Patent classifications
G06F11/1469
Data masking in a microservice architecture
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Method of ensuring confidentiality and integrity of stored data and metadata in an untrusted environment
A system and method for storing and recovering a computer file. The method includes calculating fingerprint data of the file, separating the file into a plurality of data sub-files each having the same size and a single data sub-file having a smaller size than the other data sub-files, and attaching file metadata to the single data sub-file or as a metadata sub-file. The method also includes padding the single data sub-file including the metadata so that it is the same size as the plurality of data sub-files or the metadata sub-file so that it is the same size as the plurality of data sub-files, adding a header to each data sub-file that includes information about the sub-file, assigning a unique filename to each data sub-file, encrypting each data sub-file, and storing each data sub-file as separate files under their unique filename.
Automatic storage target recommendations using a storage classifier
Embodiments for a storage classifier that provides recommendations to a backup server for storage targets among a plurality of disparate target storage types. The storage classifier receives metadata (name, type, size), and the Service Level Agreement with information such as: retention time, Recovery Point Objective, and Recovery Time Objective) from the backup software. The backup software itself receives policy recommendations from a data label rules engine based on certain file attributes. The storage classifier receives an initial recommendation for the storage type and location (e.g., on-premises deduplication storage or public-cloud object storage, etc.) from a data classifier. Based on these inputs, the storage classifier provides recommended specific storage targets to the backup software on a file-by-file basis for data stored in a backup operation.
FILE PROCESSING DEVICE, FILE PROCESSING METHOD, AND PROGRAM
The present technology relates to a file processing device, a file processing method, and a program capable of reducing the number of images that the user loses. Restoration data for restoring a high efficiency image file format (HEIF) file storing a still image is written into the HEIF file. The HEIF file is restored using the restoration data. The present technology can be applied to processing of a HEIF file.
Replicating Changes Written by a Transactional Virtual Storage Access Method
Selectively committing or rolling-back in-flight units of recovery is provided. An indicator is read in a transaction identifier information record corresponding to a unit of recovery that is in-flight. It is determined whether the indicator indicates a commit for the unit of recovery that is in-flight. In response determining that the indicator does indicate the commit for the unit of recovery that is in-flight, the unit of recovery that is in-flight corresponding to the transaction identifier information record is committed to form a committed unit of recovery. The committed unit of recovery corresponding to the transaction identifier information record is sent to a target system for further processing.
Memory, memory system, operation method of the memory, and operation of the memory system
A method for operating a memory includes determining to perform an error correction operation; determining whether to perform an error correction operation; generating an internal address when the error correction operation is performed; reading data from memory cells that are selected based on the internal address and an error correction code corresponding to the data; performing an error correction operation on the data based on the error correction code to produce an error-corrected data; writing the error-corrected data and an error correction code corresponding to the error-corrected data into the memory cells; determining one or more regions among regions in the memory as a repair-requiring region based on an error detected when the error correction operation is performed; receiving a first command; backing up the data and the error correction code into a redundant region in response to the first command; and repairing the repair-requiring region with the redundant region.
Multiple data labels within a backup system
Embodiments for a method performing data migration such as backups and restores in a network by identifying characteristics of data in a data saveset to separate the data into defined types based on respective characteristics, assigning a data label to each defined type by receiving user selection or automatically merging or selecting a priority label, from among many labels associated with a file, defining migration rules for each data label, discovering assigned labels during a migration operation; and applying respective migration rules to labeled data in the data saveset. The migration rules can dictate storage location, access rights, replication periods, retention periods, and similar parameters.
Backup system including a data protection area and a read-only volume used by a controller to read a copy of backup data from the data protection area
Provided is a backup system including a storage system and a backup server, in which the backup server includes a ledger for managing a copy number and a backup acquisition date and time for each backup image, a data volume that stores data accessed by a business server, a backup image volume that stores a plurality of backup images at different time points of the data volume, an access volume having a volume ID for accessing the backup image from the backup server, and a data protection area including at least one volume having an internal volume ID instead of the volume ID for accessing from the backup server are configured in the storage system, and the backup image stored in the data protection area and the access volume are associated, and the backup image in the data protection area is provided to the backup server.
Filter reset for cloud-based analytics engine
A method for accessing data stored in a database may include generating a snapshot of a definition of a data story that includes a software widget configured to receive inputs for creating, based on a portion of data stored in the database, a data presentation providing a visual representation of the data. In response to a first indication to apply a filter removing some of the data associated with the data presentation, modifying a runtime definition of the data story to reflect the application of the filter. In response to a second indication to reset the filter, restoring the data story to a state prior to the application of the filter by replacing the runtime definition of the data story with the snapshot of the definition of the data story. Related systems and articles of manufacture are also provided.
System and method for facilitating improved performance in ordering key-value storage with input/output stack simplification
During operation, a key-value storage system can receive a request to write data to a data region in a first non-volatile memory. The system can determine a key associated with the data and the key can correspond to an entry in a data structure maintained by a volatile memory the storage system. In response to determining the key, the system can write the data to the data region in the first non-volatile memory. The system can update in the volatile memory the data structure entry corresponding to the key with a physical location in the data region of the first non-volatile memory to which the data is written. The system can write the data structure update to a second non-volatile memory. The system can then store a snapshot of the data structure in a metadata region associated with the first non-volatile memory, thereby allowing persistent storage of the data structure.