G06F16/1824

Generating configuration data enabling remote access to portions of a snapshot lineage copied to cloud storage

An apparatus comprises at least one processing device configured to select a snapshot lineage comprising one or more snapshots of a storage volume comprising data stored on one or more storage devices of a storage system, the snapshot lineage comprising at least one cloud snapshot lineage, the at least one cloud snapshot lineage comprising at least a subset of the one or more snapshots of the storage volume that have been copied to cloud storage of at least one cloud external to the storage system. The at least one processing device is also configured to generate configuration data for accessing the at least one cloud snapshot lineage. The at least one processing device is further configured to transfer the configuration data to at least one additional processing device to enable the at least one additional processing device to access the at least one cloud snapshot lineage.

Techniques for data deduplication
11573928 · 2023-02-07 · ·

Techniques for processing data may include: receiving a data block stored in a data set, wherein a hash value is derived from the data block; determining, in accordance with selection criteria, whether the hash value is included in a subset; responsive to determining the hash value is included in the subset, performing processing that updates a table in accordance with the hash value and the data set, and determining, in accordance with the information in the table, whether to perform deduplication processing for the data block to determine whether the data block is a duplicate of another stored data block. The table may include an entry for the hash value. The entry may include information identifying data sets referencing the data block and, for each of the data sets, may specify a reference count denoting a number of times the data set references the data block.

Smart near-real-time folder scan based on a breadth first search

In response to a folder event received for a first folder, a first work item is dequeued from an ID queue and metadata of the first folder, and immediate children of the first folder, is fetched and enqueued as work items in a metadata queue. If further first folder children remain to be scanned, the first work item is updated with child IDs for each immediate child of the first folder that is a folder, and it is inserted into the ID queue. In a second pass, a child ID is dequeued and metadata of immediate children of the folder associated with the child ID is fetched and enqueued as work items in the metadata queue. The second pass is repeated for all child IDs in the updated work item. This process is repeated for each generation of children of the first folder or until a specified limit is met.

Method and system for providing storage checkpointing to a group of independent computer applications

A system and method for storage checkpointing to a group of independent computer applications. The system has a storage disk that stores files; a storage access interface to access the storage disk; and a computer. The computer runs the group of independent computer applications and utilizes the files stored on the storage disk. A file system on the server accesses the files stored on the storage disk. An operating system and at least one device driver can be called by the file system, and at least one buffer buffers first data written to the storage disk and second data read from the storage disk.

Constructing a multiple entity root of trust

In a general aspect, a multiple-entity root of trust is constructed and maintained for use in a cryptography system. In some aspects, a genesis data block includes genesis block data entries representing respective member entities of a root of trust consortium. A genesis block is generated by digitally signing the genesis data block. The genesis block is provided for use by end entities as a root of trust in a cryptography system. In some aspects, a hash of an existing block of a chain is obtained, and a data block comprising a data entry is generated. The data entry identifies an action by one or more member entities of the root of trust consortium. A new block of the chain is generated by digitally signing a combination of the data block and the hash of the existing block. The new block is provided for use by end entities as the root of trust in the cryptography system.

DYNAMICALLY SELECTING AN APPLICATION TO OPEN A FILE
20230035500 · 2023-02-02 ·

An application can be dynamically selected to open a file. An application broker service can be configured to received intercepted requests to open files. The application broker service can process the intercepted requests to determine a type and location of the files to be opened. Using the type and the location of the files to be opened, the application broker service can select applications to open the files. If a file fails to open in a selected application, the application broker service can select another application to open the file.

SHARED STORAGE MODEL FOR HIGH AVAILABILITY WITHIN CLOUD ENVIRONMENTS
20230087493 · 2023-03-23 ·

Techniques are provided for a high availability solution (e.g., a network attached storage (NAS) solution) with address preservation during switchover. A first virtual machine is deployed into a first domain and a second virtual machine is deployed into a second domain of a computing environment. The first and second virtual machines are configured as a node pair for providing clients with access to data stored within an aggregate comprising one or more storage structures within shared storage of the computing environment. A load balancer is utilized to manage logical interfaces used by clients to access the virtual machines. During switchover, the load balancer preserves an IP address used to mount and access a data share of the aggregate used by a client.

File management apparatus, file management method, and file management program

A file management apparatus displays an icon of a file where a shortcut on a cloud storage refers to the file within the cloud storage. A file management apparatus which is connected to a cloud storage on a cloud network via a network and which displays content of a folder within the cloud storage, displays an icon for directly opening a second file or a second folder in a first display region of the file management apparatus for showing content of a first folder in a case where a shortcut file stored in the first folder within the cloud storage is a shortcut file which refers to the second file or the second folder existing outside the first folder, and in which a link to the second file or the second folder is set as a link to a website.

CLOUD MIGRATION FOR LEGACY ON-PREMISES PROCESS CODE
20230089662 · 2023-03-23 ·

Various examples are directed to systems and methods for operating a database management system (DBMS) in a cloud environment. An assembly worker executing at a first computing device may provide a first database protocol message generated by a process code executing at the first computing device. A translation engine executed at the cloud environment may translate the first database protocol message from a first format to a second format associated with a DBMS instance executing at the cloud environment to generate a translated first database protocol message. The translation engine may cause the translated first database protocol message to be provided to the DBMS instance and may receive, from the DBMS instance, a first reply corresponding to the translated first database protocol message. The first reply may be sent to the process code.

HETEROGENOUS REPLICATION IN A HYBRID CLOUD DATABASE
20230091577 · 2023-03-23 ·

Aspects of the invention include splitting a first file retrieved from a first cloud computing environment of a hybrid cloud computing environment into multiple chunks. A respective chunk signature is calculated for each chunk of the multiple chunks, wherein the calculation is based at least in part on static metadata and the dynamic metadata retrieved from the first file. The respective chunk signatures are compared to chunk signatures from a metadata repository to identify a duplicate second file, wherein the first file is a variant of a second file stored in a second cloud computing environment of the hybrid cloud computing environment. Either the first file or the second file is selected as candidate for deletion. The candidate for deletion is deleted.