-
公开(公告)号:US10673463B2
公开(公告)日:2020-06-02
申请号:US16170909
申请日:2018-10-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Russell Ian Monk , Mark Robert Watkins , Peter Thomas Camble
Abstract: Examples are disclosed including generation of a first erasure coded data portion based on a first data portion of the data object, generation of a second erasure coded data portion based on a second data portion of the data object, formation of a first combined block by combining a first part of the first erasure coded data portion and a first part of the second erasure coded data portion, formation of a second combined block by combining a second part of the first erasure coded data portion and a second part of the second erasure coded data portion, storage of the first combined block in a first storage location, and storage of the second combined block in a second storage location.
-
公开(公告)号:US20170293531A1
公开(公告)日:2017-10-12
申请号:US15507672
申请日:2014-11-17
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mark Robert Watkins , Alastair Slater
IPC: G06F11/14
CPC classification number: G06F11/1451 , G06F11/1448 , G06F11/1453 , G06F2201/815 , G06F2201/84
Abstract: In one example, backing up disk array volumes creates a snapshot of a volume of a disk array. Unshared blocks between a previous snapshot and the snapshot are identified to generate an allocation map. Source-side de-duplication is performed for a stream comprising the snapshot. The unshared blocks are folded into an endpoint store that includes a full backup of the volume, to generate a synthetic full of the volume.
-
公开(公告)号:US20200136656A1
公开(公告)日:2020-04-30
申请号:US16170909
申请日:2018-10-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Russell Ian Monk , Mark Robert Watkins , Peter Thomas Camble
Abstract: Examples are disclosed including generation of a first erasure coded data portion based on a first data portion of the data object, generation of a second erasure coded data portion based on a second data portion of the data object, formation of a first combined block by combining a first part of the first erasure coded data portion and a first part of the second erasure coded data portion, formation of a second combined block by combining a second part of the first erasure coded data portion and a second part of the second erasure coded data portion, storage of the first combined block in a first storage location, and storage of the second combined block in a second storage location.
-
公开(公告)号:US20230259390A1
公开(公告)日:2023-08-17
申请号:US17672658
申请日:2022-02-15
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Tom Howley , Eamonn O'Toole , Mark Robert Watkins
IPC: G06F9/48
CPC classification number: G06F9/4843
Abstract: Examples described herein relate to providing a simplified interface by a cloud platform to an IaC service. According to an example, operational details associated with multiple infrastructure as code (IaC) tools are abstracted by providing an application programming interface (API) of an IaC service through which multiple IaC templates are available for use to deploy workloads against multiple services within a cloud platform. Each IaC template describes a workload according to an IaC tool and specifies input parameters for the workload. A request to create a deployment based on a particular IaC template is received via the API. The request is satisfied by internally executing the IaC tool associated with the particular template based on parameter values supplied for the specified input parameters for the particular workload.
-
公开(公告)号:US10721062B2
公开(公告)日:2020-07-21
申请号:US15329997
申请日:2014-09-24
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Liqun Chen , Peter Thomas Camble , Mark Robert Watkins , Ieuan James Henry
Abstract: Utilizing error correction (ECC) for secure secret sharing includes computing an encrypted key using a key and a number of random values, computing, based on a first ECC scheme, a key ECC for the encrypted key and the random values, and storing a number of key fragments on a number of storage servers, the number of key fragments includes the encrypted key, the random values, and the key ECC.
-
-
-
-