Patent classifications
H04L67/1097
Methods for updating reference count and shared objects in a concurrent system
A method for to manage concurrent access to a shared resource in a distributed computing environment. A reference counter counts is incremented for every use of an object subtype in a session and decremented for every release of an object subtype in a session. A session counter is incremented upon the first instance of fetching an object type into a session cache and decremented upon having no instances of the object type in use in the session. When both the reference counter and the session counter are zero, the object type may be removed from the cache.
Methods for updating reference count and shared objects in a concurrent system
A method for to manage concurrent access to a shared resource in a distributed computing environment. A reference counter counts is incremented for every use of an object subtype in a session and decremented for every release of an object subtype in a session. A session counter is incremented upon the first instance of fetching an object type into a session cache and decremented upon having no instances of the object type in use in the session. When both the reference counter and the session counter are zero, the object type may be removed from the cache.
Extensible and elastic data management services engine external to a storage domain
A data management services architecture includes architectural components that run in both a storage and compute domains. The architectural components redirect storage requests from the storage domain to the compute domain, manage resources allocated from the compute domain, ensure compliance with a policy that governs resource consumption, deploy program code for data management services, dispatch service requests to deployed services, and monitor deployed services. The architectural components also include a service map to locate program code for data management services, and service instance information for monitoring deployed services and dispatching requests to deployed services. Since deployed services can be stateless or stateful, the services architecture also includes state data for the stateful services, with supporting resources that can expand or contract based on policy and/or service demand. The architectural components also include containers for the deployed services.
Extensible and elastic data management services engine external to a storage domain
A data management services architecture includes architectural components that run in both a storage and compute domains. The architectural components redirect storage requests from the storage domain to the compute domain, manage resources allocated from the compute domain, ensure compliance with a policy that governs resource consumption, deploy program code for data management services, dispatch service requests to deployed services, and monitor deployed services. The architectural components also include a service map to locate program code for data management services, and service instance information for monitoring deployed services and dispatching requests to deployed services. Since deployed services can be stateless or stateful, the services architecture also includes state data for the stateful services, with supporting resources that can expand or contract based on policy and/or service demand. The architectural components also include containers for the deployed services.
WIRELESS THIN CLIENTS
In an aspect of the disclosure, a method, a computer-readable medium, and one or more apparatuses are provided. The apparatuses may be one or more thin clients. Each of the one or more thin clients wirelessly connects with at least one peripheral. Each of the one or more thin clients establishes a remote session with a remote machine. The one or more thin clients are placed in an environment that is isolated from the at least one peripheral of each of the thin clients.
EFFICIENT DYNAMIC PROOFS OF RETRIEVABILITY
The present invention relates to a data storage and retrieval system. The system includes a at least one client device; and at least one-server. The server includes at least one memory, a processor and a log store. The client data is divided into different blocks and stored in the server. Different logs are generated for each block and stored in the log store. The storage in the server are audited for ensuring their integrity. The present invention also relates to a method used to store and retrieve data form the above system. The present invention also relates to a method used to initialize empty buffers in a storage of a system.
Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a requesting system, a data access request. After authenticating the requesting system, the computing platform may load, using a first data container, first source data from a data track. The computing platform may send the first source data to a second data container. Then, the computing platform may load, using the second data container, second source data from the data track and may produce a first combined dataset. The computing platform may send the first combined dataset to a third data container. Subsequently, the computing platform may load, using the third data container, third source data from the data track and may produce a second combined dataset. Thereafter, the computing platform may send, to the requesting system, the second combined dataset.
System, Method, and Computer Program Product for Efficient Performance Indicator Measurement Value Generation
A performance indicator monitoring system (PIMS) receives a plurality of operational measurements (OMs) for each performance indicator (PI), which may be stored on a first storage. A rate of access by a monitoring system is determined for the PI. The rate may be determined, for example, related to a counter of the PI. An enriched dataset related to a subset of the plurality of OMs is generated, upon determination that the selected PI rate of use is higher than a primary threshold value. The generated enriched dataset may be stored in a second storage. In some embodiments, a component of the PIMS, such as a processing unit, is determined. A usage level of the component is then determined, and the enriched dataset is generated if the usage level of the component is below a secondary threshold.
VALIDATING VIRTUAL HOST BUS ADAPTER FABRIC ZONING IN A STORAGE AREA NETWORK
An aspect of validating vHBA fabric zoning in a SAN includes receiving, by a computer processor, a request for data corresponding to zones in a storage area network to which an initiator in a host system computer has access; instantiating, by the computer processor, a virtual host bus adapter interface on the host system computer; and transmitting, via the virtual host bus adapter interface, the request to a fabric controller in the storage area network. An aspect also includes receiving a current active zone set from the fabric controller; parsing the current active zone set for the initiator; identifying, from the parsing, each of the zones in the current active zone set to which the initiator is indicated; and displaying the identified zones via the computer processor.
System and method for cloud-based analytics
A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.