Abstract:
A method, device and computer program product for securing access to an encoded variable in a computer program with a plurality of encoded variables that each having its own dynamic signature, wherein when the encoded variable is accessed, the dynamic signature of the variable is modified, where the sum value for all dynamic signatures of all other encoded variables is controlled in an encoded tracer variable, the sum value being controlled in the tracer variables is adapted if a dynamic signature of one of the encoded variables is modified, the encoded variable is compared with the sum value stored in the encoded tracer variable to monitor the sum of the dynamic signatures, and where an error handling process is initiated in the event of a discrepancy such that all signatures in an arithmetically encoded program can be managed in a high-performance manner regardless of the complexity of the program.
Abstract:
Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.
Abstract:
A technique for tracking web browsing activity of a client device that includes storing, in a memory, a client profile having a client identifier associated therewith, providing a client device with a cache file having the client identifier embedded therein, receiving from the client device an identification of a client action and the client identifier, and updating the client profile to include the identification of the client action.
Abstract:
A system and method for data replication is described. A destination storage system receives a message from a source storage system as part of a replication process. The message includes an identity of a first file, information about where the first file is stored in the source storage system, a name of a first data being used by the first file and stored at a first location of the source storage system, and a fingerprint of the first data. The destination storage system determines that a mapping database is unavailable or inaccurate, and accesses a fingerprint database using the fingerprint of the first data received with the message to determine whether data stored in the destination storage system has a fingerprint identical to the fingerprint of the first data.
Abstract:
Examples include application of a variable-sized content-defined chunking technique to a first data portion to identify a content-defined chunk boundary at least partially defining a remainder section, merging of the remainder section with a second data portion ordered before the first data portion to create a merged section, and application of the chunking technique to the merged section.
Abstract:
An exemplary method for detecting one or more anomalies in a system includes building a temporal causality graph describing functional relationship among local components in normal period; applying the causality graph as a propagation template to predict a system status by iteratively applying current system event signatures; and detecting the one or more anomalies of the system by examining related patterns on the template causality graph that specifies normal system behaviors. The system can aligning event patterns on the causality graph to determine an anomaly score.
Abstract:
The present disclosure relates to a method, adapted to be implemented in an electronic device, for selecting a content, during a backup operation, amongst a plurality of contents coding audiovisual data and being accessible by the electronic device. According to one embodiment, the method includes obtaining, for each accessible content, one audiovisual descriptor derived from the audiovisual data, and selecting the accessible content according to one backup rule taking into account the obtained audiovisual descriptor. The present disclosure also relates to corresponding electronic device, system, computer readable program product and computer readable storage medium.
Abstract:
A method for processing data is suggested, and includes (i) conveying input data from a safety component to a security component, and (ii) calculating, at the security component, a second identifier based on the input data. The method further includes (iii) conveying the second identifier to the safety component, and (iv) verifying, at the safety component, a first identifier based on the second identifier.
Abstract:
Techniques are described for reducing I/O operations and storage capacity requirements for centralized backup storage systems. A central server optimizes the collection and centralization of backup data from a number of endpoint devices for backup purposes. The central server utilizes a single instance store and a persistent files cache to minimize the number of backup copies for each non-unique file, reduce storage usage, network traffic, memory footprint and CPU cycles required to identify and process non-unique data. For each file in the single instance store, the server tracks the source device of that file until a threshold number of devices have been reached. Once the file reaches the threshold number of sources, the file is marked as persistent and its hash value is placed in the persistent files cache. Thereafter, all pointer creation and reference counting for that file cease.
Abstract:
Some embodiments are directed to a method and apparatus for implementing an automatic failover mechanism for a resource. A client accesses a source through a first server using a first session. During the session, the client stores checksum information corresponding to data received via the session with the first server. When it is detected that the session between the first server and the client has failed, the client is automatically connected with second server that has access to the resource. The checksum information is transmitted from the client to the second server, where it is compared with checksum information calculated at the second server, so that a determination can be made as to whether the client can continue processing where it left off when connected to the second server.