Patents Assigned to Dell Software, Inc.
  • Patent number: 8978098
    Abstract: An identification module receives a password request for a specified user and communicates an encrypted password field in response thereto, wherein the encrypted password field references a directory object corresponding to the specified user. The present invention also teaches an authentication module that communicates the password request to the identification module and receives the encrypted password field therefrom. Upon receiving the encrypted password field, the authentication module authenticates the specified user against the referenced directory object. In some embodiments, the encrypted password field is stored in an identification data store of an identification server and the directory object is stored in an authentication data store of an authentication server.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: March 10, 2015
    Assignee: Dell Software, Inc.
    Inventors: Kyle Lane Robinson, John Joseph Bowers
  • Patent number: 8972347
    Abstract: A data management system (DMS) includes a continuous real-time object store that captures all real-time activities, with associated object metadata information. The DMS is capable of reintroducing any point-in-time view of data ranging from a granular object to an entire file system. A set of algorithms (for creation of a file or directory, modification of a file or directory, deletion of a file or directory, and relocation/renaming of a file or directory) are used to generate and maintain a file system history in the DMS and to ensure that a latest version of a directory always refers to a latest version of its children until the directory changed. Any point-in-time recovery is implemented using the file system history in one of various ways to provide strong individual file integrity, exact point-in-time crash consistency, and/or recovery of last version of all files in the file system.
    Type: Grant
    Filed: December 14, 2012
    Date of Patent: March 3, 2015
    Assignee: Dell Software Inc.
    Inventor: Siew Yong Sim-Tang
  • Patent number: 8966045
    Abstract: An identity migration program provides interfaces for a user to manage operations for migrating locally-managed identities to centrally-managed identities. The provided interfaces include a project management interface, an identity selection interface, a migration rule editor interface, and a project scheduling interface. In certain embodiments, the identity migration program includes a communication module that provides interfaces for managing communication between the identity migration program and locally-managed and centrally-managed servers. Interfaces may also be provided to manage identity group migration and migration error resolution. A migration process management interface enables the user to halt, roll back, or resume a migration project.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: February 24, 2015
    Assignee: Dell Software, Inc.
    Inventors: Nikolay Vanyukhin, Oleg Shevnin, Alexey Korotich
  • Patent number: 8966503
    Abstract: The method includes monitoring a plurality of information handling systems. The method further includes receiving an anomalous event with respect to at least one information handling system of the plurality of information handling systems. In addition, the method includes performing, via at least one correlation handler, at least one correlation algorithm on the anomalous event. Further, the method includes, responsive to the performing, creating, via the correlation handler, at least one composite event. Additionally, the method includes sending the at least one composite event to an event handler. The method also includes issuing, via the event handler, an alert for the at least one composite event.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: February 24, 2015
    Assignee: Dell Software Inc.
    Inventors: Kelly Noel Dyer, David McAleer, Omair-Inam Abdul-Matin
  • Patent number: 8966112
    Abstract: A network proxy can be provided as a layer between an application layer protocol (such as the Remote Desktop Protocol) and a transport layer protocol (such as TCP). The network proxy can intercept communications between the application layer protocol and the transport layer protocol. The network proxy can transmit communications on multiple connections, without the application layer or transport layer protocols being aware of the parallelization.
    Type: Grant
    Filed: November 29, 2010
    Date of Patent: February 24, 2015
    Assignee: Dell Software Inc.
    Inventors: Michael Franke, Michael McDonald
  • Patent number: 8965850
    Abstract: A method of managing backup data. The method includes accessing, via a backup manager, index data of an initial snapshot and accessing, via the backup manager, index data of a subsequent snapshot. The method further includes determining, via the backup manager, whether the index data of the subsequent snapshot is different from the index data of the initial snapshot. Responsive to a determination that the index data of the subsequent snapshot is different from the index data of the initial snapshot, creating an updated index data and creating an updated snapshot with the updated index data.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: February 24, 2015
    Assignee: Dell Software Inc.
    Inventor: Srinidhi Varadarajan
  • Patent number: 8938419
    Abstract: Techniques are described for replicating data from one to one or more heterogeneous data processing or communication devices for the purpose of remote backup, redundancy, content distribution, communications, observations or measurements. In a first phase, the attributes of the data that are modified or created on a device or that are passing through the device are tracked and journaled in volatile or non-volatile storage in real-time. In a second phase, the attributes that match patterns pre-specified in a configuration are used to determine which data to replicate and which modifications to make the devices. In a third phase, the data is replicated. In a preferred embodiment, the described techniques comprise an application that runs on a host device or is embedded in a logic or memory device. The described invention is designed to be transparent for system redundancy and error recovery processes such as error correction, re-transmission on links, and raid configuration.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: January 20, 2015
    Assignee: Dell Software Inc.
    Inventors: Paul A. Sustman, Justin Banks, Abderrahman Aba A. El Haddi, Victor T. Lee, Jr.
  • Patent number: 8938781
    Abstract: Multi-tiered systems and methods for identifying and monitoring user permissions in a computer network are described. A data structure, such as an index, for each network device identifies all the security identifiers (SIDs) and their associated permissions for accessing the resources on the network device. Each data structure can be initially populated by scanning access control lists (ACLs) of the respective network device. A collection server in communication with the network devices stores an aggregate index that identifies the SIDs in the network and the network devices on which each SID is granted, denied or revoked one or more permissions. The individual data structures and/or aggregate index are updated based on permission changes detected through real-time or periodic monitoring. The aggregate index can also be replicated to multiple servers.
    Type: Grant
    Filed: November 18, 2013
    Date of Patent: January 20, 2015
    Assignee: Dell Software Inc.
    Inventor: Robert Bobel
  • Patent number: 8935701
    Abstract: A method, system and apparatus for a unified management platform in a computer network such as in a virtualized computer environment, is provided.
    Type: Grant
    Filed: March 9, 2009
    Date of Patent: January 13, 2015
    Assignee: Dell Software Inc.
    Inventor: Alexander Bakman
  • Publication number: 20140379876
    Abstract: An apparatus, system, and method are disclosed for managing policies on a computer having a foreign operating system. Policies may specify hardware or software configuration information. Policies on a first computer with a native operating system are translated into configuration information usable on a second computer having a foreign operating system. In an embodiment, a translator manager manages the association between the policy on the first computer and the translator on the second computer. Computer management complexity and information technology management costs are reduced by centralizing computer management on the native operating system. Further reductions in management complexity are realized when the present invention is used in conjunction with network directory services.
    Type: Application
    Filed: April 28, 2014
    Publication date: December 25, 2014
    Applicant: Dell Software Inc.
    Inventors: Matthew T. Peterson, Daniel F. Peterson
  • Patent number: 8903983
    Abstract: A method and apparatus for managing, modeling, predicting, allocating and utilizing resources and bottlenecks in a computer network managing, predicting and displaying of capacity, allocating and utilizing of resources, as well as actual and potential performance-degrading resource shortages in a computer network, is provided. Specifically, exemplary implementations of the present invention provide a method, system and apparatus for calculating, detecting, predicting, and presenting resource allocation, utilization, capacity bottlenecks and availability information, in a computer network, particularly in a virtualized computer environment.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: December 2, 2014
    Assignee: Dell Software Inc.
    Inventors: Alexander Bakman, Sergey Panov
  • Patent number: 8898114
    Abstract: Multitier deduplication can reduce the amount of bandwidth and storage resources used during deduplication. In certain embodiments, the system can determine if a data block is stored in a first archive data storage. If so, the system can skip the data block. If not, the system can determine if the data block is stored or identified in a second archive data storage. In various implementations, the first archive data storage can be local to the system and the second archive data storage can be a global archive that may be remote from the system. The system can create a map of a plurality of backups stored at the first archive enabling the system to quickly check multiple archives. The multitier data deduplication can filter out inactive data blocks during or before performing the deduplication process.
    Type: Grant
    Filed: August 25, 2011
    Date of Patent: November 25, 2014
    Assignee: Dell Software Inc.
    Inventors: David Allen Feathergill, Jason Mattox
  • Patent number: 8898136
    Abstract: A database statement categorization system can enable DBAs or other users to more easily find tunable database statements by categorizing the database statements. The database categorization system can analyze a DBMS to identify the types of database statements executed on the DBMS and can then categorize the statements automatically, outputting the categorization for presentation to a DBA (or other user). This categorization can advantageously separate less relevant statements that warrant less tuning or investigation from more relevant statements that may have a measurable impact on the performance of the database. By allowing users to focus on statements that are more likely to warrant attention, in certain embodiments the database categorization system streamlines the tuning process.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: November 25, 2014
    Assignee: Dell Software Inc.
    Inventors: Ariel Nissim Weil, Douglas Chrystall, Patrick Joseph O'Keeffe
  • Patent number: 8892415
    Abstract: Modeling systems and methods for constructing one or more models of a computing system using collected data. Certain model-based systems build topology models and/or model instances by transforming collected performance data into a collection-location independent form. In certain examples, systems include at least one agent for collecting performance data from monitored resource(s), canonical data transform (CDT) configurations, and a data transformation module for performing data transform operation(s) on the performance data based on at least one CDT configuration. The data transform operation may include generating and/or updating a topology model, assigning metrics to model object(s), updating properties of model object(s), creating associations between existing model objects, or the like. Certain systems and methods also allow for a single piece of data to be processed by multiple models or for pieces of data collected from different locations to be matched and/or associated with the same model object.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: November 18, 2014
    Assignee: Dell Software Inc.
    Inventors: Dmitri Bourlatchkov, Brendan Behan, Yu Li, Nils Meier, Leo Pechersky, Stephen P. Rosenberg, Geoff Vona
  • Patent number: 8887009
    Abstract: Systems and methods are disclosed for monitoring and managing data transactions, such as SQL transactions. In certain examples, a management subsystem generates an alert identifying degrading database transactions to facilitate preventative tuning or other maintenance. In particular, a monitor module tracks performance measurements (e.g., logical reads) of select transactions. A modeler correlates the performance measurements and assigns first performance model(s) to represent the performance measurements and predicted performance measurements of a particular transaction. A trend change module detects a significant change in a trend and/or variance of the performance measurements and can cause the modeler module to generate a second performance model to represent at least a portion of the performance measurements and the predicted performance measurements of the particular transaction.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: November 11, 2014
    Assignee: Dell Software Inc.
    Inventors: Guy Anthony Harrison, Guy le Mar
  • Patent number: 8856790
    Abstract: Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon thereon. In certain examples, a management server is configured to inject dependencies, such as binary data, over a network to the host system for performing a requested operation. For instance, systems and methods can establish a secure shell (SSH) port forwarding connection through which dependencies stored on the management server are injected into a service console of the host system. The injected dependencies can then be executed and/or used to perform the requested operation, such as a backup or compression operation on virtual machine data. Once the requested operation has completed, the injected binaries are preferably removed from the host system so as to conserve system resources.
    Type: Grant
    Filed: March 25, 2013
    Date of Patent: October 7, 2014
    Assignee: Dell Software Inc.
    Inventors: David Allen Feathergill, Dimitry Kherson
  • Patent number: 8838654
    Abstract: Systems and methods for using a logical data model to at least partially address the deficiencies with existing ORM solutions are provided. In certain embodiments, the logical data model includes a layer that hides the underlying physical layout of tables in a database. The logical data model can act as a data management component that supports any subset of the following: 1) dynamic data modeling and schema management; 2) data set comparison and merge with historical tracking; and/or 3) data query.
    Type: Grant
    Filed: October 23, 2012
    Date of Patent: September 16, 2014
    Assignee: Dell Software Inc.
    Inventors: Peter Douglas Hannah, Rodney Owen Willis, Jose Roberto Antonio Duenas, II
  • Patent number: 8738972
    Abstract: A method of root cause analysis in a virtual machine environment includes receiving a plurality of events from a system monitoring the virtualized environment. The events may include alarms or alerts, such as alarms or alerts associated with a resource reaching or exceeding a threshold. The capacity manager consumes these events and performs event correlation to produce a set of correlated events. The capacity manager performs a root cause analysis on the set of correlated events to identify one or more root causes. The capacity manager further performs an impact analysis to determine how the root cause impacts the system, such as other virtual machines, hosts or resource in the virtual environment. Based on the root cause and impact analysis, the capacity manager makes one or more recommendations to address issues with or to improve the operations and/or performance of the virtualized environment.
    Type: Grant
    Filed: February 3, 2012
    Date of Patent: May 27, 2014
    Assignee: Dell Software Inc.
    Inventors: Alexander Bakman, Kenneth J. Latimer, Jr., Alexey Kachkaev
  • Patent number: 8713583
    Abstract: An apparatus, system, and method are disclosed for managing policies on a computer having a foreign operating system. Policies may specify hardware or software configuration information. Policies on a first computer with a native operating system are translated into configuration information usable on a second computer having a foreign operating system. In an embodiment, a translator manager manages the association between the policy on the first computer and the translator on the second computer. Computer management complexity and information technology management costs are reduced by centralizing computer management on the native operating system. Further reductions in management complexity are realized when the present invention is used in conjunction with network directory services.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: April 29, 2014
    Assignee: Dell Software Inc.
    Inventors: Matthew T. Peterson, Daniel F. Peterson
  • Patent number: RE45327
    Abstract: Authentication credentials from legacy applications are translated to Kerberos authentication requests. Authentication credentials from the legacy application are directed to an authentication proxy module. The authentication proxy module acts as a credential translator for the application by receiving a set of credentials such as a user name and password, then managing the process of authenticating to a Kerberos server and obtaining services from one or more Kerberized applications, including Kerberos session encryption. A credential binding module associates a user corresponding to authentication credentials from a legacy authentication protocol with one or more Kerberos credentials. Anonymous authentication credentials may be translated to authentication requests for a network directory services object, such as a computer object or service object.
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: January 6, 2015
    Assignee: Dell Software, Inc.
    Inventors: John Joseph Bowers, Matthew T Peterson