and, in response to detecting malware activity, restoring at least one file based on the audit log. A computer program product includes one or more computer readable storage media and program instructions collectively stored on the one or more computer readable storage media. The program instructions include program instructions to perform the foregoing method. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.
File level incremental continuous data protection
Creating point-in-time versions of files for applications at a storage system includes maintaining at the storage system a data structure correlating each of a plurality of applications with files for each of the applications and correlating each of the files with portions of the data storage system, using the data structure to determine specific files for a particular one of the applications for which a point-in-time version is being created, using the data structure to determine specific portions of the storage system corresponding to the specific files, suspending writes to the specific portions, completing previous writes to the specific portions following suspending writes, and performing a snapshot of the specific files following completing previous writes. The portions of the data storage may be extents. A host may provide information to the storage system to correlate applications with files and to correlate files with portions of the data storage system.
Storage System that Drives an Orchestrator based on Events in the Storage System
An illustrative method includes a storage management system detecting an event within a storage system, determining an operation based on the event, and providing a notification of the operation to an orchestration system configured to manage an execution of the operation by a computing system associated with the storage system.
Database Syncing
A method for database syncing is provided. The method includes receiving database change indicators indicating changes to a database. For each database change indicator, the method also includes determining whether the respective change to the database corresponds to a single change to a single version of the database, one of multiple changes to a common version of the database, or one of multiple changes to different versions of the database. The method further includes generating a change log compaction data structure comprising entries. Each entry includes an exact entry defining a corresponding single change to a corresponding single version of the database, a range entry defining corresponding multiple changes to a corresponding common version of the database, or an interval entry defining corresponding multiple changes to corresponding different versions of the database.
GENERATING A SUBQUERY FOR AN EXTERNAL DATA SYSTEM USING A CONFIGURATION FILE
Systems and methods are disclosed for receiving, at a data intake and query system, a query that includes an indication to process data managed by a third-party data storage and processing system that supports a different query language than the data intake and query system. The data intake and query system identifies a third-party data storage and processing system that manages the data to be processed and generates a subquery for execution by the third-party data storage and processing system, generates instructions for one or more worker nodes to receive and process results of the subquery from the third-party data storage and processing system, and instructs the worker nodes to provide results of the processing to the data intake and query system.