Entries |
Document | Title | Date |
20100070545 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) ADMINISTRATOR TASK NOTIFICATION CONTROL - The illustrative embodiments provide for automatically and proactively retrieving administrative maintenance tasks or potential issues from a set of directory servers without direct intervention from an administrator. Responsive to an operation request being sent from a requesting application to the set of directory servers and an administrative maintenance control mechanism being active, an administrative maintenance control is automatically sent to the set of directory servers. Responsive to receiving the response to the administrative maintenance control, an end user application within the data processing system is notified that the at least one of the administrative maintenance tasks or the potential issues have been received. | 03-18-2010 |
20100115011 | Enumerating Metadata in File System Directories - One embodiment is a method that stores metadata about files separately from directories for the files in storage devices and represents the directories as a tree structure in which entries refer to separate storage blocks that include the metadata with each of the separate storage blocks storing metadata for only a single file. | 05-06-2010 |
20100125619 | DETERMINISTIC SELECTION OF DOMAIN CONTROLLERS IN A MULTI-MASTER DATABASE DISTRIBUTED DIRECTORY SERVICE - Data is maintained that identifies the available domain controllers for performing management actions with respect to a distributed directory service database. When a request is received to perform a management action on a directory service database object, the particular domain controller that is to perform the management action, called the master domain controller, is selected deterministically. Once the master domain controller has been identified, a request to perform the management action is transmitted to the master domain controller. The failure of a master domain controller will cause the identification of that domain controller to be removed from the data that identifies the available domain controllers and a deterministic failover to be performed to another master domain controller. | 05-20-2010 |
20100138461 | APPARATUS FOR MANAGING NEW DEVICE COMPONENT OF MOBILE TERMINAL AND METHOD OF THE SAME - Provided is an apparatus for managing new device components of a mobile terminal which arranges and manages a component related file defined in a domain profile in a file directory structure and additionally arranges the corresponding device component related file corresponding to a new device when changing a mode to the new device during the operation of the corresponding domain system in the file directory, thereby reconfiguring the components within the domain system in the file directory. | 06-03-2010 |
20100161694 | TECHNIQUE TO CLASSIFY DATA DISPLAYED IN A USER INTERFACE BASED ON A USER DEFINED CLASSIFICATION - Disclosed are methods and systems for classifying data displayed in a user interface based on a user defined classification and generating the user interface to display the data based on the user defined classification. The method includes importing a folder structure from a folder structure container wherein the folder structure depicts a user defined classification of the data. The data displayed in the user interface is mapped to a folder in the folder structure and a user interface object in the user interface is created for the folder. Furthermore, the mapped data is presented in the user interface object. | 06-24-2010 |
20100169393 | STORAGE DEVICE PRESENTING TO HOSTS ONLY FILES COMPATIBLE WITH A DEFINED HOST CAPABILITY - A method includes defining a host capability; creating for a storage device a second directory tree from a first directory tree of the storage device that is included in a file system within the storage device; and, for a data file that is stored in the storage device and is selectable for consumption by a host through the first directory tree that is included in the storage device's file system, determining whether the data file requires for consumption a host having the defined host capability. If the data file requires a host having the defined host capability, an entry is created in the second directory tree in which the data file is not selectable for consumption by the host. Otherwise, an entry is created in the second directory tree in which the data file is selectable for consumption by the host. Subsequent to connecting the storage device to a host if the host has the defined capability the first directory tree of the storage device is used to present a view of the file system of the storage device to the host, and if the host does not have the defined capability the second directory tree is used to present a modified view of the file system to the host in which a data file not requiring the defined capability would be selectable for consumption by the host and in which a data file requiring the defined capability would not be selectable for consumption by the host. | 07-01-2010 |
20100169394 | METHOD AND APPARATUS FOR PROVIDING ACCESS TO FILES BASED ON USER IDENTITY - A storage device provides a file system to a host based on the access rights of a user determined during authentication. If the authentication does not succeed, the storage device provides to the user a file system restricted to files authorized by public access rights. If the authentication does succeed, and the user is a device owner, the storage device provides to the user the native file system. If the authentication succeeds, and the user is not a device owner, the storage device provides a file system that is restricted to files that the given user is authorized to access. Due to the internal nature of the mechanism for safeguarding files, this security measure cannot be circumvented by simply connecting the storage device to another host that does not respect the permission rules of the file system. | 07-01-2010 |
20100223307 | Memory Device and Method for Content Virtualization - A memory device and method for content virtualization are disclosed. In one embodiment, a plurality of directories are created in the memory of the memory device, wherein each of the plurality of directories points to a same storage location of the digital content. In another embodiment, a first header for the digital content is stored in each of the different directories, wherein the first header comprises information about where to find the digital content in the memory. In yet another embodiment, the memory device comprises circuitry that receives an identification of a host device in communication with the memory device and reorganizes a directory structure of the memory in accordance with the identification of the host device, wherein the reorganization results in the digital content appearing to be located in a directory expected by the host device. | 09-02-2010 |
20100228802 | SYSTEM AND METHOD TO RESPOND TO A DATA FILE DELETION INSTRUCTION - Systems and methods responsive to a data file deletion instruction are disclosed. A method includes receiving an instruction to delete a data file. The data file is stored at a plurality of persistent memory cells of a memory. The memory also stores a directory that includes a first entry corresponding to the data file. In response to receiving the instruction to delete the data file, multiple attribute bits of the first entry are programmed and also a first bit of the first entry is programmed. The first bit of the first entry is distinct from the multiple attribute bits. Programming the multiple attribute bits converts the first entry from a first entry type to a second entry type. Programming the first bit of the first entry indicates that the first entry has an unused status. | 09-09-2010 |
20100332564 | Efficient Method for Clustering Nodes - Methods and computer storage media for clustering nodes are provided. An input file is received that is comprised of primary nodes, secondary nodes and metrics that relate to the association between the primary nodes and the secondary nodes. Upon receiving the input file, the input file may be abridged to reduce the number of nodes contained in the input file. The unique initial primary nodes may then be clustered with their associated secondary node. The clusters containing the unique initial primary nodes may then be replaced if a subsequent related cluster satisfies a pre-defined condition. In some embodiments, multiple clusters may then be merged until the cluster size reaches a pre-defined size. In some embodiments, the input file is may be cleaned and sorted prior to being abridged. | 12-30-2010 |
20110125816 | METHOD AND APPARATUS FOR SELECTIVE FILE ERASURE USING METADATA MODIFICATIONS - A process that ensures the virtual destruction of data files a user wishes to erase from a storage medium, such as a hard drive, flash drive, or removable disk. This approach is appropriate for managing custom distributions from a large file sets as it is roughly linear in compute complexity to the number of files erased but is capped when many files are batch erased. | 05-26-2011 |
20110125817 | SEQUENTIALLY OPENING FILES FROM A DIRECTORY IN NATIVE APPLICATIONS - A system for sequentially opening and displaying files in a directory, including a processor, at least one directory including a plurality of electronic files, software executing on the processor for receiving a request to open and display a first one of the plurality of electronic files, software executing on the processor for receiving a next file request, and software executing on the processor for opening a next file in the at least one directory upon receiving the next file request. | 05-26-2011 |
20110137966 | METHODS AND SYSTEMS FOR PROVIDING A UNIFIED NAMESPACE FOR MULTIPLE NETWORK PROTOCOLS - A network storage server system includes a presentation layer that presents multiple namespaces over the same data stored in an object store, allowing users to simultaneously access data over multiple protocols. The system supports object location independence of the stored data objects by introducing a layer of indirection between directory entries and storage locations of stored data objects. In one embodiment, the directory entry of a data object points to a redirector file that includes an object locator (e.g., an object handle or a global object ID) of the data object. The directory entries of data objects are stored in a directory namespace (e.g., NAS path namespace). In another embodiment, a global object ID of the data object is directly encoded within the directory entry of the data object. | 06-09-2011 |
20110196904 | INFORMATION RECORDING APPARATUS, IMAGING APPARATUS, INFORMATION UPDATING METHOD, AND PROGRAM - Disclosed herein is an information recording apparatus including: a loading section configured to be loaded with a recording medium for managing a file on the basis of at least one of an FAT file system and a file system similar thereto; and a control section configured, in updating at least one directory entry recorded to an area in a second and subsequent clusters in a recording area of directory entries in a predetermined directory in the recording medium, to read data, update at least the one directory entry, record the updated data, and update the FAT of the recording medium and management information similar to the FAT such that the area in which the updated data of the area in the second and subsequent clusters is recorded is linked to the area in a first cluster of the recording area in the predetermined directory. | 08-11-2011 |
20110196905 | STORING DATA TO MULTI-CHIP LOW-LATENCY RANDOM READ MEMORY DEVICE USING NON-ALIGNED STRIPING - Described herein are method and apparatus for storing data to a low-latency random read memory (LLRRM) device using non-aligned data striping, the LLRRM device being implemented on a storage system. The LLRRM device may comprise a bank comprising a plurality of memory chips, each chip being simultaneously accessible for storing data on a plurality of erase-units (EUs). A storage operating system may maintain, for each chip, a reserve data structure listing reserve EUs and a remapping data structure for tracking remappings between defective EUs to reserve EUs in the chip. A defective EU in a chip may be mapped to a reserve EU from the reserve data structure. Upon receiving a data block to be stored to the LLRRM device at the defective EU, the storage operating system may stripe the received data block across a plurality of chips in a non-aligned manner using the remapped reserve EU. | 08-11-2011 |
20110231459 | DATA MANAGEMENT METHOD - A data storage or management method is provided which allows both a content object-based access and a file-based access. A first request for storing a content object in accordance with the processing of an application program executed in a host is sent to an object archive control functionality executed in the host, an intermediate server, or a storage apparatus. The object archive control functionality generates an object identifier corresponding to the content object received in response to the first request, a directory name corresponding to the object identifier, and a plurality of file names corresponding to a plurality of fields contained in the content object. The storage apparatus stores a directory having the directory name and the plurality of files having the plurality of file names in accordance with the second request. | 09-22-2011 |
20110246547 | Methods and Apparatus For Device Applet Management on Smart Cards - Methods and apparatus for device applet management on smart cards. A method includes obtaining device applets at a first device, generating a directory structure that identifies platform types and corresponding device applets, and storing the device applets in the directory structure on a smart card so that when the smart card is in communication with a second device supporting a selected platform, device applets associated with the selected platform are accessible to the second device. An apparatus includes a transceiver to obtain device applets at a first device, and a processor generate a directory structure that identifies platform types and corresponding device applets, and stores the device applets in the directory structure on a smart card so that when the smart card is in communication with a second device supporting a selected platform, device applets associated with the selected platform are accessible to the second device. | 10-06-2011 |
20110289127 | FILE-NAME EXTENSION CHARACTERS FOR FILE DISTRIBUTION - A file is written or not written to a first storage medium (as opposed to a second storage medium) as a function of its distribution-priority file-name extension character or characters and an available capacity of the first storage medium. | 11-24-2011 |
20120078984 | METHOD TO PROCESS ANALYTICAL DATA, SYSTEM FOR PERFORMING THE METHOD AND COMPUTER PROGRAM TO PROGRAM A COMPUTER TO PERFORM THE METHOD - The present invention pertains to a method enabling a user to process data generated by multiple separate devices, the data being stored as a data file in a directory corresponding to each device, the method comprising initiating processing of the data, the user selecting multiple data files from one or more directories corresponding to the one or more devices, to form a set of data files without actually loading any of the data files, providing the user with an option to preview one or more of the selected data files of the set on a display, and after the user has confirmed the selection of data files forming the said set, automatically loading the selected data files from the said one or more directories, and processing the data present in the selected data files to obtain a processed result. | 03-29-2012 |
20120096059 | STORAGE APPARATUS AND FILE SYSTEM MANAGEMENT METHOD - A storage apparatus is connected via a network to a host device which requests data writing. A file system is constructed on a virtual volume accessed by the host device. An assignment unit assigns a storage area of a plurality of storage devices to a data storage area of the file system; and an area management unit which, once the storage area of the plurality of storage devices has been assigned at least once to the data storage area of the file system, manages an area of the storage area from which data has been deleted and is no longer used by the file system as an assigned unused area. The assignment unit re-assigns the assigned unused area to the data storage area of the file system if the data writing to the data storage area of the file system from the host device has taken place. | 04-19-2012 |
20120143931 | CONTEXT-AWARE FOLDERS - Embodiments disclosed herein generally relate to systems and methods for classifying, sorting, storing, managing, tagging, searching, organizing, and/or performing actions on files, folders and other electronic information using one or more data processing systems. | 06-07-2012 |
20120317157 | FILE SYSTEM LOCATION VERIFICATION USING A SENTINEL - A new file system is mounted to a mount point of an existing file system implemented in a computational system. A sentinel indicator is stored in the mount point. Prior to initiating an input/output (I/O) operation by a program, a determination is made by the program as to whether the sentinel indicator exists. In response to determining by the program that the sentinel indicator exists, the I/O operation is performed by the program. In certain alternative embodiments, in response to determining by the program that the sentinel indicator exists, the I/O operation is not performed by the program. | 12-13-2012 |
20120317158 | FILE SYSTEM LOCATION VERIFICATION USING A SENTINEL - A new file system is mounted to a mount point of an existing file system implemented in a computational system. A sentinel indicator is stored in the mount point. Prior to initiating an input/output (I/O) operation by a program, a determination is made by the program as to whether the sentinel indicator exists. In response to determining by the program that the sentinel indicator exists, the I/O operation is performed by the program. In certain alternative embodiments, in response to determining by the program that the sentinel indicator exists, the I/O operation is not performed by the program. | 12-13-2012 |
20120323980 | FILE SYSTEM LOCATION VERIFICATION USING A SENTINEL - A new file system is mounted to a mount point of an existing file system implemented in a computational system. A sentinel indicator is stored in the mount point. Prior to initiating an input/output (I/O) operation by a program, a determination is made by the program as to whether the sentinel indicator exists. In response to determining by the program that the sentinel indicator exists, the I/O operation is performed by the program. In certain alternative embodiments, in response to determining by the program that the sentinel indicator exists, the I/O operation is not performed by the program. | 12-20-2012 |
20120331022 | DESKTOP, STREAM-BASED, INFORMATION MANAGEMENT SYSTEM - A steam-based document storage and retrieval system accepts documents that are in diverse formats and come from diverse application, automatically creates document model objects describing these documents in a consistent format and associating time stamps with the documents to automatically create a main stream in chronological order. The stream, or sub-streams meeting selected search criteria, are displayed in a variety of forms, including a receding, partly overlapping stack with aids that facilitate user interaction. | 12-27-2012 |
20130073597 | FILE TRANSFER SYSTEM - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 03-21-2013 |
20130218934 | METHOD FOR DIRECTORY ENTRIES SPLIT AND MERGE IN DISTRIBUTED FILE SYSTEM - A distributed storage system has MDSs (metadata servers). Directories of file system namespace are distributed to the MDSs based on hash value of inode number of each directory. Each directory is managed by a master MDS. When a directory grows with a file creation rate greater than a preset split threshold, the master MDS constructs a consistent hashing overlay with one or more slave MDSs and splits directory entries of the directory to the consistent hashing overlay based on hash values of file names under the directory. The number of MDSs in the consistent hashing overlay is calculated based on the file creation rate. When the directory continues growing with a file creation rate that is greater than the preset split threshold, the master MDS adds a slave MDS into the consistent hashing overlay and splits directory entries to the consistent hashing overlay based on hash values of file names. | 08-22-2013 |
20130304777 | MAPPING METADATA ON IMPORT OF A MUSIC LIBRARY - A method for uploading a music library to a music provider service is provided. The method initiates with identifying a music library for uploading, the music library including at least one music file, the music file including audio data and associated metadata fields. A mapping between the metadata fields of the music file and metadata fields of a destination file corresponding to the music file is then defined. The destination file is created at the music service provider by copying the audio data to the destination file and by copying contents of the metadata fields of the music file to the metadata fields of the destination file according to the mapping. | 11-14-2013 |
20130318136 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE SYSTEM - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 11-28-2013 |
20130339408 | SELECTIVE FILE ERASURE USING METADATA MODIFICATIONS AND APPARATUS - A process that ensures the virtual destruction of data files a user wishes to erase from a storage medium, such as a hard drive, flash drive, or removable disk. This approach is appropriate for managing custom distributions from a large file sets as it is roughly linear in compute complexity to the number of files erased but is capped when many files are batch erased. | 12-19-2013 |
20140095559 | Method for Data Maintenance - A method for data storage implemented in a data storage system is disclosed. Data storage nodes may be interconnected by means of a communications network. The method may include sending a request for a first data item to a plurality of storage nodes. The first data item may include a reference to a second data item stored in the storage system. The method may include receiving the first data item from at least one storage node, and sending a request for the second data item to the plurality of storage nodes based on the reference included in the first data item. | 04-03-2014 |
20140289291 | SYSTEMS AND METHODS FOR FOLDER REDIRECTION - A method for redirecting, to a second machine, without user intervention, a request for access to a folder on a first machine, the request made by a resource executing within a remote access session on the first machine, includes receiving, by a component on a first machine, folder mapping information associated with a folder provided by a shell namespace on a second machine. The component intercepts a request by a resource executing on the first machine for access to file system data on the first machine. The component redirects the request to the second machine responsive to the received folder mapping information. | 09-25-2014 |
20140297701 | FILE LOAD BALANCING IN AN N-LEVEL DIRECTORY TREE OF A DATA STORAGE SYSTEM - Implementations of the present disclosure involve a system and/or method for storing one or more data files in an n-level directory tree of a data storage system. In general, the system and/or method computes an n-byte value from a data file name which is used to create a directory path in the data storage system, where parts of the n-byte value are used to form each directory name in the directory path. Storage and retrieval of a data file is performed by storing in or retrieving data files from the computed directory. In one embodiment, the calculated n-byte value is obtained by computing the value with a cyclic redundancy check (CRC) algorithm. Use of the CRC algorithm to compute the directory path provides a balanced set of directories and number of data files that is repeatable such that location and retrieval of the data file is accomplished without the need to search through each directory of the system. | 10-02-2014 |
20140324931 | DISPERSED STORAGE USING LOCALIZED PEER-TO-PEER CAPABLE WIRELESS DEVICES IN A PEER-TO-PEER OR FEMTO CELL SUPPORTED CARRIER SERVED FASHION - A method begins when at least a consensus threshold number of devices are active in a virtual private network (VPN) group of devices. The method continues by obtaining directory information regarding group specific data and retrieving one or more sets of encoded data slices from the at least the consensus threshold number of devices or a dispersed storage network (DSN) memory in accordance with the directory information. The method continues by decoding the one or more sets of encoded data slices based on the at least the consensus threshold number of devices and a number of devices in the VPN group of devices to produce the group specific data. When the at least a consensus threshold number of devices are not active in the VPN group of devices, preventing at least one of the obtaining directory information or the retrieving one or more sets of encoded data slices. | 10-30-2014 |
20150120794 | PERSONAL DATA MODELLER - It is becoming more and more common for users to store personal documents or indeed copies of these documents on their computer. A difficulty for a user is how to store these documents. The present application relates to file storage on a computer and in particular provides a method and system for creating a personalized directory structure for electronically storing personal information. | 04-30-2015 |
20150134711 | FILE ACCESS METHOD AND SYSTEM THEREOF - Several systems and methods for accessing files stored in a storage device are disclosed. In an embodiment, the method includes accessing a file allocation table (FAT) in a computer file system associated with the storage device. The FAT includes a plurality of cluster addresses corresponding to a plurality of clusters allocated to a file stored in the storage device. A cluster address is read to identify a location of a next cluster. One or more bits in the cluster address are read to determine a presence of a signature value indicating allocation of a set of contiguous clusters from among the plurality of clusters. A number of contiguous clusters is computed based on a pre-determined number of consecutive cluster addresses succeeding the cluster address if the signature value is present. The set of contiguous clusters are read from the storage device based on the computed number of contiguous clusters. | 05-14-2015 |
20150302021 | STORAGE SYSTEM - A storage system of the present invention includes: a storage device for storing division data configuring a file, and also storing address data referring to the division data or other address data; and a data storage controlling unit for, when the division data or the other address data to be newly stored has a same data content as data already stored in the storage device, controlling to refer to the data already stored in the storage device as the division data or the other address data to be newly stored, by using the address data. The data storage controlling unit includes an address data acquiring unit for acquiring address data of a copy target file based on file specification information, and an address data set-up unit for setting up the acquired address data in the storage device so that the copy target file is stored in a copy destination directory. | 10-22-2015 |
20160055168 | METHOD AND APPARATUS FOR SCANNING FILES - A method and apparatus for scanning files, wherein the method comprises: during the traversing of a directory, performing first processing on the traversed directory, the first processing comprising: acquiring a directory attribute of the traversed directory, and determining whether the traversed directory is a remapped directory according to the acquired directory attribute, and if so, performing no scanning processing on the traversed directory, and if not, performing scanning processing on the traversed directory, with the scanning processing comprising: scanning various files in the traversed directory to acquire a scanning result, and/or, performing second processing on various sub-directories in the traversed directory; and the second processing comprises: traversing the various sub-directories, and performing the same processing as the first processing on the traversed sub-directories. The IO overhead and CPU overhead during scanning can be effectively reduced by means of the present invention, thus improving the file scanning efficiency. | 02-25-2016 |