Domain joined virtual names on domainless servers

    公开(公告)号:US10270760B2

    公开(公告)日:2019-04-23

    申请号:US15725577

    申请日:2017-10-05

    Abstract: Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller. The controller controls at least one security domain using an authentication protocol, such as a modified Kerberos protocol. One obtains a set of security domain credentials, generates a cluster name secret, gives the cluster a virtual name, and authenticates the machines to the domain controller using these items. In some cases, authentication uses a ticket-based protocol which accepts the cluster name secret in place of a proof of valid security domain membership. In some, the domain controller uses a directory service which is compatible with an active directory service; the cluster virtual name is provisioned as an account in the directory service. The cluster virtual name may concurrently serve clients on different security domains of the directory service.

    Processing files via edge computing device

    公开(公告)号:US11599381B2

    公开(公告)日:2023-03-07

    申请号:US17444031

    申请日:2021-07-29

    Abstract: Examples are disclosed that relate to processing files between a local network and a cloud computing service. One example provides a computing device configured to be located between a local network and a cloud computing service, comprising a logic machine and a storage machine comprising instructions executable to receive, from a device within the local network, a file at a local share of the computing device, and in response to receiving the file, generate a file event indicating receipt of the file at the local share and provide the file event to a virtual machine executing on the computing device. The instructions are further executable to, based upon a property of the file, provide the file to a program operating within a container in the virtual machine to process the file, and send a result of executing the program on the file to the cloud computing service.

    Processing files via edge computing device

    公开(公告)号:US11080078B2

    公开(公告)日:2021-08-03

    申请号:US16240540

    申请日:2019-01-04

    Abstract: Examples are disclosed that relate to processing files between a local network and a cloud computing service. One example provides a computing device configured to be located between a local network and a cloud computing service, comprising a logic machine and a storage machine comprising instructions executable to receive, from a device within the local network, a file at a local share of the computing device, and in response to receiving the file, generate a file event indicating receipt of the file at the local share and provide the file event to a virtual machine executing on the computing device. The instructions are further executable to, based upon a property of the file, provide the file to a program operating within a container in the virtual machine to process the file, and send a result of executing the program on the file to the cloud computing service.

    Storage device access mediation
    19.
    发明授权

    公开(公告)号:US10686721B2

    公开(公告)日:2020-06-16

    申请号:US15918525

    申请日:2018-03-12

    Abstract: A system is configured to use a de-randomizer and budget data structure to economize I/O operations for a shared storage device while still allowing access to the device to a number of different entities. Embodiments can identify a comparatively low cost next operation as compared to other I/O operations, including a cost for seek time, for a first entity to dispatch to the storage device when the first entity has sufficient budget to have the I/O operation performed on its behalf and to identify an I/O operation for a second entity to dispatch to the storage device when there is insufficient budget for the first entity.

    Distributed storage defense in a cluster

    公开(公告)号:US09641614B2

    公开(公告)日:2017-05-02

    申请号:US13904989

    申请日:2013-05-29

    Abstract: Embodiments provide a method and system for enabling access to a storage device. Specifically, a node may request admittance to a cluster that has read and write access to a storage device. The node seeking access to the storage device must be first be approved by other nodes in the cluster. As part of the request, the node seeking access to the storage device sends a registration key to a storage device. Upon expiration of a registration timer, the node seeking access to the storage device receives a registration table from the storage device and determines whether its registration key is stored in the registration table. If the registration key is stored in the registration table the node has been accepted in the cluster and as a result, has been granted read and write access to the storage device.

Patent Agency Ranking