-
公开(公告)号:US09971661B2
公开(公告)日:2018-05-15
申请号:US14721137
申请日:2015-05-26
Applicant: FUJITSU LIMITED
Inventor: Hideyuki Furue , Toshirou Ono , Tomoaki Mizoo
CPC classification number: G06F11/2028 , G06F11/2041 , G06F11/2048 , G06F11/2097 , G06F2201/80 , G06F2201/82 , G06F2201/84
Abstract: When the redundant system operates the second node in place of the first node in the primary system and transmits, to the secondary system, data update information generated according to a data update in the second node, the fourth node the data update information generated according to the data update in the second node from the second node using the second inter-system transfer path. The fourth node changes by changing a direction of the second intra-system transfer, a configuration by which the data update information acquired by the fourth node is acquired by the third node using the second inter-system transfer path.
-
公开(公告)号:US09971659B1
公开(公告)日:2018-05-15
申请号:US14748616
申请日:2015-06-24
Applicant: Western Digital Technologies, Inc.
Inventor: Timothy J. McCabe , Edwin D. Barnes , Michael W. Webster , Paul Bricketto , Hee Kwong , Karman Tam , Michael F. Klett , Tino Lin , Mark Nguyen , John Minh Hon Quan
CPC classification number: G06F11/1469 , G06F9/4401 , G06F11/1451 , G06F2201/84 , G06F2201/85
Abstract: Systems and methods are disclosed for programming non-volatile storage. Methods involve identifying boot loader code stored in a first partition of a non-volatile storage, the boot loader code being marked as active, executing the boot loader code using one or more processors of the computing system, loading a firmware image to a second partition of the non-volatile storage, the second partition being separate from the first partition, and marking the firmware image as active. Methods further involve detecting a power loss event and, following a power cycle, determining that the firmware image is stored in the second partition and has been marked as active, and, in response to said determination, making a copy of the firmware image and storing the copy in the first partition.
-
公开(公告)号:US20180121294A1
公开(公告)日:2018-05-03
申请号:US15556505
申请日:2015-03-24
Applicant: MITSUBISHI ELECTRIC CORPORATION
Inventor: Kengo IBE
CPC classification number: G06F11/1458 , G06F1/14 , G06F11/0754 , G06F11/0757 , G06F11/076 , G06F11/30 , G06F2201/84
Abstract: An information processing device including a recording module to record a program having cleared a watchdog timer; a determination module to refer, when the watchdog timer expires, to the recording module to determine an application to be executed from among a plurality of applications, and to determine an operating system to be executed from among a plurality of operating systems; an execution module to execute the operating system determined by the determination module; and a communication module to notify the operating system to be executed of the application to be executed.
-
公开(公告)号:US09959175B1
公开(公告)日:2018-05-01
申请号:US14788533
申请日:2015-06-30
Applicant: Spanning Cloud Apps LLC
Inventor: Brandon Mayes , Joel Rosinbum , Patricia Cifra , Gregory L. Alexander
CPC classification number: G06F11/1451 , G06F11/1435 , G06F2201/84
Abstract: Systems and methods for a backing up and/or restoring data in a cloud based application are provided. Objects that are deleted in bulk are restored in bulk. The relationships between the objects that were deleted are determined at the time of backup and used during the restore process. The restored objects have the same relationships as the original objects even when the objects are not identical. The restore process accounts for data or information in the objects that cannot be restored or that is assigned by the web application to which the objects are restored.
-
公开(公告)号:US20180113770A1
公开(公告)日:2018-04-26
申请号:US15331281
申请日:2016-10-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Khalid HASANOV , Pierre LEMARINIER , Muhammad M. RAFIQUE , Srikumar VENUGOPAL
IPC: G06F11/14
CPC classification number: G06F11/1471 , G06F11/00 , G06F11/142 , G06F2201/805 , G06F2201/82 , G06F2201/84
Abstract: Embodiments for providing failure tolerance to containerized applications by one or more processors. A layered filesystem is initialized to maintain checkpoint information of stateful processes in separate and exclusive layers on individual containers. A most recent checkpoint layer is transferred from a main container exclusively to an additional node to maintain an additional, shadow container.
-
公开(公告)号:US20180113769A1
公开(公告)日:2018-04-26
申请号:US15693181
申请日:2017-08-31
Applicant: CommVault Systems, Inc.
Inventor: Jun H. Ahn , Manas Bhikchand Mutha , Chitra Ramaswamy
CPC classification number: G06F11/1469 , G06F11/1451 , G06F11/1453 , G06F16/00 , G06F2201/80 , G06F2201/84
Abstract: A information management system allows a user to search through a secondary copy of data, such as a back up, archive, or snapshot without first retrieving the secondary copy of data. Instead, the system constructs lightweight data that can be displayed to a user as a representation of the search results. Lightweight data may include metadata or other information that identifies data included in the secondary copy of data. The lightweight data may be perceived as being the secondary copy of data and allow a user to browse through search results. Once the user identifies a search result that is of interest, information in the lightweight data can be used to retrieve the secondary copy of data. Because lightweight data may have a smaller file size than the file size of the secondary copy of data, the latency of performing a search may be reduced.
-
公开(公告)号:US09953051B2
公开(公告)日:2018-04-24
申请号:US15199181
申请日:2016-06-30
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jijun Wen , Yuanyuan Nie , Jian Li
CPC classification number: G06F17/30353 , G06F11/1469 , G06F17/30356 , G06F17/30371 , G06F2201/84
Abstract: A multi-version concurrency control method in a database and a database system, where the database system sets a data page link of a page, where the data page link includes a page pointer, and a page pointer is used to point to another version page prior to a last operation on the version page. Hence, when a page in the database is read, and when a timestamp of a current version page is greater than a timestamp of a read transaction, page-level rollback may be directly performed according to a data page link of the page that is requested to read to roll back to a page that needs to be read, which facilitates queries for data on each version page in the database, and the database system may implement record rollback efficiently.
-
公开(公告)号:US09952935B2
公开(公告)日:2018-04-24
申请号:US14988947
申请日:2016-01-06
Applicant: International Business Machines Corporation
Inventor: Lisa Seacat DeLuca , Dana L. Price , Aaron J. Quirk , Shelbee D. Smith-Eigenbrode
CPC classification number: G06F11/1451 , G06F11/1464 , G06F17/30091 , G06F2201/84 , H04L67/06 , H04L67/1097
Abstract: Approaches presented herein enable automatically detecting and preventing backup of content from a client system to a remote backup system based on specified criteria. Specifically, content on a client system is analyzed to determine one or more of content items to be backed up from the client system to a remote backup system. A set of content items from among the content items that match one or more specified criteria is detected. The specified criteria may include classes of content (e.g., document, text message, e-mail message, photograph, etc.) and contact names associated with the classes of content (e.g., creator, recipient, sender, owner, etc.). Responsive to detecting the set of content items that match the one or more specified criteria, the set of content items is prevented from being backed up to the remote backup system.
-
公开(公告)号:US20180107834A1
公开(公告)日:2018-04-19
申请号:US15670848
申请日:2017-08-07
Applicant: Commvault Systems, Inc.
Inventor: Andrei Erofeev , Rahul S. Pawar
CPC classification number: G06F21/6218 , G06F11/1402 , G06F11/1458 , G06F21/60 , G06F21/602 , G06F21/62 , G06F21/6209 , G06F21/70 , G06F21/78 , G06F2201/84 , G06F2221/2107 , H04L9/0822 , H04L9/0825 , H04L9/088 , H04L9/0891 , H04L9/0897 , H04L9/14
Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.
-
公开(公告)号:US20180101452A1
公开(公告)日:2018-04-12
申请号:US15838309
申请日:2017-12-11
Applicant: Red Hat, Inc.
Inventor: Eric Blake
IPC: G06F11/14
CPC classification number: G06F11/1484 , G06F11/1438 , G06F2201/84
Abstract: The subject matter of this specification can be implemented in, among other things, a method including creating a new disk file at a reference point-in-time, wherein an original disk file is a backing file of the new disk file, copying the original disk file to a disk snapshot file, in response to the original disk file being copied to the disk snapshot file, merging the original disk file and the new disk file to form a merged file, wherein a virtual machine is to continue to perform disk operations using the merged file, and determining whether the merged file is synchronized with the original disk file and the new disk file by determining whether entries of a bitmap for the merged file match corresponding entries of a bitmap for the new disk file.
-
-
-
-
-
-
-
-
-