Patent classifications
Y10S707/99931
CASCADED DISCOVERY OF INFORMATION ENVIRONMENT
Discovering environment objects for information management in a networked environment. Information management provides services such as data protection, backup, retention, compliance, etc., by classifying the objects and/or infrastructure of an entity according to its value to the entity. Information management begins by discovering the data in a network and by discovering the servers and services operating in a network. The servers and services are discovered using adapters that can collect information regarding the environment objects. Objects can be discovered using cascaded discovery, where the information collected by one adapter is used to drive the collection of additional information by other adapters. This information can then by used by information management systems to assign or orchestrate various services.
Simulation mode modification management of embedded objects
Described are techniques for processing a request. Data storage system configuration information is provided which is used by a simulator that simulates a data storage system configuration of a data storage system. A request is received to perform an operation with respect to the data storage system configuration being simulated. The request identifies an object included in the data storage system configuration information used to simulate the data storage system configuration. First processing is performed to simulate servicing the request using the data storage system configuration information and the first processing includes determining, at run time while processing the request, whether the object includes a first object property that is a reference to an embedded object.
Network personal digital video recorder system (NPDVR)
The Shared Internet Storage Resource provides Internet-based file storage, retrieval, access, control, and manipulation for a user. Additionally, an easy-to-use user interface is provided both for a browser or stand-alone application. The entire method provides means by which users can establish, use, and maintain files on the Internet in a manner remote from their local computers yet in a manner that is similar to the file manipulation used on their local computers. A high capacity or other storage system is attached to the Internet via an optional internal network that also serves to generate and direct metadata regarding the stored files. A web server using a CGI, Java-based, or other interface transmits and retrieves TCP/IP packets or other Internet information through a load balancer/firewall by using XML to wrap the data packets. File instructions may be transmitted over the Internet to the Shared Resource System. The user's account may be password protected so that only the user may access his or her files. On the user's side, a stand-alone client application or JavaScript object interpreted through a browser provide two means by which the XML or other markup language data stream may be received and put to use by the user. Internet-to-Internet file transfers may be effected by directly downloading to the user's account space.
Cascaded discovery of information environment
Discovering environment objects for information management in a networked environment. Information management provides services such as data protection, backup, retention, compliance, etc., by classifying the objects and/or infrastructure of an entity according to its value to the entity. Information management begins by discovering the data in a network and by discovering the servers and services operating in a network. The servers and services are discovered using adapters that can collect information regarding the environment objects. Objects can be discovered using cascaded discovery, where the information collected by one adapter is used to drive the collection of additional information by other adapters. This information can then by used by information management systems to assign or orchestrate various services.
Methods and Apparatus for Querying a Relational Data Store Using Schema-less Queries
The invention provides, in one aspect, a method of searching an RDF triples data store of the type in which the triples are maintained in accord with a first storage schema. The method includes inputting a first query specifying RDF triples that are to be identified in the data store. That first query assumes either (i) that the triples are stored in a schema-less manner (i.e., with no storage schema) or (ii) that the triples are maintained in accord with a second storage schema that differs from the first. The method further includes generating, from the first query, a second query that specifies those same RDF triples, yet, that reflects the first storage schema. That second query can be applied to the RDF triples data store in order to identify and/or retrieve the desired data.
Reciprocal data file publishing and matching system
A method of reciprocally publishing and matching data files by facilitating the creation of Category A and Category B data files having a respective sets of characteristics defined utilizing a common language architecture, associating enhancement objects with each data file, identifying characteristics in each data file which must be met by other data files, weighting characteristics in each data file differently from other characteristics in the same data file, enabling the selection of participation levels for each data file in marketspaces, and matching Category A data files participating in particular marketspaces to Category B data files participating in the same marketspaces using the common language architecture, the enhancement objects, the weights and the required characteristics.
Viral engine for network deployment
A private network system operates over a public network to provide an asymmetric service to members with information from other members and non-members. The system includes central servers and databases connected via the public network to client systems of public network users. The users may be members who communicate with a private protocol or non-members who communicate with the public protocol. A process for the private service includes communication of information between users via the private service servers. The private service server implements the private service, which includes a viral engine for network deployment. Features of the viral engine include genetic algorithms, data mining, personalization, frictionless service setup, user maximization, and member-controlled privacy. A sample setup process and contact update wizard that include several viral engine features are described.
Yahrzeit system and method
A method of and system for providing an electronic Yahrzeit display corresponding to the current date including determining a current date, performing a search in a database storing a plurality of Yahrzeit entries to identify the Yahrzeit entries having an anniversary of the death date corresponding to the current date, and electronically displaying the identified Yahrzeit entries in a rotating manner, wherein each of the identified Yahrzeit entries are displayed for a predetermined amount of time, wherein the method and system may convert dates between a plurality of calendars.
System and method for providing integrated management of electronic information
A system and method for managing electronic information using a computer system for one or more users, comprising creating an electronic folder and storing the folder in an electronic folder management system, creating files for the electronic folder, maintaining a collection of electronic folders and the files stored therein, and associating the electronic folders with one or more files such that each of the files may be accessed by identifying the related electronic folder.
SYSTEMS AND METHODS FOR MANIPULATING AND MANAGING COMPUTER ARCHIVE FILES
A computer program for managing and manipulating archive zip files of a computer. The program includes a system and method for opening, creating, and modifying, and extracting zip archive files. The program is fully integrated into Microsoft Windows Explorer and is accessed via Explorer menus, toolbars, and/or drag and drop operations. An important feature of the program is the archive manager which may be used to open a zip file, create a new zip file, extract zip files, modify zip files, etc. The program is integrated into Microsoft Windows Explorer using the shell name space extension application program interface developed by Microsoft.