Patent classifications
G06F16/1824
METHOD AND APPARATUS FOR MANAGING FILE
An apparatuses for managing access to a file stored in a remote location includes detecting an attempt for a user terminal to access the file stored in the remote location, determining a location where the file attempted to be access is to be opened, in response to a determination that the location where the file is to be opened is remote, opening the file and providing a content of the opened file to the user terminal by a file management server and in response to a determination that the location where the file is to be opened is local, processing the file to be downloaded to the user terminal by the file management server.
Data processing system and data processing method
A data processing system according to one embodiment includes first and second data storage devices having a storage medium capable of permanently storing data; a data holding device having a storage medium capable of storing the data at a higher speed than the first and second data storage devices; and a controller that determines the type of data to be processed, and, in the case where the data to be processed is structured data, stores the data to be processed in the data holding device, then, collectively, in the first data storage device, and, in the case where the data to be processed is binary data, stores the data to be processed in the data holding device and in the second data storage device.
Approximate hash verification of unused blockchain output
An example operation may include one or more of receiving a location of an output stored on a data structure of a blockchain, where the location comprises a path of hashes generated by a reduced-step hash instead of a full-step hash of the blockchain, performing an approximate hash verification on the path of hashes based on the reduced-step hash values to verify whether the output is unused, and in response to a determination that the output is unused as a result of the approximate hash verification, approving a use of the output by a client associated with the output.
Assignment of longevity ranking values of storage volume snapshots based on snapshot policies
Techniques are provided for utilizing snapshot longevity information to manage snapshots in a snapshot-enabled storage system. A snapshot management system generates a snapshot volume tree which comprises snapshots associated with a given storage volume. The snapshot management system obtains a snapshot policy associated with the given storage volume, which comprises a snapshot creation and retention schedule that specifies retention lifespans of the snapshots. The snapshot policy is evaluated to automatically determine and assign respective longevity ranking values for the snapshots within the snapshot volume tree, wherein the longevity ranking value of a given snapshot represents a retention lifespan of the given snapshot as compared to retention lifespans of other snapshots as represented by their respective longevity ranking values. When a snapshot is deleted, the assigned longevity ranking values of the snapshots are utilized to select a snapshot to assume ownership of uniquely-written data that is owned by the deleted snapshot.
MANAGEMENT OF ACCESS CONTROL IN MULTI-CLOUD ENVIRONMENTS
A computer-implemented to control access to data on an off-premises storage system. The method includes defining an access policy for a plurality of files in a file system stored in an on-premises storage system. The method further includes registering the access policy with a first off-premises storage system. The method also includes creating a resource-based cloud access policy based on an on-premise access policy. The method includes determining a set of files from the plurality of files to migrate to the off-premises storage. The method also includes obtaining, for the set of files, an access policy as access metadata. The method further includes migrating the set of files and the access metadata to the off-premises storage.
DISPLAY MOUNT INTERFACESMANAGING ACCESS TO FILE-BASED DATABASE
According to aspects of the present disclosure, there are provided methods and computer program product for accessing a file-based database, the method comprising receiving, at a first process of a multi-process application, a request from a second process of the multi-process application to perform an operation on a file-based database; in response to receiving the request at the first process, beginning execution of a database access thread to perform the requested operation on the file-based database, and providing, by the first process, a result of the requested operation to the second process, and wherein if the requested operation is a write access to the file-based database, limiting to one a number of threads executing to perform operations on the file-based database while the database access thread to perform the write access is executing.
Apparatus and method for storing received data blocks as deduplicated data blocks
An apparatus stores received data blocks as deduplicated data blocks. The apparatus is configured to: maintain a plurality of containers, where a reference to a container is unique within the apparatus and each container includes one or more data segments and segment metadata for each data segment, the segment metadata including a segment identifier and a segment reference, where the segment identifier is unique within the container and the segment reference is unique within the apparatus; and maintain a plurality of deduplicated data blocks storing received data blocks, where each deduplicated data block includes a plurality of identified container references, where a container reference identifier is unique within the deduplicated data block, and an ordered list of one or more segment indicators.
Technologies for integrating cloud content items across platforms
An example method can include storing, on a CSM, a first content item and representations of second and third content items, the second content item having content/features enabled by a cloud service and designed for access through a native online application and the third content item having content/features supported by a local application and having additional features designed for access through a cloud service and native online application; when the first content item is invoked, presenting the content/features of the first content item; in response to a request to access the representation of the second or third content item, sending, to a cloud service, a request for the additional features of the third content item or the content/features of the second content item; and based on metadata received from a cloud service, providing the additional features/content of the third content item or the content/features of the second content item.
Providing smart contracts including secrets encrypted with oracle-provided encryption keys
Providing smart contracts including secrets encrypted with oracle-provided encryption keys is disclosed. In one example, a contract creator encrypts sensitive data necessary for executing a smart contract into ciphertext using a symmetric cryptographic key K, and also encrypts the symmetric cryptographic key K into a wrapper using a public cryptographic key e of a contract executor. The contract creator then generates an envelope using a public cryptographic key o of a contract oracle, where the envelope includes the wrapper encrypted using the public cryptographic key o and a policy that includes condition(s) precedent and is digitally authenticated. The smart contract, including the envelope and the ciphertext, is deployed to the contract executor. The sensitive data thus may be provided within the smart contract itself, while being protected from unauthorized access in the event the smart contract is malicious or is compromised.
Dynamically moving virtual machine (VM) data based upon context
Systems and methods for dynamically moving virtual machine (VM) data based upon context are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: select a VM having a plurality of VM files; identify, among the plurality of VM files, a movable VM file; and transfer the movable VM file from a first storage tier to a second storage tier based upon a usage classification associated with the movable VM file.