Patent classifications
G06F3/0605
Software Lifecycle Management For A Storage System
Software lifecycle management for a storage system, including: generating, based on user input, a user-defined software lifecycle management policy for software on one or more storage systems; identifying, in dependence upon on a software configuration of the one or more storage systems, one or more candidate updates for the software; and generating, in dependence upon the user-defined software lifecycle management policy, lifecycle management data that identifies one or more conforming updates from among the one or more candidate updates.
System log collection method
The present invention provides a method for collecting system logs, applied to an intelligent device with an Android system, wherein providing a daemon process for log collecting, and the daemon process is started when the system of an Android device is started; providing an application process for log processing; providing an external storage device for accessing the intelligent device; the method comprises the following steps: the daemon process collects the application framework layer and logs of the Linux kernel, and saves the logs in a first storage path of the Android system; the application process creating a second storage path in the external storage device after identifying the accessed external storage device; and the application process obtaining the logs from the first storage path and saving the logs in the second storage path.
Cluster claim
Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token. The established connection enables the user to manage a secondary storage system via the cloud service system.
System and method for test precondition generation based on factory-formatted state of memory device
A system and associated method for generating a test precondition. The system includes a test device and a storage device including user data blocks and system blocks. The test device reads, from the system blocks, an initial system data snapshot stored and represents a factory format; erases the system blocks and the user data blocks; writes data to selected user data blocks; generates system tables associated with the erasing and writing of the selected user data blocks; replaces the initial system data snapshot with the system tables; writes the replaced system tables to the system blocks; and performs one or more tests on the storage device.
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM
An information processing device performs control to record deletion information indicating that an object with a designated object ID has been deleted, on a recording medium, in a case where a specific object ID is designated and an instruction to delete the object is input, for a magnetic tape on which an object that includes data and metadata related to the data and that is assigned an object ID as identification information is recorded, the object being assigned an object ID in a case where the object is updated different from an object ID of the object before the update.
Minimizing Cost of Disk Fulfillment
A system can determine to produce a storage device for a user identity indicative of a user. The system can determine a number of extra disks to include with the storage device as part of the production, the extra disks enabling further storage capacity for the storage device beyond a specified storage capacity, the determining of the number of extra disks being based on data from a group of data, the group of data comprising first cost data representative of a first cost associated with including the second number of extra disks, probability data representative of a probability that the further storage capacity beyond the specified storage capacity will be requested during a defined time period after the production, and second cost data representative of a second cost associated with installing the second number of extra disks after the storage device has been delivered to the user site.
Secondary storage editor
Systems and methods for storage pruning can enable users to delete, edit, or copy backed up data that matches a pattern. Storage pruning can enable fine-grain deletion or copying of these files from backups stored in secondary storage devices. Systems and methods can also enable editing of metadata associated with backups so that when the backups are restored or browsed, the logical edits to the metadata can then be performed physically on the data to create a custom restore or a custom view. A user may perform operations such as renaming, deleting, modifying flags, and modifying retention policies on backed up items. Although the underlying data in the backup may not change, the view of the backup data when the user browses the backup data can appear to include the user's changes. A restore of the data can cause those changes to be performed on the backup data.
Apparatus, system, and method of byte addressable and block addressable storage and retrieval of data to and from non-volatile storage memory
A hybrid memory system provides rapid, persistent byte-addressable and block-addressable memory access to a host computer system by providing direct access to a both a volatile byte-addressable memory and a volatile block-addressable memory via the same parallel memory interface. The hybrid memory system also has at least a non-volatile block-addressable memory that allows the system to persist data even through a power-loss state. The hybrid memory system can copy and move data between any of the memories using local memory controllers to free up host system resources for other tasks.
Data processing on memory controller
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing data on a memory controller. One of the methods comprises obtaining a first request and a second request to access respective data corresponding to the first and second requests at a first memory device of the plurality of memory devices; and initiating interleaved processing of the respective data; receiving an indication to stop processing requests to access data at the first memory device and to initiate processing requests to access data at a second memory device, determining that the respective data corresponding to the first and second requests have not yet been fully processed at the time of receiving the indication, and in response, storing, in memory accessible to the memory controller, data corresponding to the requests which have not yet been fully processed.
COMPACTION POLICIES FOR APPEND-ONLY STORES
A method of reducing write amplification in an append-only memory store of data records, by which the store is subdivided into streams, each of which for storing records having an update frequency within a variable range of update frequencies. By defining an update frequency that does not rely on time, statistical methods can be used to select the streams in which data records can be written. The range of update frequencies of each stream can be fixed or variable and based on the stored records. The memory allocated to each stream can be determined based on numerically solving an optimization problem that determines the write amplification resulting from different memory allocations in the streams.