Entries |
Document | Title | Date |
20080209003 | MONITORING DEVICE AND MONITORING METHOD - A computer executes a monitoring control by receiving a first notification which has been transmitted from another communication apparatus to a network, and acquiring first identification information which is identification information of the communication apparatus at a predetermined first layer, from the first notification. The computer acquires second identification information which is identification information of the communication apparatus at a second layer being lower in hierarchy than the first layer. The computer associates the first identification information and the second identification information, and acquires a connection state between the network and the communication apparatus at the second layer. | 08-28-2008 |
20080215703 | Modified machine architecture with partial memory updating - The updating of only some memory locations in a multiple computer environment in which at least one applications program ( | 09-04-2008 |
20080244032 | TECHNIQUES FOR HOST TO HOST TRANSFER OF SEQUENTIAL MEDIA AND USE OF PERSISTENT RESERVATION TO PROTECT MEDIA DURING HOST TO HOST TRANSFER - Techniques for host to host transfer of media and the use of persistent reservation to protect media during host to host transfer is disclosed. Exemplary embodiments may be realized as methods and systems for transferring a sequential media loaded in a drive from a first host to a second host without physically unloading the media. The first host may have a persistent reservation or non-persistent reservation of the drive. Likewise, the second host may have a persistent reservation or non-persistent reservation of the drive. Logical unload, logical load and preemption commands are utilized as is error recovery from a failed reservation. | 10-02-2008 |
20080270566 | SYSTEM AND METHOD OF HOSTING OR PUBLISHING OF CONTENT - System and method of hosting or publishing of content. At least some of the illustrative embodiments are methods comprising coupling a memory device to a computer system, displaying content of the memory device on the computer system, selecting by the user at least some of the content displayed, generating a web page utilizing the content selected by the user (the generating occurring autonomously of the user), and publishing the web page to a server (the publishing occurring autonomously of the user). | 10-30-2008 |
20080320097 | NETWORK DISTRIBUTED FILE SYSTEM - A storage pool component is operable on a computing device including a storage medium having an otherwise free storage capacity for forming a portion of a storage capacity of a storage pool and being operably connected across a network to at least one other such component. The component comprises configuration data identifying at least one other computing device to which the computing device may connect across the network; and a directory for identifying file information for files of the storage pool stored on the storage medium, the file information being stored with a degree of redundancy across the computing devices of the storage pool. On instantiation, the component for communicates with at least one other component operating on one of the other computing devices to verify the contents of the directory. The component reconciles file information stored on the storage medium with file information from the remainder of the storage pool. The component then acts as a driver, responsive to an access request for a file stored in the storage pool received across the network from another component of the storage pool, for determining a location of the file on the storage medium from the directory and for accessing the file accordingly. | 12-25-2008 |
20090055507 | Storage and server provisioning for virtualized and geographically dispersed data centers - Geographically dispersed data centers each include servers and storage systems and are in communication with each other. An application is installed on a guest operating system on a virtual machine set up on a server at a first data center. The application accesses a logical unit on a storage system at the first data center. When migration of the application is initiated, the process determines whether any of the data centers has server resources and storage resources required to receive migration of the application. A destination data center is selected from candidate data centers meeting requirements for migration of the application. The application and guest operating system are migrated from the first data center to a second virtual machine set up on a second server at the destination data center. If a replica of the LU is not already present at the destination data center, the LU is also replicated. | 02-26-2009 |
20090089394 | SPREADSHEET TO WEBPAGE CONVERSION SYSTEM AND METHOD - A spreadsheet to web page conversion system and method is disclosed for remotely programming and configuring control and monitoring devices. The approach is based on receiving a web page from a monitoring device via a configuration computer. The web page includes data that is arranged in rows and columns, with each row corresponding to an object and each cell in each row corresponding to a property of the object. The computer is configured to receive a user selection of data in the web page. The selected data may then be enumerated by the monitoring device and sent to the computer. The computer may receive the enumerated properties of the objects and copy them from the web page to a temporary memory space on the computer. The computer may then paste the copied data from the temporary memory space into a spreadsheet application running on the computer for revision. | 04-02-2009 |
20090089395 | System and method for absolute path discovery by a storage virtualization system - A system and method provides for enabling a storage virtualization system to dynamically discover shares on a network attached storage file system is disclosed. Certain network attached storage systems represent user shares using abbreviated symbolic path names rather than full absolute path names. These network attached storage systems can correctly map the abbreviated path address to the actual file location; however, when a storage virtualization system is implemented to manage shares or files in these shares, it cannot access these files because it does not have the absolute path address. An embodiment of the present invention provides software instructions to augment the capabilities of the storage virtualization system, enabling it to map files with abbreviated share names, and therefore provide it with the ability to access these types of network attached storage systems. | 04-02-2009 |
20090177756 | MULTIPLE NETWORK SHARED DISK SERVERS - A method, information processing system, and computer program storage product access data on an information processing system. The information processing system includes a plurality of Network Shared Disk servers and at least one set of Network Shared Disks. Each of the Network Shared Disks is served by at least one of the Network Shared Disk servers. Configuration data that includes information indicating which of the Network Shared Disk servers serve each of the Network Shared Disks is analyzed. The Network Shared Disk to be accessed is identified. One of the Network Shared Disk servers is selected from the plurality of Network Shared Disk servers that serve the one Network Shared Disk to be accessed. The one Network Shared Disk to be accessed is accessed via the one Network Shared Disk server that was selected. | 07-09-2009 |
20090240782 | REDUNDANT DATA FORWARDING STORAGE - Methods and apparatus, including computer program products, for redundant data forwarding storage. A method includes, in two or more networks of interconnected computer system nodes, receiving a request from a source system in a first network to store data, directing the data to a first computer memory in a first network, directing a first copy of the data to a second computer memory in a second network, continuously forwarding the data from the first computer memory to other computer memories in the first network without storing on any physical storage device in the first network, and continuously forwarding the first copy of the data from the second computer memory to other computer memories in the second network without storing on any physical storage device in the second network. | 09-24-2009 |
20090254630 | STORAGE CONTROL METHOD FOR MANAGING ACCESS ENVIRONMENT ENABLING HOST TO ACCESS DATA - A computer system wherein a first access environment program converts an application data created by the first application program, according to access environment information, and sends the converted application data to a first volume, wherein a management computer stores the access environment information, and relationship between the second volume and the access environment information, wherein, when the management computer receives a request to access the second volume from the second host computer, the management computer identifies the access environment information based on the relationship, and sends the access environment information to the second host computer, and wherein the second host computer configures a second access environment program stored in the second host computer based on the access environment information, and wherein and a second application program stored the second host computer, accesses to the second volume via the second access environment program configured by the access environment information. | 10-08-2009 |
20090282124 | SHARING INFORMATION BETWEEN DEVICES - A system configured for facilitating the sharing of information between apparatuses. An apparatus may include one or more applications that, for example, upon configuration and execution, may yield information that may also be stored in the apparatus. At some point a determination may be made that stored information is to be shared with other users. In order to enable the sharing of this information, global identification information may be assigned by, and obtained from, a remote resource. The global identification information may be used to modify identification information corresponding to the information to be shared so that other apparatuses may locate, and/or request access to, the shared information. Further, the other apparatuses may request transmission of shared information stored in the remote resource using the global identifier, or may receive shared information from the apparatus without explicitly requesting it. | 11-12-2009 |
20090300134 | LINEAR PROGRAMMING FORMULATION OF RESOURCES IN A DATA CENTER - An exemplary method for performing work in a data center includes receiving a request for resources in a data center, solving a linear programming formulation that accounts for the request and at least some of the resources in the data center and performing work the request based at least in part on the solving of the linear programming formulation. Such a method can include a linear programming formulation that accounts for multi-core chips and DRAM systems. Various other method, devices, systems, etc., are also disclosed. | 12-03-2009 |
20090307330 | Method for Moving Operating Systems Between Computer Electronic Complexes Without Loss of Service - A system and method for migrating a client partition between computer electronic complexes (CECs) while maintaining access to a Storage Area Network. An active and inactive world wide port name are generated for a client virtual channel adapter. A query is sent to a name server from the VIOS on the source CEC. The name server creates a list of small computer system interface (SCSI) targets that are available. The list is used by the VIOS on the destination CEC to verify whether any physical ports in the destination CEC have access to the same SCSI target. The client partition may be migrated between a source CEC and a destination CEC and the access to the Storage Area Network access may be maintained. | 12-10-2009 |
20090327447 | EXTENDING SHARING OPTIONS OF LOCAL COMPUTING RESOURCES - A method, system, and medium are provided for sharing items residing on a computing device. Items selected for sharing can be made simultaneously available to users on a local network and to users outside of the local network. A remote sharing service allows access to copies of items based on user identifiers associated. Local attributes associated with items are modified such that the user identifiers are associated with the items for providing access via a local network. | 12-31-2009 |
20100005151 | DISTRIBUTED INDEXING SYSTEM FOR DATA STORAGE - A distributed indexing system spreads out the load on an index of stored data in a data storage system. Rather than maintain a single index, the distributed indexing system maintains an index in each media agent of a federated data storage system and a master index that points to the index in each media agent. In some embodiments, the distributed indexing system includes an index server (or group of servers) that handles indexing requests and forwards the requests to the appropriate distributed systems. Thus, the distributed indexing system, among other things, increases the availability and fault tolerance of a data storage index. | 01-07-2010 |
20100011086 | MEDIA DELIVERY IN DATA FORWARDING STORAGE NETWORK - Methods and apparatus, including computer program products, for media delivery in data forwarding storage network. A method includes, in a network of interconnected computer system nodes, directing unique data items to a computer memory, and continuously forwarding each of the unique data items, independent of each other, from one computer memory to another computer memory in the network of interconnected computer system nodes without storing on any physical storage device in the network. | 01-14-2010 |
20100023597 | DISKLESS COMPUTER SYSTEM - A diskless computer system has a network connecting device and a diskless computer connecting to the network connecting device. The diskless computer stores a disk driver and a network driver. The disk driver stores a device number corresponding to the network connecting device. The network driver is capable of obtaining the device number of the network connecting device. Therefore, the network connecting device either transfers disk packets or network packets to a network. Consequently, the network connecting device does not require complicated arbitration circuit in the conventional host bus adapter so the manufacture cost of the diskless computer system of the present invention is cheaper than the conventional diskless computer system. | 01-28-2010 |
20100036932 | Computer System and Data Sharing Method - This invention provides a computer system capable of achieving frequent accesses to the same logical volume by a plurality of computers by using iSCSI. The computer system includes first computers not supporting iSCSI and second computers supporting iSCSI. A load distribution control part determines a requested computer to be requested about a command processing and requests the command processing. The requested computer requests an IO control part about an access to a logical volume in a shared disk. When the requested computer does not support iSCSI, the IO control part selects a substitute computer. The substitute computer mounts the logical volume on behalf of the requested computer to provide the mounted logical volume to the requested computer through NFS. | 02-11-2010 |
20100049823 | Initial copyless remote copy - Embodiments of the invention reduce the traffic between datacenters during initial remote copy. In one embodiment, a computer system comprises a first datacenter including a first source volume and a second datacenter including a second source volume. Prior to establishment of remote copy of deployed volumes between the first datacenter and the second datacenter, the first source volume of the first datacenter and the second source volume of the second datacenter have identical source objects. During establishment of remote copy, the first datacenter replicates the source object in the first source volume to a first target volume, the second datacenter replicates the source object in the second source volume to a second target volume, and a first replicated object in the first target volume and a second replicated object in the second target volume are related to each other by remote copy with no copying therebetween. | 02-25-2010 |
20100057881 | Migration of a Guest from One Server to Another - Systems, methods and media for migration of a guest from one server to another are disclosed. In one embodiment, a first server, while hosting the guest, receives a signal from the second server that the migration is to occur. The first server presents the memory used by the guest as a virtual disk. The second server accesses this disk and copies its contents to the second server over the storage area network. The first server suspends operation of the guest, and after the memory of the guest is copied to the second server, the second server resumes operation of the guest. | 03-04-2010 |
20100082766 | RELIABLE RECEPTION OF MESSAGES WRITTEN VIA RDMA USING HASHING - In one embodiment, a first network system obtains from a second network system, as a result of an RDMA read operation or an RDMA write operation, a message and a hash of the message, contiguous thereto. The first network system generates a computed hash of the obtained message and compares the computed hash of the message with the obtained hash of the message. The first network system processes the obtained message according to whether the computed hash is equal to the obtained hash. | 04-01-2010 |
20100088389 | PERIODIC SHUFFLING OF DATA FRAGMENTS IN A PEER-TO-PEER DATA BACKUP AND ARCHIVAL NETWORK - Embodiments of the present invention address deficiencies of the art in respect to data backup and archival tools and provide a method, system and computer program product for periodically shuffling data fragments in a data backup set across different storage media in a peer-to-peer data backup and archival network. In an embodiment of the invention, a method for periodic shuffling of data fragments in a data backup set across different storage media in a peer-to-peer data backup and archival network can be provided. The method can include partitioning a file into multiple, different fragments for storage in a peer-to-peer data backup and archival network, storing the fragments in different peer hosts in the peer-to-peer data backup and archival network, and periodically shuffling the stored fragments to different peer hosts. In an aspect of the embodiment, the method also can include encrypting the fragments before storage in the different peer hosts. | 04-08-2010 |
20100115049 | Storage Management Method and Management Server - A method for moving a virtual machine is provided which considers an input/output between array groups and virtual machines after being moved. The computer system includes a physical server executing the virtual machines, a storage device having array groups, and a management server that manages a link between the virtual machines and the array groups. The computer system is characterized in that an estimated I/O volume of the virtual machine after being moved is calculated and that, if the estimated I/O volume exceeds the maximum I/O volume of the array group connected to the moved virtual machine, a search is made to find an array group whose maximum I/O volume is smaller than the estimated I/O volume. | 05-06-2010 |
20100138514 | METHOD AND DEVICE FOR DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT - The invention relates to a method for data management in a portable electronic device connected to a host machine, said device containing a first set of data, the host machine being connected to a remote data server containing a second set of data. Said method includes the steps of:
| 06-03-2010 |
20100146070 | FILTERING TRANSFERRED DATA - A data transfer client device comprising: memory for storing at least one dataset comprising a plurality of data fields and at least one filter definition comprising data defining which of the data fields can be accessed by a particular server; an interface for communicating with a data transfer server, whereby a data transfer server can access a dataset stored in the memory; and a data transfer controller for policing access during a data transfer operation by a data transfer server to the data fields, the data transfer controller being arranged to determine in dependence on the filter definition whether the data transfer server can access particular data fields and to deny the server access to those data fields to which the data transfer controller determines that the data transfer server cannot have access. | 06-10-2010 |
20100161752 | Method and System of Administrating a Peer-to-Peer File Sharing Network - A computer-implemented method, system, and computer program product for administering a peer-to-peer file sharing computer network. The method includes: maintaining a reference associating a particular shared file with a seeder in a community of peers and a number of seeders in the community; and registering a second peer as a second seeder of the particular shared file, if a first seeder in the community of peers has informed the peers of a termination of the availability of a file seeding of the particular shared file. The system includes means for performing the steps of the method. The computer program product includes computer program instructions for carrying out the steps of the method. | 06-24-2010 |
20100312850 | EXTENDED VIRTUAL MEMORY SYSTEM AND METHOD IN A COMPUTER CLUSTER - Several methods and a system of an extended virtual memory system in a computer cluster are disclosed. In one aspect, a method of computer network is disclosed. The method of a computer network includes generating a virtual address space associated with a data of a local computer, translating the virtual address space to a local physical address space with a page table entry of the local computer, and declaring, with a remote memory management module of a remote computer, a set of remote kernel data structures to a local memory management module. The method also includes translating the virtual address space to a remote address of a remote memory with the local memory management module. The method may also include communicating a piece of data to the remote memory management module according to a protocol. The piece of data may be any data available on the remote computer. | 12-09-2010 |
20100318626 | EXTENDED FAST MEMORY ACCESS IN A MULTIPROCESSOR COMPUTER SYSTEM - A multiprocessor computer system comprises a first node operable to access memory local to a remote node by receiving a virtual memory address from a requesting entity in node logic in the first node. The first node creates a network address from the virtual address received in the node logic, where the network address is in a larger address space than the virtual memory address, and sends a fast memory access request from the first node to a network node identified in the network address. | 12-16-2010 |
20100332612 | Caching Data in a Cluster Computing System Which Avoids False-Sharing Conflicts - Managing operations in a first compute node of a multi-computer system. A remote write may be received to a first address of a remote compute node. A first data structure entry may be created in a data structure, which may include the first address and status information indicating that the remote write has been received. Upon determining that the local cache of the first compute node has been updated with the remote write, the remote write may be issued to the remote compute node. Accordingly, the first data structure entry may be released upon completion of the remote write. | 12-30-2010 |
20110022679 | METHOD AND SYSTEM FOR UTILIZING NATIVE ETHERNET AS A VIRTUAL MEMORY INTERCONNECT - In various embodiments of a method and system for utilizing native Ethernet as a virtual memory interconnect, a first networking device may be operable to transcode a memory read command and/or a memory write command to memory access information and encapsulate the memory access information within in one or more fields of an Ethernet frame. The memory access information may be communicated over an Ethernet link to a second networking device where it may be utilized to access memory that is associated with the memory read command and/or the memory write command. For example, the memory access information may indicate an address of the memory to be accessed, whether a read operation and/or a write operation is to be performed, whether the frame comprises data to be written to the memory, and/or whether a locally administered address space is utilized. | 01-27-2011 |
20110078275 | SHARING OF ACCESS TO A STORAGE DEVICE - A method and system for sharing access to a storage device. Two processing devices are connected to a storage device interface. The processing devices are interconnected to allow communication with regard to access to the storage device interface. Access to the storage device interface is controlled by the first and second processing devices exchanging signals. Embodiments of the invention may be a mobile device configured to play audio files from a memory card connected to the mobile device. A communications link may be established to a remote device for the transfer of data between devices. | 03-31-2011 |
20110185033 | SYSTEMS AND METHODS FOR STORAGE MANAGEMENT IN A DATA PROCESSING DEVICE - Methods and systems for storage management in a data processing device. The data processing device may be connected to a host computer and it can be in one of two states: disk mode (e.g., docked) or device mode (e.g., undocked). According to an embodiment, a mass storage device associated with a data processing device is divided into two or more segments or virtual volumes, and at least one volume is managed by the device even in a disk mode. In some cases, this makes the device usable while in the docked state and hence it improves the user experience. In some embodiments, an extra software component other than the file system is employed on the device to manage the storage device. Certain volumes may be dynamically increased or decreased while the data processing device is in a disk mode. | 07-28-2011 |
20110238778 | Reducing Packet Size In A Communication Protocol - In one embodiment, the present invention includes a processor that can generate data packets for transmission to an agent, where the processor can generate a data packet having a command portion including a first operation code to encode a transaction type for the data packet and a second operation code to encode a processor-specific operation. This second operation code can encode many different features such as an indication that the data packet is of a smaller size than a standard packet, in order to reduce bandwidth. This operation code can also identify an operation to be performed by a destination agent coupled to the agent. Other embodiments are described and claimed. | 09-29-2011 |
20120042033 | MIGRATING VIRTUAL MACHINES ACROSS NETWORK SEPARATED DATA CENTERS - Embodiments of the present invention provide an approach for migrating virtual machines across network (e.g., WAN) separated data centers (e.g., storage clouds). Specifically, under embodiments of the present invention, a first storage system associated with a first data center is synchronized with a second storage system associated with a second data center via a storage system link. Then, a minimal state of a virtual machine is migrated from a first computer in the first data center to a second computer in the second data center via a WAN link. Using the minimal state, the virtual machine is stored in the second computer. Thereafter, the storage system link is terminated. In addition, as updated pages are received in memory of the first computer, they are migrated to the second computer via the WAN link. Once this migration is complete, the WAN link can be terminated. Therefore, embodiments of the present invention provide at least two forms of synchronization: computational synchronization and storage synchronization. | 02-16-2012 |
20120042034 | LIVE MIGRATION OF VIRTUAL MACHINE DURING DIRECT ACCESS TO STORAGE OVER SR IOV ADAPTER - A method is provided to migrate a virtual machine from a source computing machine to a destination computing machine comprising: suspending transmission of requests from a request queue disposed in source computing machine memory associated with the VM from the request queue to a VF; while suspending the transmission of requests, determining when no more outstanding responses to prior requests remain to be received; in response to a determination that no more outstanding responses to prior requests remain to be received, transferring state information that is indicative of locations of requests inserted to the request queue from the VF to a PF and from the PF to a memory region associated with a virtualization intermediary of the source computing machine. After transferring the state information to source computing machine memory associated with a virtualization intermediary, resuming transmission of requests from locations of the request queue indicated by the state information to the PF; and transmitting the requests from the PF to the physical storage. | 02-16-2012 |
20120110114 | INTEROPERABILITY USING A LOCAL PROXY SERVER - A home-networking gateway may automatically provide a function based on data identified on a device on a home network. The home-networking gateway may perform the function using another device that is capable of performing the function and is accessible to the home-networking gateway. | 05-03-2012 |
20120131129 | NETWORK LATENCY ESTIMATION FOR MOBILE DEVICES - Embodiments calculate an estimated latency between computing devices. A latency service aggregates latency records defining latency measurements and corresponding latency factors from a plurality of computing devices. From the aggregated latency records, the latency service defines relationships between the latency measurements and the corresponding latency factors. Responsive to a request for an estimated latency from a mobile computing device, the latency service applies the defined relationships to estimate the latency based on the latency factors associated with the received request. In some embodiments, the estimated latency includes three portions: a first latency value representing the latency from the mobile computing device to a cell site, a second latency value representing the latency from the cell site to an access point, and a third latency value representing the latency from the access point to a destination computing device. | 05-24-2012 |
20120158885 | SYSTEM AND METHOD FOR DELIVERING INFORMATION AT INACCESSIBLE LOCATIONS - Systems and methods of using the systems for delivering information related to an inaccessible location to individuals at the inaccessible location are disclosed. The system comprises a memory device affixed to the inaccessible location, the information related to the inaccessible location residing on the memory device, and a portable memory reading device, separate from the memory device, that retrieves the information from the memory device when positioned at the inaccessible location and communicates the information to a party located at the inaccessible location. The system may further comprise a database wherein the information residing on the memory device is replicated and the database can be accessed by a user of the system via a suitable communications medium or combination of mediums. | 06-21-2012 |
20120173655 | COMMUNITY INTERNET DRIVE - Provided herein are devices, systems, methods and various means, including those related to providing a community internet drive that may utilize a centrally-managed hub as well as storage devices distributed among various networked machines. In some embodiments, the community internet drive can also include features to enable its users to promote and utilize the user's trusted personal relationships while also enabling an open platform for peer-to-peer and/or other types of sharing schemes. | 07-05-2012 |
20120185556 | ASSIGNING A DATA ITEM TO A STORAGE LOCATION IN A COMPUTING ENVIRONMENT - A computer implemented method assigns a data item to a storage location in a computing environment. A request to store a data item is detected. A determination is made as to whether a volatile memory in the second computer comports with an isolation rule for the data item. In response to determining that the volatile memory in the second computer comports with the isolation rule for the data item, access time for data in the volatile memory in the second computer is compared with access time for data in a local hard drive in a first computer. The data item is then selectively stored in either the volatile memory in the second computer or the local hard drive in the first computer as determined by their relative access times. | 07-19-2012 |
20120226767 | CACHE DEFEAT DETECTION AND CACHING OF CONTENT ADDRESSED BY IDENTIFIERS INTENDED TO DEFEAT CACHE - Systems and methods for cache defeat detection are disclosed. Moreover, systems and methods for caching of content addressed by identifiers intended to defeat cache are further disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of resource management in a wireless network by caching content on a mobile device. The method can include detecting a data request to a content source for which content received is stored as cache elements in a local cache on the mobile device, determining, from an identifier of the data request, that a cache defeating mechanism is used by the content source, and/or retrieving content from the cache elements in the local cache to respond to the data request. | 09-06-2012 |
20120233285 | STORAGE MEDIUM, INFORMATION PROCESSING APPARATUS, AND MIGRATION METHOD - A computer-readable storage medium stores program code for causing a computer to perform a method. The method includes steps of creating a redundant configuration including a physical device used by an operating system of the computer and a virtual device of a virtual machine running on another computer connected via a network to the computer, based on identification information of the virtual device; and transferring memory contents of the operating system to the other computer. | 09-13-2012 |
20120271908 | SOCIAL CACHING FOR DEVICE RESOURCE SHARING AND MANAGEMENT - Systems and methods of social caching for device resource sharing and management are disclosed. In one embodiment, a system includes a local proxy which wirelessly accesses the physical storage of other device via a wireless network to cache the response or content for the mobile device, in response to detecting commonalities between the mobile device and the other device. The commonalities can include, for example, common interests in users of the mobile device and the other device | 10-25-2012 |
20130054733 | FILE TRANSFER DEVICE AND METHOD THEREFOR - There is provided a file transfer device in which a determining unit determines, when a first file requested by a user terminal is not cached in a file buffering unit, a second file transferred to the user terminal based on a file cache status of the file buffering unit, a transfer protocol unit reads the second file from the file buffering unit while the file buffering unit reads the first file, a transmitting unit transmits the second file to the user terminal, wherein the instructing unit determines to transfer the first file, based on a progress status of reading the first file, the transfer protocol unit suspends reading the second file and reads the first file from the file buffering unit, the transmitting unit transmits the first file read by the transfer protocol unit to the user terminal. | 02-28-2013 |
20130060884 | Method And Device For Writing Data To A Data Storage System Comprising A Plurality Of Data Storage Nodes - There is disclosed a method for writing data in a data storage system comprising a plurality of data storage nodes, the method being employed in a server running an application which accesses data in the data storage system, and comprising: sending a multicast storage query to a plurality of said storage nodes; receiving a plurality of responses from a subset of said storage nodes, said responses including a storage node property; selecting at least two storage nodes in the subset for storing said data, based on said responses, wherein the selecting is based on a data property of the data to be stored and a storage node property. | 03-07-2013 |
20130080569 | INFORMATION PROCESSING APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM HAVING PROGRAM STORED THEREON - By generating second data transfer status managing information for managing a data transfer status between the first storing unit and a third storing unit provided in the second storage apparatus, and third data transfer status managing information for managing data transfer status between the second storing unit and a fourth storing unit provided in the second storage apparatus based on the first data transfer status managing information; and transferring data between the first storing unit and the third storing unit based on the second data transfer status managing information, transferring data between the second storing unit and the fourth storing unit based on the third data transfer status managing information, and transferring the first data transfer status managing information, the data transfer status between multiple storing units in a migrating storage apparatus may be reproduced in another migrated storage apparatus. | 03-28-2013 |
20130103783 | Reducing Packet Size In A Communication Protocol - In one embodiment, the present invention includes a processor that can generate data packets for transmission to an agent, where the processor can generate a data packet having a command portion including a first operation code to encode a transaction type for the data packet and a second operation code to encode a processor-specific operation. This second operation code can encode many different features such as an indication that the data packet is of a smaller size than a standard packet, in order to reduce bandwidth. This operation code can also identify an operation to be performed by a destination agent coupled to the agent. Other embodiments are described and claimed. | 04-25-2013 |
20130110969 | COOPERATIVE STORAGE MANAGEMENT | 05-02-2013 |
20130132505 | COMPUTER SYSTEM AND METHOD FOR SHARING COMPUTER MEMORY - A computer system has a plurality of computer servers, each including at least one central processing unit (CPU). A memory appliance is spaced remotely from the plurality of computer servers. The memory appliance includes random access memory (RAM). A photonic CPU link is operatively attached to the at least one CPU. A photonic circuit switch is operatively attached to the photonic CPU link. An allocated portion of the RAM is addressable by a predetermined CPU selected from the plurality of computer servers. | 05-23-2013 |
20130132506 | COMPUTER SYSTEM AND METHOD FOR SHARING COMPUTER MEMORY - A computer system has a plurality of computer servers, each including at least one central processing unit (CPU). A memory appliance is spaced remotely from the plurality of computer servers. The memory appliance includes random access memory (RAM). A photonic CPU linkis operatively attached to the at least one CPU. An optical-electrical converter is operatively attached to the photonic CPU link. An electronic circuit switch is operatively attached to the optical-electrical converter and the memory appliance. An allocated portion of the RAM is addressable by a predetermined CPU selected from the plurality of computer servers. | 05-23-2013 |
20130151652 | DATA SERVICES USING LOCATION PATTERNS AND INTELLIGENT CACHING - Pre-caching may decrease the response time necessary for a wireless communication network to fulfill a user request. Pre-caching includes predicting what data the user will request next and preemptively fetching that data from a network (e.g., the Internet). Additionally, the wireless communication network may predict the geographic location of the mobile device when it makes the request. Instead of pre-caching the data in the memory of the mobile device, the data may be stored at a wireless access point that has a radiation pattern that covers the predicted geographic location of the mobile device. Once the wireless access point receives the request from the mobile device for the pre-cached data, the pre-cached data may be transmitted wirelessly to the mobile device, thereby avoiding having to forward the request to rest of the communication network. | 06-13-2013 |
20130151653 | DATA MANAGEMENT SYSTEMS AND METHODS - Example data management systems and methods are described. In one implementation, a method restores data on a first data storage node that is part of a data storage system including multiple storage nodes. The method marks multiple data entries stored in the first data storage node as dirty. A data index associated with the data storage system is received from a quorum of the data storage nodes in the data storage system. The data index is compared with data entries stored in the first data storage node. Data entries that are not contained in the data index are deleted from the first data storage node. Data entries stored in the first data storage nodes are modified to match corresponding data entries in the data storage system based on the data index. | 06-13-2013 |
20130151654 | DATA SERVICES USING LOCATION PATTERNS AND INTELLIGENT CACHING - Pre-caching may decrease the response time necessary for a wireless communication network to fulfill a user request. Pre-caching includes predicting what data the user will request next and preemptively fetching that data from a network (e.g., the Internet). Additionally, the wireless communication network may predict the geographic location of the mobile device when it makes the request. Instead of pre-caching the data in the memory of the mobile device, the data may be stored at a wireless access point that has a radiation pattern that covers the predicted geographic location of the mobile device. Once the wireless access point receives the request from the mobile device for the pre-cached data, the pre-cached data may be transmitted wirelessly to the mobile device, thereby avoiding having to forward the request to rest of the communication network. | 06-13-2013 |
20130173740 | ADMINISTERING GLOBALLY ACCESSIBLE MEMORY SPACE IN A DISTRIBUTED COMPUTING SYSTEM - In a distributed computing system that includes compute nodes that include computer memory, globally accessible memory space is administered by: for each compute node: mapping a memory region of a predefined size beginning at a predefined address; executing one or more memory management operations within the memory region, including, for each memory management operation executed within the memory region: executing the operation collectively by all compute nodes, where the operation includes a specification of one or more parameters and the parameters are the same across all compute nodes; receiving, by each compute node from a deterministic memory management module in response to the memory management operation, a return value, where the return value is the same across all compute nodes; entering, by each compute node after local completion of the memory management operation, a barrier; and when all compute nodes have entered the barrier, resuming execution. | 07-04-2013 |
20130173741 | SYSTEM AND METHOD FOR MANAGING THE DELIVERY OF TARGETED CONTENT - A system and method for managing the delivery of targeted content. When a user desires to opt-out of receiving targeted content, the user registers with a do-not-target (DNT) registry and is issued a DNT cookie. A provider of targeted content may look for the DNT cookie stored on the user's network access device. When the DNT cookie is not found, the provider may deliver targeted content to the user. When the DNT cookie is found, the provider may not deliver targeted content to the user. A Web site may offer the user an “override” cookie that allows that Web site to provide targeted content, or selected targeted content, even when the user has a DNT cookie. Alternatively, a DNT header can be added to a Web page request that indicates that the user does not want to receive targeted content. The DNT header may be overridden by an override cookie. | 07-04-2013 |
20130219008 | System and Method for Content and Application Acceleration in a Wireless Communications System - Various methods and communications devices to reduce a bandwidth utilization of a backhaul link in a wireless communications system are provided. By way of example, bandwidth utilization is reduced by relegating the compression of data to the downlink transmission, storing only reference keys in the cache of the transmitting device, and taking advantage of an asymmetrical cache structure between communicating devices. Support is provided for a user equipment to move from one node to another node. | 08-22-2013 |
20130238744 | OBJECT MEDIATED DATA TRANSFER BETWEEN ELECTRONIC DEVICES - Systems, devices and methods for transferring data between two or more different electronic devices are described further herein. The data transfer is mediated by an object, such as a stylus, having a unique identifier. The same object is used when copying the data from a first electronic device and when pasting the data at a second electronic device. | 09-12-2013 |
20130282857 | Cloud Based Storage Synchronization Device - A cloud based storage synchronization device provides a convenient solution to share pictures, videos, and documents between an individual and technologically impaired people. The device is able to connect with wireless network through a wireless chipset and able to store data within an internal memory. Once the device is communicably coupled with a cloud based storage network, the device is able to retrieve a plurality of files from the cloud based storage network and store within the internal memory. Once the plurality of files is downloaded, a user of the device, who is technologically impaired, can view the plurality of files through a graphical user interface. The device is able to retrieve unlimited amount of the plurality of files into the internal memory, as the existing files within the internal memory is deleted from the internal memory and organized in place holders within the internal memory. | 10-24-2013 |
20130290473 | REMOTE PROCESSING AND MEMORY UTILIZATION - According to one embodiment of the present invention, a system for operating memory includes a first node coupled to a second node by a network, the system configured to perform a method including receiving the remote transaction message from the second node in a processing element in the first node via the network, wherein the remote transaction message bypasses a main processor in the first node as it is transmitted to the processing element. In addition, the method includes accessing, by the processing element, data from a location in a memory in the first node based on the remote transaction message, and performing, by the processing element, computations based on the data and the remote transaction message. | 10-31-2013 |
20130290474 | Method And Apparatus For Content-Aware And Adaptive Deduplication - A method, a system, an apparatus, and a computer readable medium for transmission of data across a network are disclosed. The method includes receiving a data stream, analyzing the received data stream to determine a starting location and an ending location of each zone within the received data stream, based on the starting and ending locations, generating a zone stamp identifying the zone, the zone stamp includes a sequence of contiguous characters representing at least a portion of data in the zone, wherein the order of characters in the zone stamp corresponds to the order of data in the zone, comparing the zone stamp with another zone stamp of another zone in any data stream received, determining whether the zone is substantially similar to another zone by detecting that the zone stamp is substantially similar to another zone stamp, delta-compressing zones within any data stream received that have been determined to have substantially similar zone stamps, thereby deduplicating zones having substantially similar zone stamps within any data stream received, and transmitting the deduplicated zones across the network from one storage location to another storage location. | 10-31-2013 |
20130304844 | SYSTEM AND METHOD FOR CACHING NETWORK FILE SYSTEMS - A network caching system has a multi-protocol caching filer coupled to an origin server to provide storage virtualization of data served by the filer in response to data access requests issued by multi-protocol clients over a computer network. The multi-protocol caching filer includes a file system configured to manage a sparse volume that “virtualizes” a storage space of the data to thereby provide a cache function that enables access to data by the multi-protocol clients. To that end, the caching filer further includes a multi-protocol engine configured to translate the multi-protocol client data access requests into generic file system primitive operations executable by both the caching filer and the origin server. | 11-14-2013 |
20130311596 | SYSTEM AND METHODS FOR EFFICIENT MEDIA DELIVERY USING CACHE - To improve the efficiency of media delivery over the Internet, a system and a method are provided for caching remote media files and retrieving cached media files, comprising hardware and software modules as well as steps for storing a remote media file into the cache and retrieving the cached media file based on a signature created by hashing only discrete parts of the media file. The signature is a key for finding the cached media files in the cache upon subsequent requests for the same media file, even if it is received from a different internet location. Media files may be adapted to the characteristics of different media clients, and adapted media files may be equally cached. | 11-21-2013 |
20130326002 | Network Isolation - The present description proposes an interface, a method and a system for data transmission from a first data-processing system to at least one second data-processing system. The interface comprises a first application-specific connector, which can interchange data specific to a first application of the first data-processing system with said first application, at least one second application-specific connector, which can interchange data specific to a second application of at least one second data-processing system with said second application, and a data memory which can be accessed by the first connector and the second connector. | 12-05-2013 |
20130332559 | Method and System for Mobility Support for Caching Adaptive HTTP Streaming Content in Cellular Networks - Mobile communication network ( | 12-12-2013 |
20130339473 | REAL TIME ANALYTICS VIA STREAM PROCESSING - Real time analytics via stream processing is described. A stream reader receives a stream of messages and batches the messages in a message queue. A stream writer accesses the messages from the message queue, aggregates the messages from a time window based on a hierarchy of an attribute to generate a set of event data for the time window, stores the set of event data in a memory cache cluster, and stores a key corresponding to the set of event data in a key buffer queue. A stream aggregator accesses the key from the key buffer queue, retrieves the set of data in the time window corresponding to the key from the memory cache cluster, and performs a process on the retrieved set of data. | 12-19-2013 |
20140019579 | TRANSFERRING DATA OF A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing detecting unavailability of a storage device of a site of dispersed storage network (DSN) memory to produce an unavailable storage device. The method continues with the DS processing module reassigning a fraction of a logical address sub-range of the unavailable storage device to one or more other storage devices, rebuilding one or more logically addressable data objects to produce one or more rebuilt data objects and storing the one or more rebuilt data objects in the one or more other storage devices. When the unavailable storage device becomes available, the method continues with the DS processing module reallocating the fraction of the logical address sub-range from the one or more other storage devices to the storage device and transferring the one or more rebuilt data objects from the one or more other storage devices to the storage device. | 01-16-2014 |
20140040418 | HANDLING CROSS-PLATFORM SYSTEM CALL WITH SHARED PAGE CACHE IN HYBRID SYSTEM - A method and computing system for handling a page fault while executing a cross-platform system call with a shared page cache. A first kernel running in a first computer system receives a request for a faulted page associated with raw data from a second kernel running in a second computer system. In response to the request for the faulted page: (i) a first validity flag is updated to denote that the faulted page is unavailable to the first computer system in a first copy of the shared page cache and (ii) the faulted page is transmitted to the second kernel for insertion of the faulted page in a second copy of the shared page cache and for updating a second validity flag to denote that the faulted page is available to the second computer system in the second copy of the shared page cache. | 02-06-2014 |
20140047062 | System and Method for Maintaining Solvency Within a Cache - In one embodiment, a computing system includes a cache including one or more memories and a cache manager. The cache manager is able to determine an amount of accessible data for a portion of the cache associated with the cache manager; compare the amount of accessible data to a threshold value; determine, for one or more clients associated with the cache manager, an amount of releasable data if the amount of accessible data exceeds the threshold value; communicate, to one or more clients associated with the cache manager, the amount of releasable data for the client; receive from one or more clients associated with the cache manager information associated with data released by the one or more clients; and determine an amount of data released by the one or more clients associated with the cache manager. | 02-13-2014 |
20140074963 | System And Method For Selectively Caching Hot Content In a Content Distribution Network - A method includes altering a request interval threshold when a cache-hit ratio falling below a target, receiving a request for content, providing the content when the content is in the cache, when the content is not in the cache and the time since a previous request for the content is less than the request interval threshold, retrieving and storing the content, and providing the content to the client, when the elapsed time is greater than the request interval threshold, and when another elapsed time since another previous request for the content is less than another request interval threshold, retrieving and storing the content, and providing the content to the client, and when the other elapsed time is greater than the other request interval threshold, rerouting the request to the content server without caching the content. | 03-13-2014 |
20140082128 | DYNAMIC DETECTION AND SELECTION OF FILE SERVERS IN A CACHING APPLICATION OR SYSTEM - A cache system includes one or more network attached storage (NAS) caching appliances for managing a network topology of the enterprise network, in which the cache system dynamically probes the enterprise network to build a topology map of the accessible network devices. | 03-20-2014 |
20140082129 | SYSTEM AND METHOD FOR MANAGING A SYSTEM OF APPLIANCES THAT ARE ATTACHED TO A NETWORKED FILE SYSTEM - A caching system to monitor and respond to system health events/changes at the caching system. | 03-20-2014 |
20140095651 | Memory Bus Protocol To Enable Clustering Between Nodes Of Distinct Physical Domain Address Spaces - A system and method for transferring data and messages between nodes in a cluster is disclosed. Each node in the cluster is a separate physical domain but is connected to other nodes in the cluster through point-to-point high speed links. Each side of a link is coupled to a coprocessor which facilitates the movement of data between and among the nodes. Because each physical domain is separate from any other domain, the coprocessor in a physical domain uses a certificate, called and RKey, to obtain permission to transfer data to another physical domain. When an RKey is received from another physical domain, the coprocessor in the receiving domain validates the key and obtains the physical addresses associated with the key so that it can provide or accept the remote data. Data transfers between pairs of remote nodes in the cluster are permitted as well. | 04-03-2014 |
20140108588 | System and Method for Migration of Digital Assets Leveraging Data Protection - In accordance with embodiments of the present disclosure, an information handling system may include a storage medium and a processor. The storage medium may be configured to store data comprising backup data associated with a source system. The processor may be configured to migrate the data from the storage medium to a target system. The processor may further be configured to during migration of the data from the storage medium to the target system, receive additional data comprising additional backup data associated with the source system and store the additional data to the storage medium. The processor may also be configured to migrate the additional data to the target system. | 04-17-2014 |
20140136648 | STORAGE APPARATUS, NETWORK INTERFACE APPARATUS, AND STORAGE CONTROL METHOD - A controller is able to specify one of multiple protocols, and to operate a network interface using the specified protocol. A storage apparatus comprises a network interface part, which is coupled to a computer via a network, and a controller, which is coupled to the network interface part, receives a request from the computer via the network and the network interface part, and accesses a storage medium on the basis of the request. The controller specifies one protocol from among multiple protocols, and sends protocol information denoting the specified protocol to the network interface part. The network interface part configures a protocol denoted by the protocol information, and carries out communications with the network in accordance with the configured protocol. | 05-15-2014 |
20140149537 | DISTRIBUTED CACHING CLUSTER MANAGEMENT - A management system may enable and monitor a cache or other cluster to make the cluster configuration-aware such that initialization and changes to the underlying structure of the cluster can be dynamically updated. For example, a distributed memory caching system may provide initial configuration to a client from a memory caching node referenced by an alias provided by a configuration endpoint. Updates of configuration may be retrieved from memory caching nodes, each storing current configuration of the cache cluster. A management system monitors changes to the cache cluster, such as provisioning of new caching nodes, and updates the configuration stored in the caching nodes for retrieval by a client. | 05-29-2014 |
20140164553 | HOST ETHERNET ADAPTER FRAME FORWARDING - A method for receiving a data packet is described. The method may include receiving a frame in a host Ethernet adapter from an Ethernet network. The frame may be parsed to determine a data packet size. A work queue element (WQE) may be selected from two or more available WQEs having different data packet size capacity. Data packet storage may be provided for each WQE, including at least some cache storage associated with a processor. The data packet may be stored in the data packet storage associated with the selected WQE based on the data packet size, including storing in the cache for data packets under selected conditions. | 06-12-2014 |
20140181238 | ACCESS AND CONTROL OF MAINFRAME-BASED DATA IN NON-MAINFRAME FORMAT - A mechanism is provided for providing access to mainframe-based data in a non-mainframe format. A host computer system receives a request from a client system to mount a dataset on a data storage device controlled by the host computer system as a data volume on the client system. The host system verifies the client system's authority to mount the requested dataset. The dataset is mounted as the data volume on the client system. The dataset, after mounting, behaves as native to the client system. Subsequent input/output (I/O) requests associated with the mounted dataset are processed by the host computer system. | 06-26-2014 |
20140181239 | MAPPING OF LOGICAL START ADDRESSES TO PHYSICAL START ADDRESSES IN A SYSTEM HAVING MISALIGNMENT BETWEEN LOGICAL AND PHYSICAL DATA BLOCKS - An alignment data structure is used to map a logical data block start address to a physical data block start address dynamically, to service a client data access request. A separate alignment data structure can be provided for each data object managed by the storage system. Each such alignment data structure can be stored in, or referenced by a pointer in, the inode of the corresponding data object. A consequence of the mapping is that certain physical storage medium regions are not mapped to any logical data blocks. These unmapped regions may be visible only to the file system layer and layers that reside between the file system layer and the mass storage subsystem. They can be used, if desired, to store system information, i.e., information that is not visible to any storage client. | 06-26-2014 |
20140189044 | PREEMPTIVE CACHING OF DATA - A first computing device receives a first request from a client computing device, wherein the first request includes a markup language request. The first computing device transmits the first request to a second computing device, wherein the second computing device services the first request. The first computing device receives the serviced first request, wherein the serviced first request includes a manifest tag. The first computing device caches the serviced first request. The first computing device transmits the serviced first request to the client computing device. | 07-03-2014 |
20140201314 | MIRRORING HIGH PERFORMANCE AND HIGH AVAILABLITY APPLICATIONS ACROSS SERVER COMPUTERS - Systems and methods to minor data and otherwise manage memory are provided. A buffer may be coupled to a processor and be configured to write a first copy of data to a first memory located at a first server computer and a second copy of the data to a second memory that is accessible to both the first server computer and a second server computer. The buffer may be coupled directly to at least one of the first memory and the second memory via a memory bus, copper cable, or an optical cable. The buffer may write the first and the second copies of the data concurrently. | 07-17-2014 |
20140207900 | CONVERSION TRACKING FOR INSTALLATION OF APPLICATIONS ON MOBILE DEVICES - An application executing on a mobile device, such as an application associated with a social networking system provides a link to install a third-party application. The link may be presented in an advertisement, and the link is used to retrieve data comprising a client application for execution by the mobile device. To track installations, the client application stores an indication that the client application was installed in a shared memory location on the mobile device, as native applications do not have access to cookies. A social networking application executing on the mobile device retrieves the indication the client application was installed from the shared memory location and communicates it to a social networking system for storing in a user profile. | 07-24-2014 |
20140222949 | MASSIVELY SCALABLE OBJECT STORAGE SYSTEM - Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand. In several embodiments, the object storage system includes a ring implementation used to associate object storage commands with particular physical servers such that certain guarantees of consistency, availability, and performance can be met. In other embodiments, the object storage system includes a synchronization protocol used to order operations across a distributed system. In a third set of embodiments, the object storage system includes a metadata management system. In a fourth set of embodiments, the object storage system uses a structured information synchronization system. Features from each set of embodiments can be used to improve the performance and scalability of a cloud computing object storage system. | 08-07-2014 |
20140237070 | NETWORK-ATTACHED STORAGE MANAGEMENT IN A CLOUD ENVIRONMENT - Embodiments of the present invention provide an automated network-attached storage (NAS) management system in a cloud computing environment. Specifically, a server communicates with network storage clients via a network connection. The network storage clients comprise a unified storage zone for storing data. At least part of the unified storage zone is allocated to a site as site data. A virtual desktop interface (VDI) is used by a user client device to interact with management services. A management services layer provides the management services for the user client device by using requests from the user client device to perform operations relating to the management of the site data. | 08-21-2014 |
20140237071 | Caching in Mobile Networks - There is described a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network. User requests for data objects are received at caches in the cache domain. A notification is sent from each cache at which a request is received to a cache manager. The notification reports the user request and identifies the requested data object. At the cache manager, object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored. At the cache manager, objects for distribution within the cache domain are identified on the basis of the object information. Instructions are sent from the cache manager to the caches to distribute data objects stored in those caches between themselves. The objects are classified into classes according to popularity, the classes including a high popularity class comprising objects which should be distributed to all caches in the cache domain, a medium popularity class comprising objects which should be distributed to a subset of the caches in the cache domain, and a low popularity class comprising objects which should not be distributed. | 08-21-2014 |
20140297780 | METHOD AND SYSTEM FOR VM-GRANULAR SSD/FLASH CACHE LIVE MIGRATION - The instant disclosure describes embodiments of a system and method for migrating virtual machine (VM)-specific content cached in a solid state drive (SSD) attached to an original host. During operation, the original host receives event indicating an upcoming migration of a VM to a destination host. In response, the original host transmits a set of metadata associated with the SSD cache to the destination host. The metadata indicates a number of data blocks stored in the SSD cache, thereby allowing the destination host to pre-fetch data blocks specified in the metadata from a storage shared by the original host and the destination host. Subsequently, the original host receives a power-off event for the VM, and transmits a dirty block list to the destination. The dirty block list specifies one or more data blocks that have changed since the transmission of the metadata. | 10-02-2014 |
20140297781 | TECHNIQUES FOR EFFICIENTLY ENFORCING RESOURCE QUOTAS IN A MULTI-TENANT CLOUD STORAGE SYSTEM - A method and system for enforcing resource quotas in cloud storage systems are provided. The method comprises receiving a request to write an object to a target folder of a tenant, wherein the tenant is initially configured with a tenant quota limit and each of a plurality of folders of the tenant initially is configured with a folder quota limit, wherein the tenant quota limit is then dynamically allocated to the plurality of folders of the tenant; determining whether the folder quota limit of the target folder of the tenant is sufficient for storage of the object; upon determining that the folder quota limit of the target folder is sufficient, increasing a folder quota usage of the target folder by a delta value; and storing the object in the target folder. | 10-02-2014 |
20140297782 | METHODS AND SYSTEMS FOR DYNAMICALLY SWITCHING BETWEEN COMMUNICATIONS PROTOCOLS - A method for dynamically switching between communications protocols used in communicating with each of a plurality of physical computing devices includes configuring, by a storage delivery management service, a storage system in a storage area network, to communicate, according to a first communications protocol with a first physical computing device executing a virtual machine, the storage system providing, to the virtual machine, access to a virtual storage resource. The storage delivery management service receives a request to migrate the virtual machine from the first physical computing device to a second physical computing device. The storage delivery management service configures the storage system to communicate with the second physical computing device according to a second communications protocol. The storage delivery management service transmits, to the second physical computing device, an identification of the storage system providing access to the virtual storage resource for the virtual machine. | 10-02-2014 |
20140304361 | SYSTEMS AND METHODS FOR DISTRIBUTED HASH TABLE CONTRACT RENEWAL - The present application is directed towards ASDR table contract renewal. In some embodiments, a core may cache an ASDR table entry received from an owner core such that when the entry is needed again the core does not need to re-request the entry from the owner core. As storing a cached copy of the entry allows the non-owner core to use an ASDR table entry without requesting the entry from the owner core, the owner core may be unaware of an ASDR table entry's use by a non-owner core. To ensure the owner core keeps the ASDR table entry alive, which the non-owner core has cached, the non-owner core may perform contract renewal for each of its recently used cached entries. The contract renewal method may include sending a message to the owner core that indicates which cached ASDR table entries the non-owner core has recently used or accessed. Responsive to receiving the message the owner core may reset a timeout period associated with the ASDR table entry. | 10-09-2014 |
20140317225 | COMMUNITY INTERNET DRIVE - Provided herein are devices, systems, methods and various means, including those related to providing a community internet drive that may utilize a centrally-managed hub as well as storage devices distributed among various networked machines. In some embodiments, the community internet drive can also include features to enable its users to promote and utilize the user's trusted personal relationships while also enabling an open platform for peer-to-peer and/or other types of sharing schemes. | 10-23-2014 |
20140317226 | Distributed Storage Time Synchronization Based On Storage Delay - A method begins with a processing module receiving a data retrieval request and obtaining a real-time indicator corresponding to when the data retrieval request was received. The method continues with the processing module determining a time-based data access policy based on the data retrieval request and the real-time indicator and accessing a plurality of dispersed storage (DS) units in accordance with the time-based data access policy to retrieve encoded data slices. The method continues with the processing module decoding the threshold number of encoded data slices in accordance with an error coding dispersal storage function when a threshold number of the encoded data slices have been retrieved. | 10-23-2014 |
20140351367 | CACHING IN WIRELESS COMMUNICATION NETWORKS - A Network Reporting Entity (NRE) and a User Equipment (UE) as well as a respective method therein for use in a wireless communication network for enabling controlling data transfer between the UE and a network cache are provided. The NRE receives, from the UE, a request to start reporting network status and transmits, to the UE, information regarding the status of the network, the information pertaining to whether network condition is in a state where a data transfer is preferred or not, wherein the NRE obtains the information regarding the status of the network from the Network Conditions Information Entity (NCIE). In this manner, the UE is enabled to control the data transfer between the UE and the network cache. | 11-27-2014 |
20140359051 | Service-based Backup Data Restoring to Devices - A user of a device has an account with a service that stores copies of common data that is automatically made available to any of the user's devices and also stores copies of device-specific data that is available to the user on particular user-selected devices but is not automatically made available to all of the user's devices. A set of backed up devices can be displayed to the user of a particular device with various information describing the devices to facilitate user selection of a device, such as a visual representation of the type of the device that was backed up, a visual representation of a desktop or start screen display of the device that was backed up, and so forth. The user can select one of the displayed devices, and in response have the backed up device-specific data for the selected device copied to the particular device. | 12-04-2014 |
20140379846 | TECHNIQUE FOR COORDINATING MEMORY ACCESS REQUESTS FROM CLIENTS IN A MOBILE DEVICE - A memory access pipeline within a subsystem is configured to manage memory access requests that are issued by clients of the subsystem. The memory access pipeline is capable of providing a software baseband controller client with sufficient memory bandwidth to initiate and maintain network connections. The memory access pipeline includes a tiered snap arbiter that prioritizes memory access requests. The memory access pipeline also includes a digital differential analyzer that monitors the amount of bandwidth consumed by each client and causes the tiered snap arbiter to buffer memory access requests associated with clients consuming excessive bandwidth. The memory access pipeline also includes a transaction store and latency analyzer configured to buffer pages associated with the baseband controller and to expedite memory access requests issued by the baseband controller when the latency associated with those requests exceeds a pre-set value. | 12-25-2014 |
20140379847 | ACCELERATED SOCKETS - Disclosed herein is an improved method of using sockets in connection with TCP over certain local networks, such as the enhanced Ethernet. In particular, an accelerated socket protocol is provided to enhance data communications between different host computer systems connected to an enhanced Ethernet network. Under the accelerated socket protocol, a host computer, while sending a number of data packets, is able to indicate a particular data packet is a last ready data packet out of all packets ready to be sent by setting a PUSH bit in that particular data packet, which triggers an automatic acknowledgement message that confirms receipt of data from the receiver. In addition, while receiving data packets, the host computer can advertise an effective window that corresponds to the actually available receiving space in the host computer. | 12-25-2014 |
20150032840 | VIRTUAL STORAGE SYSTEM AND METHOD OF SHARING ACCESS TO THE VIRTUAL STORAGE SYSTEM FOR ADDING ELECTRONIC DOCUMENTS - A virtual storage system in data communication with a user computing device via a communication network and methods of sharing access to the virtual storage system that includes at least one processor that receives a request for granting share access of at least one electronic folder of a plurality of electronic folders, and for adding at least one electronic document therein, and input information including upload link information and expiration information corresponding to the share access of the electronic folder, as input by a user, and creates at least one upload link corresponding to the electronic folder based on the input information, for granting share access to a recipient of the at least one upload link. The virtual storage system also includes a plurality of redundant physical storage devices in data communication with the processor and storing the electronic document to be uploaded, and the upload link created. | 01-29-2015 |
20150032841 | Techniques for Moving Data between a Network Input/Output Device and a Storage Device - Examples are disclosed for moving data between a network input/output (I/O) device and a storage subsystem and/or storage device. In some examples, a network I/O device coupled to a host device may receive a data frame including a request to access a storage subsystem or storage device. The storage subsystem and/or storage device may be located with the network I/O device or separately coupled to the host device through a storage controller. One or more buffers maintained in a cache for processor circuitry may be used to exchange control information or stage data associated with the data frame to avoid or eliminate use of system memory to move data to or from the storage subsystem and/or storage device. Other examples are described and claimed. | 01-29-2015 |
20150039718 | SHARING LOCAL CACHE FROM A FAILOVER NODE - Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. | 02-05-2015 |
20150052216 | MANAGING DIGITAL CONTENT CONSUMPTION DATA - Systems and methods for managing data reflecting digital content consumption by computer systems. An example method may comprise: receiving a plurality of digital content consumption data objects, each digital content consumption data object comprising a timestamp and an identifier of a digital content item being consumed by the computer system at the moment of time defined by the timestamp; storing the plurality of digital content consumption data objects in a memory; receiving a request for digital content consumption information for a specified period of time; and retrieving from the memory two or more digital content consumption data objects having timestamps within the specified period of time. | 02-19-2015 |
20150067093 | Network Distributed File System - A storage pool component is operable on a computing device including a storage medium having an otherwise free storage capacity for forming a portion of a storage capacity of a storage pool and being operably connected across a network to at least one other such component. The component comprises configuration data identifying at least one other computing device to which the computing device may connect across the network; and a directory for identifying file information for files of the storage pool stored on the storage medium, the file information being stored with a degree of redundancy across the computing devices of the storage pool. On instantiation, the component for communicates with at least one other component operating on one of the other computing devices to verify the contents of the directory. The component reconciles file information stored on the storage medium with file information from the remainder of the storage pool. The component then acts as a driver, responsive to an access request for a file stored in the storage pool received across the network from another component of the storage pool, for determining a location of the file on the storage medium from the directory and for accessing the file accordingly. | 03-05-2015 |
20150081836 | PROFILE-BASED LIFECYCLE MANAGEMENT FOR DATA STORAGE SERVERS - Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition. | 03-19-2015 |
20150095448 | CLOUD SYSTEM, CONTROL METHOD THEREOF, MANAGEMENT SERVER AND CONTROL METHOD THEREOF - A cloud system includes a first application server to perform a user-requested task, a second application server to provide an additional resource to the first application server, a first cache server to provide a caching service to the first application server, a second cache server to provide a caching service to the second application server, and a management server to copy data stored in the first cache server into the second cache server when the second application server provides the additional resource to the first application server. | 04-02-2015 |
20150113093 | APPLICATION-AWARE BROWSER - Methods and apparatus, including computer program products, are provided for an application-specific browser. In some implementations, a method may be provided which includes retrieving, by a browser, content of a resource; determining, based on an identity of the resource, whether to store the content in a persistent cache; and storing the content in the persistent cache, when the identity indicates storage to persistent cache is enabled for the content of the resource. | 04-23-2015 |
20150120862 | DATA RECOVERY - A data recovery software program and delivery system is provided that is designed to operate independently of an installed host computer operating system for extracting information from memory storage devices and hard drives of the host computer, and overwriting the information on the host computer, once the information has been extracted from the host computer, so that no others can retrieve the information from the host computer. The data recovery software allows a user to restart a computer that is still mechanically operative, but has experienced an operating system failure. The data recovery software is able to gain control of a host computer even when there are failed sectors on the hard drive of the host computer. The data recovery software system can be loaded universal serial bus (USB) flash drives, compact discs, digital versatile discs, or other external storage devices that are USB or firewire IEEE 1394 interface enabled. | 04-30-2015 |
20150312126 | Maximizing Storage Controller Bandwidth Utilization In Heterogeneous Storage Area Networks - A storage area network controlled, part, by performing the following steps: (i) for each host link of a plurality of host links in a storage area network (SAN), determining a maximum possible data transfer rate; (ii) for each host link of a plurality of host links in a storage area network, determining a maximum permitted data transfer rate based on the maximum possible data transfer rate; (iii) making a plurality of data transfers, through SAN fabric of the SAN and between a storage controller module of the SAN and various host links of the plurality of host links; and (iv) for each data transfer, controlling the data transfer so that a data transfer rate for the data transfer does not exceed the maximum permitted data transfer rate. | 10-29-2015 |
20150319261 | Smart Caching Based on Reputation Information - Embodiments disclosed herein relate to systems and methods for providing a smart cache. In embodiments, a variable time to live (TTL) may be calculated and associated with data as it is stored in a cache. The variable TTL may be calculated based upon reputation and/or category information related to the source of the data. The reputation and/or category information may include TTL modifiers for adjusting the TTL for data from a particular data source that is stored in the cache. In further embodiments, a feedback method may be employed to update reputation and/or category information for a particular data source. | 11-05-2015 |
20150339260 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Orgranization - A system which comprises a series of native applications, suited to run on mobile devices, and a series of web-based applications for which functionality and processing are optimized. The native applications and the web-based applications are coordinated to optimize processes of acquiring, storing and disseminating data for speed, integrity and security. | 11-26-2015 |
20150370611 | FLEXIBLE DEPLOYMENT AND MIGRATION OF VIRTUAL MACHINES - Virtual machines in a computer system cluster, or cloud environment, require access to their assigned storage resources connected to the virtual machines via storage area networks (SAN). Such virtual machines may be independent from associated physical servers in the computer system cluster on which they are deployed. These virtual machines may dynamically migrate among assigned physical servers while maintaining access to their connected storage resources both from the source physical server and the target physical server during the migration. | 12-24-2015 |
20150372858 | CLUSTER RECONFIGURATION MANAGEMENT - Assigning a set of port names to storage access paths of virtual machines accessing storage resources via storage area networks is provided. A first computing system cluster that is associated with a set of computing system identifiers is created. A first computing system identifier associated with a first computing system is added to the set of computing system identifiers. The first computing system is disassociated from the first computing system identifier. The first computing system is added to the first computing system cluster. | 12-24-2015 |
20160036676 | Algorithm for Latency Saving Calculation in a Piped Message Protocol on Proxy Caching Engine - Methods and systems for determining latency in a communication network may be provided. A plurality of commands may be sent in the communication network. A response may be received for each of the plurality of commands from the communication network. A pipeline round trip time may be calculated for each of the plurality of commands based on a time of the response for each of the plurality of commands. A total round trip time for the plurality of commands may be calculated based on the calculated pipeline round trip time. A time saving may be calculated for at least one of the plurality of commands serviced locally. | 02-04-2016 |
20160119439 | MEDIA MANAGEMENT SYSTEM SUPPORTING A PLURALITY OF MOBILE DEVICES - An interactive media management server that facilitates management of interactive media and delivery of such interactive media. It comprises a first interface to an interactive media distribution server communicatively coupled to a plurality of mobile devices, and a second interface to a service provider system or a content provider system. It comprises a manager module for managing creation, distribution and tracking of a plurality of interactive media. The manager module, via the second interface, manages the delivery of the plurality of interactive media from the service provider system or the content provider system, and the communication of user responses to the plurality of interactive media to the corresponding service provider system or content provider system. | 04-28-2016 |
20160127469 | CLOUD STORAGE MANAGING SYSTEM, CLOUD STORAGE MANAGING METHOD, AND APPARATUS FOR SAME - Disclosed are a cloud storage managing system, a cloud storage managing method, and an apparatus for same. To achieve the objective according to the present invention, the cloud storage managing apparatus according to the present invention comprises: a content alignment unit for aligning and shifting content recorded on a cloud storage, by transmitting a shift signal to the cloud storage; and a broker application programming interface (API) providing unit for abstracting, into a broker API, a storage API which corresponds to the type of the cloud storage by using an API mapping table, and providing the content to a terminal device by using the broker API. | 05-05-2016 |
20160127470 | SYSTEM AND METHOD FOR SHARING SAN STORAGE - According to various embodiments, systems and methods are provided that relate to shared access to Storage Area Networks (SAN) devices. In one embodiment, a Storage Area Network (SAN) host is provided, comprising: a server component: a first host bus adapter configured to be connected to a SAN client over a first SAN; a second host bus adapter configured to be connected to a SAN storage device over a second SAN; and wherein the server component is configured to manage a data block on the SAN storage device, receive a storage operation request from the SAN client through the first host bus adapter, and in response to the storage operation request, perform a storage operation on the data block, the storage operation being performed over the second SAN through the second host bus adapter. | 05-05-2016 |
20160134702 | DATA SHARING USING DISTRIBUTED CACHE IN A NETWORK OF HETEROGENEOUS COMPUTERS - A network of PCs includes an I/O channel adapter and network adapter, and is configured for management of a distributed cache memory stored in the plurality of PCs interconnected by the network. The use of standard PCs reduces the cost of the data storage system. The use of the network of PCs permits building large, high-performance, data storage systems. | 05-12-2016 |
20160142507 | CACHING CONTENT - It is presented a method for obtaining caching content. The method is performed in a client device and comprises the steps of: receiving caching content from a net-work node, the transmission of caching content being initiated by the network node; storing the caching content in a client device cache; determining a need to obtain requested content; checking whether the client device cache comprises caching content corresponding to the requested content; and obtaining the requested content from the client device cache when the client device cache comprises caching content corresponding to the requested content A corresponding client device, network node, computer programs, computer program products and a vehicle are also presented. | 05-19-2016 |
20160150014 | DATA STORAGE DESTINATION - In one example, a computing apparatus is configured to receive at least one contextual parameter. The computing apparatus is configured to receive an action from the user of the apparatus for a data item. The computing apparatus is configured to associate the at least one contextual parameter to the data item so as to establish a tag. The tag is configured to determine two or more data storage destinations of the data item. The computing apparatus is configured to output the suggested two or more data storage destinations of the data item for the user. One of the two or more data storage destinations is highlighted according to the tag. The data item destination may be automatically or manually selected to the appropriate data destination. | 05-26-2016 |
20160156689 | INFORMATION PROCESSING SYSTEM, WIRELESS COMMUNICATION APPARATUS, METHOD AND PROGRAM | 06-02-2016 |
20160173604 | METHOD AND SYSTEM FOR OPTIMAL CACHING OF CONTENT IN AN INFORMATION CENTRIC NETWORKS (ICN) | 06-16-2016 |
20180027079 | COMMUNICATION STACK OPTIMIZED PER APPLICATION WITHOUT VIRTUAL MACHINE OVERHEAD | 01-25-2018 |