Entries |
Document | Title | Date |
20100094816 | Safety-Critical Data Checking In Object-Oriented Systems - Methods for detecting the corruption of vital data during the execution of object-oriented programs are disclosed. In accordance with the illustrative embodiments, code is generated at run-time for computing a checksum of vital data in an object, and the code is inserted into the object. When the object is created, this code is executed to compute an initial checksum, and subsequently the code re-computes the checksum during program execution so that a change in the checksum—and inferentially, a change in one or more vital data—can be detected. The checksum is subsequently re-computed during program execution—either periodically, or in response to events such as when the object is modified or when a method of the object is invoked. | 04-15-2010 |
20100094817 | STORAGE-NETWORK DE-DUPLICATION - Techniques are provided for de-duplication of data. In one embodiment, a system comprises de-duplication logic that is coupled to a de-duplication repository. The de-duplication logic is operable to receive, from a client device over a network, a request to store a file in the de-duplicated repository using a single storage encoding. The request includes a file identifier and a set of signatures that identify a set of chunks from the file. The de-duplication logic determines whether any chunks in the set are missing from the de-duplicated repository and requests the missing chunks from the client device. Then, for each missing chunk, the de-duplication logic stores in the de-duplicated repository that chunk and a signature representing that chunk. The de-duplication logic also stores, in the de-duplicated repository, a file entry that represents the file and that associates the set of signatures with the file identifier. | 04-15-2010 |
20100145919 | METHOD AND SYSTEM FOR PRUNED RESILVERING USING A DIRTY TIME LOG - A computer readable medium includes executable instructions for resilvering a hierarchical block tree in a storage pool by traversing a branch of the hierarchical block tree only if a birth time of a parent block of the branch is greater than or equal to a lowest birth time on a dirty time log (DTL), and resilvering a child block in the branch only if the DTL comprises a birth time of the child block. | 06-10-2010 |
20100205161 | TRANSITIVE FILE COPYING - A method, apparatus, and article of manufacture provide an alternative mechanism for copying files. A request to copy a first file from a first source location to a first target location is received. A first checksum value of the first file is determined and used in a query to find a second source location for a second file. The second file has a second checksum value that is equivalent to the first checksum value. Additionally, the second file is located at the second source location. A determination is made regarding whether to copy the first file from the first source location or the second file from the second source location. Thereafter, the first source file or the second source file is copied to the first target location based on the determining. | 08-12-2010 |
20100211553 | METHOD AND APPARATUS FOR SIMPLIFYING THE DECODING OF DATA - The various methods and devices described herein relate to devices which, in at least certain embodiments, may include a method of decoding data or a data stream in a file, which may include checking for a first data portion of a plurality of data portions in the file, the first data portion having a first data value, reading in data from another data portion of the plurality of data portions, decoding or decompressing the data, performing a checksum operation on the decoded data if the first data portion having the first data value is not detected, and skipping a checksum operation on the decoded data if the first data portion having the first data value is detected. In the embodiment, a checksum operation on encoded data may also be skipped. In an embodiment, the first data value may include information or instructions about how a decoder may decode the data and may also include a tag or identifier. | 08-19-2010 |
20110055178 | DISPERSED STORAGE UNIT AND METHODS WITH METADATA SEPARATION FOR USE IN A DISPERSED STORAGE SYSTEM - A data slice to be stored in a dispersed storage unit of the dispersed storage system is received. A plurality of data blocks are generated from the data slice and metadata are generated associated with each of the plurality of data blocks. A data file is generated based on the plurality of data blocks. A metadata file is generated based on the metadata associated with the plurality of data blocks. The metadata file and the data file are stored in at least one memory of the dispersed storage unit. | 03-03-2011 |
20110082844 | Method and apparatus of correcting chemical names - A computer-implemented method and system for checking a chemical name. The method tokenizes the chemical name to obtain corresponding tokens; checks the chemical name according to the chemical association between chemical compositions represented by the tokens; and if the chemical name does not pass the check, replaces at least part of tokens of the chemical name that does not pass the check, and repeats the checking step. The system and method can not only help users to find and correct errors in spelling a chemical name but also check the entire chemical name at the level of chemical associations. Hence, not only chemical names that are incorrectly spelled but also ones that do not conform to chemical rules can be found, and significant help is provided to users for correcting chemical names. | 04-07-2011 |
20110137878 | Data Consistency Validation - An entity to be validated for consistency is loaded into the buffer of the consistency service, a signal to verify the existence of a specific data set of an IT system is then sent by the consistency service to the IT system holding the entity to be validated for consistency, and the consistency validating information is stored in the output means, said consistency validating information depending on the signal being sent back to the consistency service. | 06-09-2011 |
20110208705 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR STORING FILE SYSTEM CONTENT IN A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for storing file system content in a multi-tenant on-demand database system. These mechanisms and methods for storing file system content in a multi-tenant on-demand database system can enable embodiments to reduce a number of files stored on a file system, avoid copying of all file system content to file system copies, etc. | 08-25-2011 |
20120117040 | Method and System for Verifying Data Stored on a Medium - In a data storage system having a server and a media drive, a method and system for verifying data stored on a medium. The method includes reading, at the media drive in response to a verify command indicative of a user request to perform data verification, a logical record stored on the medium, where the logical record comprising data and a first checksum. The method also includes generating, at the media drive, a second checksum based on the data of the logical record read, and comparing, at the media drive, the second checksum generated at the media drive and the first checksum. The method still further includes communicating, from the media drive to the server, a status indication based on the comparison of the first checksum and the second checksum, where the status indication is representative of a result of the requested data verification. | 05-10-2012 |
20120136845 | METHOD AND SYSTEM FOR SAFEGUARDING DIGITAL OBJECTS CONSISTING OF DIGITAL ASSETS - Provided is a system and method for safeguarding digital objects consisting of digital assets. The system includes a unique identifier and an impairer in each digital asset, the impairer distinct from the unique identifier. A database is provided with a record of each unique identifier. A client is in communication with the database. The client is adapted to receive a subset of the digital assets and analyze each digital asset to determine the unique identifier embedded therein. The client is further adapted to query the database with the determined unique identifier to validate each received digital asset. In response to proper validation, the impairer is removed from the received digital asset. An associated method is also provided. | 05-31-2012 |
20120143836 | VALIDATION OF ACCESS TO A SHARED DATA RECORD SUBJECT TO READ AND WRITE ACCESS BY MULTIPLE REQUESTERS - According to a method of access to a shared data record subject to contemporaneous read and write access by multiple requesters, a requester reads a shared data record including a payload and a first checksum. The requester calculates a second checksum of the payload of the data record. If the first and second checksums are not equal, the requester again reads the shared data record, including a third checksum, and calculates a fourth checksum of the payload of the shared data record. If the third and fourth checksums are equal, the requester processes the shared data record as valid, and if the second and fourth checksums are equal, the requester handles the shared data record as corrupt. | 06-07-2012 |
20120209821 | VALIDATION OF ACCESS TO A SHARED DATA RECORD SUBJECT TO READ AND WRITE ACCESS BY MULTIPLE REQUESTERS - According to a method of access to a shared data record subject to contemporaneous read and write access by multiple requesters, a requester reads a shared data record including a payload and a first checksum. The requester calculates a second checksum of the payload of the data record. If the first and second checksums are not equal, the requester again reads the shared data record, including a third checksum, and calculates a fourth checksum of the payload of the shared data record. If the third and fourth checksums are equal, the requester processes the shared data record as valid, and if the second and fourth checksums are equal, the requester handles the shared data record as corrupt. | 08-16-2012 |
20120330912 | VERIFYING AN ATTRIBUTE IN RECORDS FOR PROCUREMENT APPLICATION - A method for verifying a target attribute of a company profile record for a procurement application. It is ascertained that a database stores the company profile record including the target attribute and a validity attribute associated with the target attribute. The validity attribute has a VALID or INVALID value respectively indicating that the target attribute in the company profile record has a valid or invalid value within the database. It is insured that the database stores a first and second user profile record, that a first user of a requisition transaction corresponds to the first user profile record, that the first user profile record includes the target attribute having a value identical to a value of the target attribute of a first company profile record associated with a first company represented by the first user, and that the validity attribute of the first company profile record has the VALID value. | 12-27-2012 |
20130054549 | CLOUD DATA STORAGE USING REDUNDANT ENCODING - Cloud data storage systems, methods, and techniques partition system data symbols into predefined-sized groups and then encode each group to form corresponding parity symbols, encode all data symbols into global redundant symbols, and store each symbol (data, parity, and redundant) in different failure domains in a manner that ensures independence of failures. In several implementations, the resultant cloud-encoded data features both data locality and ability to recover up to a predefined threshold tolerance of simultaneous erasures (unavailable data symbols) without any information loss. In addition, certain implementations also feature the placement of cloud-encoded data in domains (nodes or node groups) to provide similar locality and redundancy features simultaneous with the recovery of an entire domain of data that is unavailable due to software or hardware upgrades or failures. | 02-28-2013 |
20130117246 | METHODS OF PROCESSING TEXT DATA - Examples of the present invention provide methods relating to identification of a portion of text data common with reference text data, the method including obtaining the text data and the reference text data, the text data and the reference text data comprising a number of lines of text, identifying one or more lines of text of the text data that are common to the lines of text of the reference text data, and for one or more further lines of text of the text data that are not common to the lines of text of the reference text data, comparing the line of text of the text data with a corresponding line of text of the reference data to identify one or more common characters of the line of text. | 05-09-2013 |
20130204854 | EFFICIENT METADATA INVALIDATION FOR TARGET CKD VOLUMES - A method for invalidating metadata associated with a target count-key-data (CKD) volume is disclosed. The method initially receives a command for a target CKD volume. The command is either an “establish” command for establishing a point-in-time copy relationship, or a “withdraw” command for withdrawing a point-in-time copy relationship. The method determines a track range, spanning a number of data tracks in the CKD volume, associated with the command. Each data track in the track range is associated with a metadata track. For each metadata track whose associated data tracks are fully contained in the track range, the method performs a first procedure. For each metadata track whose associated data tracks are not fully contained in the track range, the method performs a second procedure different from the first procedure. A corresponding apparatus and computer program product are also disclosed. | 08-08-2013 |
20130218854 | FILE IDENTIFICATION VIA UNIVERSAL FILE CODE - A unique, universal file code created for a file being created or saved for the first time has core elements that include an original device identifier; an original product identifier unique to a software product used to create or save the file; an original operating system identifier unique to an operating system used to create or save the file; an original user identifier unique to a user creating or saving the file; a checksum computed from a totality of a data content of the file; and a name of a checksum algorithm used to compute the checksum. The universal file code is added to file metadata or attributes for the new file and saved with the new file. Embodiments determine whether files are identical, related or not identical or related by comparing elements of their universal file codes. | 08-22-2013 |
20130218855 | METHOD AND SYSTEM FOR MANAGING DATA AND A CORRESPONDING COMPUTER PROGRAM AND A CORRESPONDING COMPUTER-READABLE STORAGE MEDIUM - The invention relates to a method and a system for managing data and a corresponding computer program and a corresponding computer-readable storage medium, which can be used, in particular, to simplify the data management on a remote storage system when accessing the storage system from a terminal. For this purpose, a method for managing data is proposed, wherein the data on a remote storage device are managed from a terminal, and wherein by an application installed on the terminal, when the data stored at a storage location on the remote storage device are accessed by the terminal, at least an identifier of the data and information about the storage location of the data are stored by the application and made available to a user when storing the optionally modified data, particularly when writing back the optionally modified data on the remote storage. | 08-22-2013 |
20130226887 | METHOD OF, AND APPARATUS FOR, IMPROVED DATA INTEGRITY IN A NETWORKED STORAGE SYSTEM - A method of writing data to a distributed file system including a file system client, a server and a storage resource target, includes generating, on the client, a write request including a byte stream to be written to the storage resource target; formatting, on the client, the byte stream into sectors in accordance with the T10 protocol, the sectors including a data field and a protection information field, the protection information field including a guard field, an application field and a reference field; computing, on the client, checksum data for the guard field; sending, across a network, the data and the protection information to the server; verifying, in T10-capable hardware on the server, the checksum data for the guard field; verifying, on the storage resource target, the checksum data for the guard field; and storing the data on the storage resource target. | 08-29-2013 |
20130246377 | CONFIGURATION MANAGEMENT FOR A CAPTURE/REGISTRATION SYSTEM - A method, apparatus, and system is described for distributing a rule to a distributed capture system and storing the rule in a global configuration database, wherein the rule defines an action for the distributed capture system to perform regarding packets intercepted by the distributed capture system. | 09-19-2013 |
20130290284 | Verifying and Balancing Server Resources via Stored Usage Data - Systems and methods of the present invention provide for a user uploading a file and a customized metadata about the file to a file storage system. This information may be forwarded to an application, possibly an API, which may divide the file into a plurality of file chunks if the file is greater than a predetermined file size. One or more tracker servers may check a database to locate optimal file locations for the file or file chunks to be stored within the file storage system. These optimal locations may be returned from the tracker servers to the application/API which may perform an HTTP request to write the file to the file storage system. The file write may be validated and finalized, and the successful write may be displayed to the user on a user interface on a client. | 10-31-2013 |
20130318056 | Lightweight Integrity Protection for Web Storage-Driven Content Caching - Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage API is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item. | 11-28-2013 |
20140052705 | GRANULAR SELF-HEALING OF A FILE IN A DISTRIBUTED FILE SYSTEM - A server processing device acquires a lock on a region of a file which has stale data. The server processing device self-heals the stale data in the locked region using current data and receives a write request to modify another region of the file during the self-healing of the locked region of the file. The server processing device provides write access to the requested region during the self-healing of the locked region of the file. | 02-20-2014 |
20140081935 | DETECTION AND CORRECTION OF CORRUPTED OR DANGLING DATA OBJECT HANDLES - Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification. | 03-20-2014 |
20140095457 | REGULATING DATA STORAGE BASED ON POPULARITY - Technology is disclosed for regulating data storage based on a popularity of data files (“the technology”). Various embodiments of the technology includes maintaining a fixed durability level of data files stored in a storage system by regulating a number of copies of the data files stored in the storage system. One embodiment includes regulating the number of copies of a particular data file based on popularity of the particular data file among various users using the storage system. The number of copies stored in the storage system is increased or decreased, including from/to zero, based on the popularity of the particular data file. The popularity is determined based on at least one of: a number of computing devices of various users having the particular data file, a latency, network bandwidth and/or availability with the computing devices for reading the particular data file, or access pattern of the particular data file. | 04-03-2014 |
20140181056 | SYSTEM AND METHOD OF QUALITY ASSESSMENT OF A SEARCH INDEX - Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index. | 06-26-2014 |
20140188827 | DETECTION AND CORRECTION OF CORRUPTED OR DANGLING DATA OBJECT HANDLES - Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification. | 07-03-2014 |