Abstract: One example method includes providing temporary access to a computing system and to providing temporary access as a service. The features of a temporary access can be defined by an entity and a user may be able to obtain a token that includes these features, which may be embedded in the token as claims. The user's access is then controlled in accordance with the embedded claims. The temporary access as a service can be federated. The token may include trust levels and tolerance limits. Further, aspects of the temporary access can be monitored and/or changed. Adjustments to trust levels can be automated or manually performed. Further trust for specific users can be gained or lost over time based on at least previous accesses.
Abstract: A request is received from a user at a client to access a file of a set of files backed up to a backup server. Upon verifying a password provided by the user, the client is issued another request for authentication. A first data structure is received responsive to the request. The first data structure is generated using identifiers corresponding to a set of files at the client of which at least some presumably have been backed up to the server. A second data structure is generated. The second data structure is generated using identifiers corresponding to the set of files backed up to the server. The first and second data structures are compared to assess a degree of similarity between the files at the client and the files backed up to the backup server. The user is denied access when the degree of similarity is below a threshold.
Abstract: Scaling an ordered event stream (OES) based on an information-unit (IU) metric is disclosed. The IU metric can correspond to an amount of computing resources that can be consumed to access information embodied in event data of an event of the OES. In this regard, the amount of computing resources to access the data of the stream event itself can be distinct from an amount of computing resources employed to access information embodied in the data. As such, where an external application, e.g., a reader, a writer, etc., can connect to an OES data storage system, enabling the OES to be scaled in response to burdening of computing resources accessing event information, rather than merely event data, can aid in preservation of an ordering of events accessed from the OES.
Abstract: One example method includes accessing an appearance history of a person, the appearance history including information concerning an appearance of a person at a particular time, generating, based on the appearance history, a forecast that comprises a probability that the person will appear again at some future point in time, determining that the probability meets or exceeds a threshold, and updating a high probability group database to include a facial image of a face of the person.
Abstract: A method, an electronic device, and a computer program product for processing data is disclosed. The method includes training a classification model based on a plurality of reference documents describing different objects, the trained classification model respectively associating the plurality of reference documents with the described objects. The method further includes determining from the individual words identification information that can identify the objects based on contributions of individual words in the reference documents to the association. Identification information that can identify objects in documents describing the objects may be determined, so that an identification information data set is automatically generated for training a machine learning model that is used to determine the identification information.
Abstract: An apparatus comprises at least one processing device. The at least one processing device is configured, for each of a plurality of logical storage devices of a storage system, to determine in a multi-path layer of a layered software stack of a host device a performance level for that logical storage device, to communicate the performance levels for respective ones of the logical storage devices from the multi-path layer of the layered software stack of the host device to at least one additional layer of the software stack above the multi-path layer, and to select particular ones of the logical storage devices for assignment to particular storage roles in the additional layer based at least in part on the communicated performance levels. The additional layer in some embodiments comprises an application layer configured to automatically select a particular one of the logical storage devices for a particular storage role.
Type:
Grant
Filed:
July 29, 2021
Date of Patent:
April 9, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Sanjib Mallick, Vinay G. Rao, Jay Jung, Arieh Don
Abstract: Detecting a trend in latency for storage underlying a deduplicated file system includes generating a set of data points by recording when input/output (IO) requests were issued to the storage and recording time required to receive success responses from the storage. Least squares regression is performed on the data points to find a best-fit line through the data points. A slope of the best-fit line is calculated. A determination is made as to whether the slope is positive, a positive slope thereby indicating a trend of increasing latency of the storage. When the slope is determined to be positive, clients accessing the deduplicated file system are throttled.
Type:
Grant
Filed:
April 16, 2021
Date of Patent:
April 9, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Nitin Madan, Fani Jenkins, Gobikrishnan Sundharraj, Deepa Ramesh
Abstract: Techniques are provided for caching of machine learning model training parameters. One method comprises training a machine learning model using a given training dataset; and caching a parameter of the machine learning model from the training with the given training dataset. The cached parameter of the machine learning model is used for a subsequent training of the machine learning model. The caching may be performed after each of multiple iterations of the training of the machine learning model. A given cached iteration of the training of the machine learning model may be identified using a key based on: (i) a hash of the given training dataset, (ii) a hash of the machine learning model parameter, and/or (iii) hyperparameters of the machine learning model. The caching of a given iteration of the machine learning model may occur when the given cached iteration is not found in a cache memory.
Abstract: Embodiments of the present disclosure relate to a multi-node storage system and a data deduplication method thereof. The method includes determining a similarity hash value of a super block, wherein the similarity hash value indicates similarity between super blocks The method further includes comparing the similarity hash value of the super block with a feature similarity hash value of a node of the multi-node storage system to determine whether the super block matches the node and, in response to determining that the super block matches the node, allocating the super block to the node.
Abstract: A peer-to-peer global namespace for storage system metadata federations. Specifically, the disclosure proposes a peer-to-peer metadata federation architecture, where enterprise storage metadata for any and all geo-distributed sites may be distributed across and continually reconciled by a network of nodes, instead of being maintained by a single node assigned to a given geographic location. In implementing a federation, the network of nodes may lack exploitable, centralized points of vulnerability, and therefore, may exhibit no central point of failure. Furthermore, the disclosure proposes the implementation of a global metadata namespace for the enterprise storage metadata spanning the entirety of an enterprise (across all geographic locations). The global metadata namespace may be maintained on each node through event-based synchronization.
Abstract: Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for recommending a protection strategy. The method includes obtaining contents of attributes of a plurality of data assets adjusted. The method further includes generating a plurality of vector representations for the plurality of data assets based on the contents of the attributes. The method further includes dividing the plurality of data assets into at least one category based on the plurality of vector representations. The method further includes if it is determined that a protection strategy for one data asset in the at least one category exists, determining the protection strategy as a recommended strategy for another data asset in the at least one category.
Type:
Grant
Filed:
November 10, 2021
Date of Patent:
April 2, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Ren Wang, Qi Wang, Yun Zhang, Ming Zhang, Weiyang Liu
Abstract: A system can receive, from user input, request data indicative of a request to create a file with a first filename. The system can, based on the request data, determining a second filename for the file. The system can store an association between the first filename and the second filename. The system can create the file in a file system with the second filename.
Abstract: A technique manages objects in a software development project. In particular, in response to receiving a commit request for committing a group of objects, a group of historical commit requests associated with the group of objects are acquired based on a commit history, wherein historical commit requests in the group of historical commit requests involve the group of objects. A candidate object is selected from at least one object involved in the historical commit requests that is different from the group of objects. An association relationship between the candidate object and the group of objects is determined. The candidate object is identified as a missing object in response to determining that the association relationship satisfies a predetermined condition, the missing object indicating an object associated with the commit request but not included in the commit request. Accordingly, objects that are missing in a commit request can be automatically checked.
Abstract: Techniques for providing effective utilization of different drive capacities in storage appliances. The techniques include providing a storage drive array that has a first set of storage drives and a second set of storage drives. Each storage drive in the first set has a first drive capacity and each storage drive in the second set has a second drive capacity. The first drive capacity is higher than the second drive capacity. The techniques include allocating, within the first drive capacity, at least a first sub-capacity and a second sub-capacity. The first sub-capacity is equal to the second drive capacity. The techniques include placing blocks of hot data in the first sub-capacities of the storage drives in the first set and/or the second drive capacities of the storage drives in the second set, and placing blocks of cold data in the second sub-capacities of the storage drives in the first set.
Type:
Grant
Filed:
October 26, 2020
Date of Patent:
April 2, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Daniel E. Cummins, Vamsi K. Vankamamidi, Shuyu Lee
Abstract: The present disclosure relates to a method, an electronic device, and a computer program product for monitoring a field device. For example, a method for monitoring a field device is provided. The method may include receiving facility information data associated with locations of a group of field devices and a sensing data set acquired by a sensing apparatus arranged near the group of field devices. The method may further include determining, according to a determination that sensing data associated with at least one field device in the group of field devices in the sensing data set is abnormal, a target location of the at least one field device based on the facility information data. In addition, the method may further include generating navigation information from a source location where a user is located to the target location.
Type:
Grant
Filed:
July 21, 2020
Date of Patent:
April 2, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Danqing Sha, Pedro Fernandez Orellana, Zhen Jia, Xuwei Tang
Abstract: A method, an electronic device, and a computer program product for storage management are provided. The method includes: acquiring a lock attribute record in a lock attribute record chain from a data protection network for backing up data, data protection servers of the data protection network reaching a consensus on the lock attribute record chain, the lock attribute record including a first attribute value of an attribute of a lock operation, the lock operation being used for preventing a backup of the data stored in a storage server from being tampered with; acquiring, based on the lock attribute record, a second attribute value of the attribute of the lock operation from the storage server; and generating, based on determining that the first attribute value does not match the second attribute value, an alarm indicating that the backup is tampered with. This solution can better prevent data from being tampered with.
Type:
Grant
Filed:
May 11, 2020
Date of Patent:
April 2, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Simon Yuting Zhang, Yizhou Zhou, Aaron Chao Lin
Abstract: Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for using a virtual desktop. A method in one embodiment includes receiving, at a first edge node in a plurality of edge nodes, an instruction from a first set of input devices in a plurality of peripheral devices. The instruction is for use of a first virtual desktop deployed on the first edge node. The method further includes: using the first virtual desktop based on the instruction by using resources at the first edge node. The method further includes: sending data to an output device in the plurality of peripheral devices, wherein the data is associated with the use of the first virtual desktop. The solution for using a virtual desktop of the present application enables the use of a virtual desktop using resources at an edge node without requiring a client.
Abstract: A method, computer program product, and computer system for identifying, by a computing device, a number of extents needed for a create snapshot operation to create a snapshot. The number of extents may be added to an in-memory cache. The number of extents needed for the create snapshot operation may be allocated from the in-memory cache to execute the create snapshot operation. Freed extents may be added to the in-memory cache based upon, at least in part, executing a delete snapshot operation to delete the snapshot.
Abstract: In general, embodiments relates to a method for managing a technical support session, comprising: obtaining customer identification information for a technical support session, extracting at least one keyword for the technical support session, identifying a plurality of historical technical support sessions using the at least one keyword and the customer identification information, and displaying at least one of the plurality of historical technical support sessions to a technical support person (TSP) during the technical support session.
Abstract: A method, computer program product, and computer system for receiving, by a computing device, a Write-Same operation from a host for a range of logical block addresses of a destination. Data may be recorded in a buffer to indicate that the Write-Same operation is complete prior to completing the Write-Same operation. An acknowledgment may be sent to the host that the Write-Same operation is complete prior to flushing to a final destination. The Write-Same operation for the logical block addresses of the destination may be performed after sending the acknowledgment to the host that the Write-Same operation is complete.