Patent classifications
H04L2012/6467
Policy-based access in a dispersed storage network
A method for execution by a computing device begins by receiving from a requester a read request regarding a set of encoded data slices stored in a set of storage units. The method continues by obtaining an access policy for the read request that includes time varying availability patterns for the set of storage units. The method continues by retrieving from a first group of storage units, during a first time varying availability pattern, first encoded data slices of the set of encoded data slices. The method continues by retrieving from a second group of storage units, during a second time varying availability pattern, second encoded data slices of the set of encoded data slices. The method continues by determining whether the decode threshold number of encoded data slices has been retrieved. When yes, the method continues by decoding the encoded data slices to recover the data segment.
Collaborative communications
Data traffic routing and/or transmission parameter adaption decisions are made at a sending node by considering error patterns of one or more possible receiving nodes at the bit level. Data traffic routing and/or transmission parameter adaption decisions may be used to preemptively prevent data errors from occurring as data traffic is transmit by a sending node. The error pattern information may include information on numbers of bit errors in a code word or information on relative randomness or burstiness of bit error patterns at the one or more possible receiving nodes. The collaboratively shared error pattern information may be determined and updated over time intervals or upon selected conditions occurring. In one embodiment, a next hop node may be determined using bit error patterns of neighbor nodes. In another embodiment, transmission parameter adaption or channel selection may be determined using bit error patterns.
Supporting popularization of information and communications technology in the field of education
There is provided an information processing apparatus that readily supports to provide hardware resources for implementing ICT education in the field of education. The information processing apparatus includes a device information receiver that receives, via a network, device information for identifying a device connected to a portable terminal, an education application selector that selects, based on the device information, an education application to be provided to the device, and an education application provider that provides the education application to the device via the network and the portable terminal.
POLICY-BASED STORAGE IN A DISPERSED STORAGE NETWORK
A method for execution by a dispersed storage and task (DST) processing unit operates to receive a write threshold number of slices of a data object and an access policy; determine a current timestamp that indicates a current time value; and store the write threshold number of slices, the access policy, and the timestamp in a plurality of storage units of a dispersed storage network (DSN).
Policy-based storage in a dispersed storage network
A method for execution by a dispersed storage and task (DST) processing unit operates to receive a write threshold number of slices of a data object and an access policy; determine a current timestamp that indicates a current time value; and store the write threshold number of slices, the access policy, and the timestamp in a plurality of storage units of a dispersed storage network (DSN).
Virtual target port aggregation
Approaches for aggregating ports of switch connected to ports of a target node, are described. In one example, for a fiber channel exchange received from a host node, for a target node a plurality of target node ports of the target node associated with the virtual port are determined. The fiber channel exchange comprises a sequence of frame. Once the plurality of target node ports are determined, a first frame is directed to one target node port selected from the plurality of the target node ports, where the one target node port is selected based port selection criteria. Based on the directing of the first frame, subsequent frames of the fiber channel exchange to the selected one target node port are also directed.
ACCESS POLICY UPDATES IN A DISPERSED STORAGE NETWORK
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices and determine whether to establish a new access policy corresponding to the one or more slices. When the new access policy is to be established, the method determines a timestamp; determines a new access policy; and sends the new access policy and the timestamp to one or more storage units that store the one or more slices.
Access policy updates in a dispersed storage network
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices and determine whether to establish a new access policy corresponding to the one or more slices. When the new access policy is to be established, the method determines a timestamp; determines a new access policy; and sends the new access policy and the timestamp to one or more storage units that store the one or more slices.
COLLABORATIVE COMMUNICATIONS
In a first device incorporating a processor and a memory in communication with the processor, the memory includes executable instructions that, when executed, cause the processor to control the first device to perform functions of receiving a bit error pattern of data traffic transmission from the first device to a second device, the bit error pattern including a number and locations of bit errors which occurred during the data traffic transmission; and adapting at least one transmission parameter of the first device based on the received bit error pattern. The error pattern allows more refined data traffic decisions.
POLICY-BASED ACCESS IN A DISPERSED STORAGE NETWORK
A method for execution by a computing device begins by receiving from a requester a read request regarding a set of encoded data slices stored in a set of storage units. The method continues by obtaining an access policy for the read request that includes time varying availability patterns for the set of storage units. The method continues by retrieving from a first group of storage units, during a first time varying availability pattern, first encoded data slices of the set of encoded data slices. The method continues by retrieving from a second group of storage units, during a second time varying availability pattern, second encoded data slices of the set of encoded data slices. The method continues by determining whether the decode threshold number of encoded data slices has been retrieved. When yes, the method continues by decoding the encoded data slices to recover the data segment.