Abstract:
Techniques for managing data storage within storage tiers are disclosed. In one particular embodiment, the techniques may be realized as a method for managing data storage having the steps of assigning a storage class for each of a plurality of storage tiers, defining at least one rule for storing data in the plurality of storage tiers, determining whether performance assisted tier migration is requested, monitoring the plurality of storage tiers when it is determined that the performance assisted tier migration is requested, determining whether to redefine the storage class of one of the plurality of storage tiers based on the monitoring, and determining whether to migrate the data based on the monitoring.
Abstract:
A method and apparatus for reliable I/O performance anomaly detection. In one embodiment of the method, input/output (I/O) performance data values are stored in memory. A first performance data value is calculated as a function of a first plurality of the I/O performance data values stored in the memory. A first value based on the first performance data value is calculated. An I/O performance data value is compared to the first value. A message is generated in response to comparing the I/O performance value to the first value.
Abstract:
The disclosed computer-implemented method for crowd sourced application advisory may include determining at least one characteristic associated with an application, collecting, from a plurality of computing devices, a sentiment associated with the application, wherein the sentiment reflects an assessment of the application in light of the at least one characteristic by at least one user of the application, presenting, via a user interface, the at least one characteristic associated with the application, the presentation of the at least one characteristic being modified by the sentiment collected from the plurality of computing devices, and receiving, via the user interface, at least one of a decision to install the application or a decision to uninstall the application. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosed computer-implemented method for enforcing secure shared access on computing devices by context pinning may include recording, on the computing device, one or more actions performed on one or more applications, determining, based on the recorded actions and applications, a context that defines permitted actions and applications for a guest user of the computing device, monitoring, based on the context, user activity on the computing device, detecting an activity that violates the context, and performing, in response to the detection, a security action. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
A method and apparatus for reliable I/O performance anomaly detection. In one embodiment of the method, input/output (I/O) performance data values are stored in memory. A first performance data value is calculated as a function of a first plurality of the I/O performance data values stored in the memory. A first value based on the first performance data value is calculated. An I/O performance data value is compared to the first value. A message is generated in response to comparing the I/O performance value to the first value.