Patent classifications
H04L67/1095
Allocating cache memory in a dispersed storage network
A method for execution by a dispersed storage network (DSN) managing unit includes receiving access information from a plurality of distributed storage and task (DST) processing units via a network. Cache memory utilization data is generated based on the access information. Configuration instructions are generated for transmission via the network to the plurality of DST processing units based on the cache memory utilization data.
Allocating cache memory in a dispersed storage network
A method for execution by a dispersed storage network (DSN) managing unit includes receiving access information from a plurality of distributed storage and task (DST) processing units via a network. Cache memory utilization data is generated based on the access information. Configuration instructions are generated for transmission via the network to the plurality of DST processing units based on the cache memory utilization data.
Garbage collection for a deduplicated cloud tier using functions
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations. For deduplicated data stored in a cloud-based storage or in a cloud tier that stores containers containing dead and live segments or dead and live regions such as compression regions, the dead compression regions are deleted by copying the live compression regions into new containers and then deleting the old containers. The copy forward is based on a recipe from a data protection system and is performed using a serverless approach.
Garbage collection for a deduplicated cloud tier using functions
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations. For deduplicated data stored in a cloud-based storage or in a cloud tier that stores containers containing dead and live segments or dead and live regions such as compression regions, the dead compression regions are deleted by copying the live compression regions into new containers and then deleting the old containers. The copy forward is based on a recipe from a data protection system and is performed using a serverless approach.
Maintaining a cached version of a file at a router device
A router device may receive, from a user device, a request for access to a file. The router device may determine that a cached version of the file is stored in a first data structure associated with the router device. The router device may communicate with a server device to determine whether the cached version of the file is current. The server device may be associated with a second data structure that stores a master version of the file. The router device may generate a copy of the cached version of the file based on communicating with the server device. The router device may send the copy of the cached version of the file to the user device.
CLOUD SYSTEM MIGRATION METHOD AND DEVICE, AND HYBRID CLOUD SYSTEM
The present disclosure relates to the technical field of cloud computing, and to a cloud system migration method and device, and a hybrid cloud system. The method includes: dividing each service system in a first cloud system into a plurality of modules; determining the relation between a module to be migrated among the plurality of modules and other modules; copying said module among the plurality of modules to a second cloud system, the type of the first cloud system being different from that of the second cloud system; and establishing a relation in the second cloud system to complete the migration of the first cloud system.
CLOUD SYSTEM MIGRATION METHOD AND DEVICE, AND HYBRID CLOUD SYSTEM
The present disclosure relates to the technical field of cloud computing, and to a cloud system migration method and device, and a hybrid cloud system. The method includes: dividing each service system in a first cloud system into a plurality of modules; determining the relation between a module to be migrated among the plurality of modules and other modules; copying said module among the plurality of modules to a second cloud system, the type of the first cloud system being different from that of the second cloud system; and establishing a relation in the second cloud system to complete the migration of the first cloud system.
CROSS-CHAIN COLLABORATIVE GOVERNANCE SYSTEM, METHOD AND DEVICE AND STORAGE MEDIUM
A cross-chain collaborative governance system is configured to perform collaborative service and control governance on cross-chain interoperation between application subchains in a cross-chain alliance. The cross-chain collaborative governance system includes: a cross-chain access application layer configured to make a first application subchain and a second application subchain access the cross-chain collaborative governance system; a credible cross-chain collaborative layer configured to provide collaborative service for cross-chain interoperation between the first application subchain and the second application subchain; and a credible cross-chain governance layer configured to perform control governance on the cross-chain interoperation between the first application subchain and the second application subchain.
Dynamic throughput ingestion of backup sources
A method and apparatus for dynamically adjusting an ingestion rate for backup operations on a source system. The method generally includes monitoring a resource utilization related to one or more performance metrics of the source system in performing at least a primary workload. Based on the monitored resource utilization, the backup system determines a data ingestion rate for backup operations on the source system. The backup system ingests data from the source system to a backup repository at the determined data ingestion rate.
Dynamic throughput ingestion of backup sources
A method and apparatus for dynamically adjusting an ingestion rate for backup operations on a source system. The method generally includes monitoring a resource utilization related to one or more performance metrics of the source system in performing at least a primary workload. Based on the monitored resource utilization, the backup system determines a data ingestion rate for backup operations on the source system. The backup system ingests data from the source system to a backup repository at the determined data ingestion rate.