Abstract: Techniques are provided for secure data management in a network computing environment. A security management system receives data from a device which operates in a device network that is managed by the security management system. The security management system performs a data classification process to determine a data sensitivity level of the received data. The security management system determines a type of encryption to apply to the received data based on the determined data sensitivity level. The type of encryption is determined from a plurality of different types of encryption that are supported by a cloud system. The security management system sends the received data to the cloud system to at least one of store the data and perform secured data analytic processing of the data, in a format according to the determined type of encryption.
Abstract: Methods and systems for restoring data are described. According to some embodiments, the method, in response to receiving a first restore request, initiates a second restore request to a hybrid data buffer to route blocks of backup data to the hybrid data buffer. The method further invokes an interrupt service routine (ISR) that is initialized with reserved addresses. When the blocks of backup data are transmitted to the hybrid data buffer, the method further tags, by the ISR, the blocks of backup data to a specified location, where the specified location is one of the reserved addresses.
Abstract: A method, computer program product, and computing system for sensing a failure within a system within a computing device. The system may include a cache memory system and a vaulted memory comprising a random access memory (RAM) having a plurality of independent persistent areas. A primary node and secondary node may be provided. The primary node may occupy a first independent persistent area of the RAM of the vaulted memory. The secondary node may occupy a second independent persistent area of the RAM of the vaulted memory. Data within the vaulted memory may be written to a persistent media using an iterator. The data may include at least one dirty page. Writing data within the vaulted memory to the persistent media may include flushing the at least one dirty page to the persistent media.
Type:
Grant
Filed:
April 22, 2021
Date of Patent:
March 26, 2024
Assignee:
EMC IP Holding Company, LLC
Inventors:
Oran Baruch, Ronen Gazit, Jenny Derzhavetz
Abstract: Techniques for managing metadata storage units involve: in response to receiving, from a client, a request for allocating a target number of metadata storage units, determining a first number of available metadata storage units remaining in a metadata storage space of a storage system after the allocation is performed; and if the first number is not less than a reserved number, allocating the target number of metadata storage units from the metadata storage space for the client to use, wherein the reserved number is associated with a usage condition of the metadata storage units in the storage system. Accordingly, such techniques can effectively manage metadata and improve the performance of a system.
Abstract: Embodiments of the present disclosure provide a data protection method, an electronic device, and a computer program product. The method includes determining an object feature for each protection object in a set of protection objects that generate protected data, the set of protection objects including at least one protection object configured with a predetermined data protection strategy. The method further includes determining a set of candidate objects belonging to the same class as the at least one protection object from the set of protection objects according to the determined object features. The method further includes configuring the predetermined data protection strategy to at least one candidate object in the set of candidate objects.
Abstract: Workloads, e.g., synthetic workloads, on one or more storage systems in an dynamic, automated manner, for example, to load test the one or more storage systems. A distributed system may be employed in which a workload information server (WIS) serves one or more clients referred to herein as workload control components (WCCs) that analyze workload information of the one or more storage systems, and control the modification of workloads thereon based on this analysis, through the WIS. The WIS also may serve one or more clients referred to herein as workload generation controllers (WGCs) that monitor workloads on the one or more storage systems, report workload information to the WIS and generate, modify or remove workloads on the one or more storage systems according to instructions received from the WIS in response to requests (e.g., hints) from the one or more WGCs.
Abstract: A technique maintains online access to data stored in a plurality of storage devices during a hardware upgrade in which the plurality of storage devices moves between storage processor enclosures. The technique involves providing, from the plurality of storage devices, online access to the data while each storage device of the plurality of storage devices resides in a first storage processor enclosure. The technique further involves providing, from the plurality of storage devices, online access to the data while the plurality of storage devices is moved from the first storage processor enclosure to a second storage processor enclosure (e.g., transferring each storage devices one by one before triggering a rebuild process). The technique further involves providing, from the plurality of storage devices, online access to the data while each storage device of the plurality of storage devices resides in the second storage processor enclosure.
Type:
Grant
Filed:
January 22, 2021
Date of Patent:
March 26, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Min Zhang, Haohan Zhang, Yang Liu, Jianhuang Li, Wai C. Yim
Abstract: Trocar retractor apparatus and methods for use are described where an apparatus for positioning an instrument may generally include a substrate having a first surface and a second surface opposite to the first surface, an instrument positioning guide projecting from the first surface of the substrate, and one or more suction assemblies positioned along the second surface and in fluid communication with an interior of the substrate. The one or more suction assemblies may be attachable to a tissue region via a vacuum force applied through the one or more suction assemblies. The apparatus may also have the substrate configured to maintain a predetermined configuration when the vacuum force is applied.
Abstract: Methods, apparatus, and processor-readable storage media for request processing for configurable information technology solutions are provided herein. An example method includes obtaining a request that is to be processed based on a current configuration of a system, wherein the system comprises a plurality of items and each item comprises a set of components, each of the components having one of a plurality of types; obtaining component-level information for the plurality of items from multiple data sources; determining the current configuration of the system by applying one or more rules to the component-level information that identify at least one particular one of the types of at least one of the components in each of one or more of the sets and a quantity of the components of the at least one particular type that are in the corresponding set; and processing the request based on the determined current configuration.
Abstract: One example method includes a pipeline for a distributed neural network. The pipeline includes a first phase that identifies intersecting identifiers across datasets of multiple clients in a privacy preserving manner. The second phase includes a distributed neural network that includes a data receiving portion at each of the clients and an orchestrator portion at an orchestrator. The data receiving portions and the orchestrator portions communicate forward and backward passes to perform training without revealing the raw training data.
Type:
Grant
Filed:
September 30, 2020
Date of Patent:
March 19, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Mohamed Abouzeid, Osama Taha Mohamed, AbdulRahman Diaa
Abstract: Embodiments of the present disclosure provide a method, an electronic device, and a program product implemented at an edge switch for data encryption. For example, the present disclosure provides a data encryption method implemented at an edge switch. The method may include receiving encryption and decryption information for an encryption operation or a decryption operation from a source device. In addition, the method may include encrypting a data packet received from the source device based on encryption information in the encryption and decryption information to generate an encrypted data packet. The method may further include sending the encrypted data packet to a target device indicated by the data packet. The embodiments of the present disclosure can reduce the computing loads of Internet of Things (IoT) devices, clouds, and servers while ensuring encryption performance, and can also reduce the time delay caused by encryption and decryption operations.
Abstract: Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for storing and accessing data. A method for storing data includes: dividing, in response to receiving a request for storing data from a client, the data into a plurality of data blocks; storing the plurality of data blocks in a plurality of servers respectively; generating metadata of the data to record corresponding addresses for storing the plurality of data blocks in the plurality of servers; and storing the generated metadata in a metadata repository. The embodiments of the present disclosure can effectively improve data transmission efficiency, data availability, and data security in a cloud storage system.
Abstract: One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.
Type:
Grant
Filed:
June 17, 2021
Date of Patent:
March 19, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu
Abstract: Embodiments for enabling granular migration of data with high efficiency. A defined metadata element, a tag, is assigned to each file, and then tag filtering is used to direct the data to the proper location. Files with different tags can be selected for transfer, and such a group of tags is referred to as a tag set. Embodiments can be used with a defined backup system file migration process, such as present in the Data Domain File System. By using snapshots, incoming new data (ingested file) is allowed to continue while the migration is in process and maintaining data consistency at the same time. This is achieved by performing operations on B+ Tree snapshots in conjunction with tag filtering on keys present in the leaf pages of these structures. This method is efficient became it makes a single pass walk of a B+ Tree in contrast with previous methods that look up files one-by-one via their pathname.
Type:
Grant
Filed:
July 22, 2021
Date of Patent:
March 19, 2024
Assignee:
EMC IP Holding Company LLC
Inventors:
Charles J. Hickey, Murthy V. Mamidi, Neerajkumar Chourasia
Abstract: The technology described herein efficiently determines whether a real inode is shared among views, or owned. In-memory data structures include a view snapshot generation counter that is increased as a snapshot that generates a view is created, and an inode total weight. An in-memory virtual inode cache dataset for a filesystem object associated with the view is instantiated with the value of snapshot generation counter, sharing-related data based on the inode mapping file entry for the object, and an inode access weight. To determine whether the inode is shared (and needs to be split), such as on a write to the object, the in-memory data is evaluated. The real inode is shared if the generation counters are unequal, if the sharing-related data indicates sharing at an intermediate indirect block level, or indicates sharing at the inode level and the inode access weight is less than the inode total weight.
Type:
Grant
Filed:
July 23, 2021
Date of Patent:
March 19, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Rohit K. Chawla, Ahsan Rashid, Soumyadeep Sen, Marc A. De Souter, Morgan A. Clark, Alexander S. Mathews
Abstract: A method, computer program product, and computing system for dividing a volume into a plurality of segments. The plurality of segments may be assigned to a plurality of nodes of a multi-node storage system. One or more input/output (IO) request paths for accessing the plurality of segments may be defined based upon, at least in part, assigning the plurality of segments to the plurality of nodes.
Type:
Grant
Filed:
October 21, 2020
Date of Patent:
March 19, 2024
Assignee:
EMC IP Holding Company, LLC
Inventors:
David Meiri, Vinay G. Rao, Sanjib Mallick
Abstract: Data protection operations including replication operations are disclosed. Virtual machines, applications, and/or application data are replicated according to at least one strategy. The replication strategy can improve performance of the recovery operation.
Type:
Grant
Filed:
May 19, 2020
Date of Patent:
March 19, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Bing Liu, Jehuda Shemer, Kfir Wolfson, Jawad Said
Abstract: A method, electronic device, and computer program product for processing data is disclosed. The method includes acquiring a configuration file for generating and sending a structured report, the structured report involving analysis of an application. The method also includes acquiring, based on an address of a data source in the configuration file, data from the data source to add the data to the structured report, the data source including the same type of data generated by the application. The method includes sending, based on an identifier of a target server in the configuration file, the structured report to the target server for analyzing the application. With this method, the format of a structured report to be acquired can be adjusted at any time without version upgrade, thereby saving time.
Abstract: Systems and methods for allocating resources are disclosed. Resources such as streams are allocated using a stream credit system. Credits are issued to the clients in a manner that ensure the system is operating in a safe allocation state. The credits can be used not only to allocate resources but also to throttle clients where necessary. Credits can be granted fully, partially, and in a number greater than a request. Zero or negative credits can also be issued to throttle clients.
Abstract: One example method includes, in a data buffer that includes one or more words and whitespaces, calculating a hash value of data in a window that is movable within the data buffer, comparing the hash value to a mask, and when the hash value matches the mask, identifying a position of the window in the data buffer as a chunk anchor position, searching for a whitespace nearest the chunk anchor position, and designating an offset of the whitespace as a segment boundary.