Patent classifications
G06F11/1446
Serverless Application Function Execution
Executing serverless application functions is provided. A response to a user request for a service is received with an include callback parameter and a transaction identifier of the user request included in a header of the response from an external service via a network. A checkpoint of a container corresponding to the service is retrieved from a data store using the transaction identifier of the user request. The container corresponding to the service is restored using the checkpoint to process the response received from the external service.
System and method for hybrid kernel and user-space checkpointing using a character device
A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications using a character device. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
System and method for partition-scoped snapshot creation in a distributed data computing environment
A system and method for partitioned snapshot creation of caches in a distributed data grid is provided. The system and method enables a snapshot to be created in a running system without quiescing a cache service. Moreover for each particular partition, execution of read/write requests are not blocked during the period that a snapshot creation task is being performed for the particular partition. The cache service thread continues to execute read requests for all partitions with write requests for the partition under snapshot experiencing delayed response. The system and method reduces the period of time for which partitions are unavailable during a snapshot process and increases the availability of cache services provided by a distributed data grid compared to prior snapshot systems.
Assessing Protection For Storage Resources
Assessing protection for storage resources, including: identifying a set of active data protection features for one or more storage resources; generating a data protection assessment based on the set of active data protection features; and reporting the data protection assessment.
Quantum key distribution in a multi-cloud environment
In an approach to improve the field of multi-cloud environments by detecting data corruption between storage systems. Embodiments perform information tunneling on data transferring between a source storage system and a target storage system. Further, embodiments determine a checksum data of a data payload does not match an Internet Protocol (IP) packet extracted checksum and a blockchain based checksum and compare the checksum data at the target storage system with the IP packet extracted checksum and the blockchain based checksum to identify one or more checksum mismatches. Additionally, embodiments identify a corruption in a data payload based on the comparison between the checksum data at the target storage system and the IP packet extracted checksum and the blockchain based checksum, validate the corruption in the data payload, and update respective entities of identified corruption in the data payload.
UPGRADING OR UPDATING A SOFTWARE APPLICATION
In a computer-implemented method for upgrading or updating a software application installed on a host system, a first map of an operating system of the host system is generated. The operating system of the host system is started inside a virtual machine environment using the first map, and the software application is updated or upgraded in the virtual machine environment. A second map of the operating system in the current state with the updated or upgraded software application is generated in the virtual machine environment, and the second map of the operating system is loaded inside the host system.
Systems and methods for continuity of dataflow operations
A SaaS system and methods for capturing dataflow integration and optimizing continuity of operation are presented. Consistent with some embodiments, the method may include receiving a dataflow, and calculating a plurality of attribute scores for the dataflow. The method may further include causing a client device to automatically store a dataflow from the dataflow in response to determining that at least a portion of the plurality of attribute scores are above a predefined threshold. The method may further include receiving a dataflow from a recording application associated with a client device and providing to the user of the client device dataflow-recording directions which are adapted to predetermined criteria that correspond to the purpose of dataflow-recording, the type of activity to be presented in said dataflow.
SYSTEM AND METHOD TO MANAGE LARGE DATA IN BLOCKCHAIN
A computer implemented method for managing large and sensitive data in a blockchain includes determining a master block store node from a plurality of block store nodes to add large and sensitive data to the blockchain after validation, and generating a block including the large and sensitive data that is validated and its metadata. If the block store nodes, a plurality of block verifier nodes and a plurality of block backup nodes of the blockchain are in synchronization, the method adds, using the master block store node, the block to its chain and generates a synchronization request to the block store nodes, the block verifier nodes and the block backup nodes of the blockchain. Based on assigned roles, the method performs enabling the block store nodes to store the block, enabling the block verifier nodes to store only the metadata, and enabling the block backup nodes to store the block.
STORAGE SYSTEM
A first storage controller includes a first input and output controller performs input and output processing on host data, and a first management controller. A second storage controller includes a second input and output controller performs input and output processing on host data, and a second management controller. The first management controller is configured to verify software to be executed by the first management controller and software to be executed by the first input and output controller. The second management controller is configured to verify software to be executed by the second management controller and software to be executed by the second input and output controller. The first management controller is configured to verify the software to be executed by the second input and output controller in place of the second management controller when a failure is detected from the second management controller.
Recovery of a software-defined data center from persistent entity stores for virtual machines
Examples described herein include systems and methods for backing up and recovering a software-defined data center (“SDDC”). In one example, entities of the SDDC, such as virtual machines, hosts, and clusters, can coexist with corresponding entity stores. The entity stores can store current state information for each SDDC entity. For example, an identifier or name of a virtual machine can be stored in that virtual machine's corresponding entity store. When recovery of a controller is needed, the controller can rebuild state information that has changed after the controller was backed up, by retrieving state information from entity stores of the various SDDC entities.