Patent application number | Description | Published |
20090216796 | RELATIONAL OBJECTS FOR THE OPTIMIZED MANAGEMENT OF FIXED-CONTENT STORAGE SYSTEMS - A system and method is described for managing data objects in a fixed-content storage system. Metadata is provided for each variable size packet and may include offset information, packet size data, reference content blocks, and the like. Using this information, intelligently decomposed objects, consolidated objects, differenced objects, and composite objects may be stored in the storage system. The data structure provided by these objects allows for the reduction of necessary storage resources and the total number of stored objects. | 08-27-2009 |
20100185963 | MODIFYING INFORMATION LIFECYCLE MANAGEMENT RULES IN A DISTRIBUTED SYSTEM - A system and method for specifying the placement of and managing the placement of objects on a distributed networked grid. Some embodiments of the invention comprise a user interface for specifying rules for the placement of objects on the grid and an execution module that places objects on the grid based on the rules specified. Rules may comprise a matching criteria specification, which determines whether a rule applies to a particular object, and a placement specification, which directs the locations at which an object will be placed under the rule. | 07-22-2010 |
20110125814 | RELATIONAL OBJECTS FOR THE OPTIMIZED MANAGEMENT OF FIXED-CONTENT STORAGE SYSTEMS - A system and method is described for managing data objects in a fixed-content storage system. Metadata is provided for each variable size packet and may include offset information, packet size data, reference content blocks, and the like. Using this information, intelligently decomposed objects, consolidated objects, differenced objects, and composite objects may be stored in the storage system. The data structure provided by these objects allows for the reduction of necessary storage resources and the total number of stored objects. | 05-26-2011 |
20120173596 | RELATIONAL OBJECTS FOR THE OPTIMIZED MANAGEMENT OF FIXED-CONTENT STORAGE SYSTEMS - A system and method is described for managing data objects in a fixed-content storage system. In one embodiment, differenced objects are created when an object stored in a fixed-content storage system is edited. The edits to the original object may represent a small change in the original object, but because the stored original object is immutable it is not possible to simply overwrite the small portion that is edited. In order to store the edited data without requiring duplication of existing data, a new object is created that references both the original object and the edited data. The metadata of the new object includes information relating to the offset and the size of the edited data so that the edited data is accessed instead of the corresponding portion of the original object. | 07-05-2012 |
20120330894 | SYSTEM AND METHOD FOR PROVIDING A UNIFIED STORAGE SYSTEM THAT SUPPORTS FILE/OBJECT DUALITY - Methods and systems that permit file protocols and object protocols to co-exist using a file namespace and an object namespace in a unified storage system are disclosed. Data stored in the unified storage system are file-objects that preserve the behaviors expected by both file clients and object clients. | 12-27-2012 |
20130290470 | VIRTUAL STORAGE APPLIANCE GATEWAY - Methods and apparatuses for operating a storage system are provided. In one example, a storage system includes a storage server and a virtual storage appliance (VSA) implemented in a virtual machine. The storage server provides access to a first shared namespace of data. The VSA is operatively connected to the storage server system over a network connection and provides access to a second shared namespace of data over the network connection. The second shared namespace is defined by a policy and includes a subset of the first shared namespace. The VSA also replicates data of a third shared namespace of data at the VSA making the third shared namespace available at the VSA when the network connection is unavailable. The third namespace is defined by the policy and includes a subset of the second shared namespace. | 10-31-2013 |
20140082353 | SCALABLE GROUPS OF AUTHENTICATED ENTITIES - Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster. | 03-20-2014 |
20140122431 | SYSTEM AND METHOD FOR PROVIDING A UNIFIED STORAGE SYSTEM THAT SUPPORTS FILE/OBJECT DUALITY - Methods and systems that permit file protocols and object protocols to co-exist using a file namespace and an object namespace in a unified storage system are disclosed. Data stored in the unified storage system are file-objects that preserve the behaviors expected by both file clients and object clients. | 05-01-2014 |
20140156817 | MODULAR SERVICE LEVEL OBJECTIVE (SLO) SUBSYSTEM FOR A NETWORK STORAGE SYSTEM - A service level objective (SLO) subsystem that includes an SLO engine in a network storage system that allows new degrees of freedom to be added to the SLO subsystem, without requiring any modification of an associated SLO engine or the system's existing SLOs, and without requiring the SLO engine to have any a priori knowledge of the new degrees of freedom. In certain embodiments, the system has a modular design which includes the SLO engine and one or more SLO modules that interface with the SLO engine. Each SLO module corresponds to a different degree of freedom. Each SLO module evaluates SLO compliance and determines what specific action(s) within its corresponding degree of freedom should be taken to comply with an SLO. | 06-05-2014 |
20140365767 | SCALABLE GROUPS OF AUTHENTICATED ENTITIES - Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster. | 12-11-2014 |
20150234815 | SYSTEM AND METHOD FOR PROVIDING A UNIFIED STORAGE SYSTEM THAT SUPPORTS FILE/OBJECT DUALITY - Methods and systems that permit file protocols and object protocols to co-exist using a file namespace and an object namespace in a unified storage system are disclosed. Data stored in the unified storage system are file-objects that preserve the behaviors expected by both file clients and object clients. | 08-20-2015 |
20150331465 | CASCADING STARTUP POWER DRAWS OF ENCLOSURES ACROSS A NETWORK - Some embodiments involve a method of managing power for a first multiple-data-storage-devices enclosure. The method can include: checking out a first token over a network connection from a token pool shared by multiple-data-storage-devices enclosures including the first enclosure, wherein each token of the token pool is available to be checked out by a single device and wherein the enclosures share power drawn from a power supply; after checking out the first token, initiating activation of a data storage device within the first enclosure; monitoring power consumption within the first enclosure; and releasing the first token back to the token pool when the power consumption in the first enclosure substantially reaches a steady-state after the activation of the data storage device is initiated. | 11-19-2015 |
20150331476 | POWER SWITCHING TECHNIQUE FOR ARCHIVAL DATA STORAGE ENCLOSURE - A method of power management of a multiple-data-storage-devices enclosure is disclosed. In some embodiments, the method includes: receiving a network connection and power from a data connection port detachably coupled to a network cable; identifying a subset of data storage devices within the enclosure to activate; powering off components within the enclosure other than the subset of the data storage devices; for each data storage device in the subset that is not yet powered, activating the data storage device by: monitoring power consumption drawn from the data connection port; identifying a sequence of components associated with the data storage device, wherein the components within the sequence, when powered, together provide access to the data storage device; and powering on each component in the sequence when a previous component in the sequence has reached a steady state power consumption level, wherein when activating the data storage device, power supplied to power on the sequence of the components does not exceed a total power available from the data connection port. | 11-19-2015 |
20150331477 | LOW POWER ARCHIVAL DATA STORAGE ENCLOSURE - A method of controlling power within a multiple-data-storage-devices enclosure is disclosed. In at least one embodiment, the method comprises receiving a network connection and power from a data connection port to which a network cable is removably coupled; identifying one or more target data storage devices within the multiple-data-storage-devices enclosure to activate, wherein the one or more target data storage devices are a subset of all data storage devices within the multiple-data-storage-devices enclosure; powering off at least one of the data storage devices that draws power from the data connection port to make available additional power to supply from the data connection port; and powering the target data storage devices with the power received through the data connection port to activate the target data storage devices after all other data storage devices are powered off. | 11-19-2015 |
20150331617 | PIPELINE PLANNING FOR LOW LATENCY STORAGE SYSTEM - At least one embodiment involves a method of operating a storage front-end manager system to perform pipeline planning for a low latency storage system. The method can include: receiving a write request including payload data; storing the payload data of the write request in a staging area of the storage front-end manager system; determining a transformation pipeline based at least partly on an attribute of the write request; queuing the transformation pipeline for execution on the payload data to generate data fragments for storage; and transmitting the data fragments to a plurality of multiple-data-storage-devices enclosures after the transformation pipeline is executed. | 11-19-2015 |
20150331621 | UNCOORDINATED DATA RETRIEVAL ACROSS MULTIPLE-DATA-STORAGE-DEVICES ENCLOSURES - In at least one embodiment, a method of operating a multiple-data-storage-devices enclosure is disclosed. The method includes: receiving a first read request from a first requester device for a first requested data fragment; identifying a first target data storage device storing the first requested data fragment based at least partly on the first read request; activating, independently of receiving the first read request, only a subset of data storage devices in the enclosure, wherein the subset includes the first target data storage device; retrieving, based at least partly on the first read request and in response to activating the subset, the first requested data fragment from the first target data storage device; and transmitting the first requested data fragment to the first requester device. | 11-19-2015 |
20150331632 | MANAGING ARCHIVAL STORAGE - In some embodiments, a multiple-data-storage-devices cartridge can implement a method of writing data via a data range application programming interface (“API”). The method can include: receiving a write request from a requester device, wherein the write request is a direct, broadcast or multicast, or fanout message and includes a size indication for a contiguous range of data; responsive to receiving the write request, sending a response message to the requester device indicating an intent to store the contiguous range of data; receiving the contiguous range of data from the requester device; powering on a target data storage device from amongst data storage devices within the cartridge while keeping at least another data storage device in the cartridge powered off; and writing the contiguous range of data to the target data storage device. | 11-19-2015 |
20150331744 | DATA DEVICE GROUPING ACROSS MULTIPLE-DATA-STORAGE-DEVICES ENCLOSURES FOR DATA RECONSTRUCTION - In at least one embodiment, a method of operating a storage front-end system is disclosed. The method includes: receiving a read request with an object identifier for a data object; identifying a synchronous group of data storage devices across two or more multiple-data-storage-devices enclosures, wherein the synchronous group is associated with the object identifier; sending a request to the two or more multiple-data-storage-devices enclosures to immediately activate the data storage devices in the synchronous group; retrieving at least a subset of data fragments associated with the object identifier from at least one of the data storage devices; and erasure decoding at least the subset of the data fragments into a contiguous data range to reconstruct the data object | 11-19-2015 |
20150331775 | ESTIMATING DATA STORAGE DEVICE LIFESPAN - In at least one embodiment, a method of metering lifespan consumption of data storage devices in a multiple-data-storage-devices enclosure is disclosed. The method includes: receiving a storage access request; identifying a first data storage device within the enclosure as being targeted by the storage access request, wherein the enclosure includes two or more data storage devices; accessing the first data storage device in response to the storage access request; and in response to the identifying or the accessing, updating a record of a lifespan consumption meter assigned to the first data storage device. | 11-19-2015 |
20160112408 | SCALABLE GROUPS OF AUTHENTICATED ENTITIES - Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster. | 04-21-2016 |
Patent application number | Description | Published |
20150032683 | SYSTEMS AND METHODS FOR HANDLING OF MODELING ERRORS DURING PLANNING - In the area of storage management, service automation can be realized through the use of “MAPE” loop(s). A Planner (P) interacts with the Monitoring (M), Analysis (A) and Execution (E) components in a closed loop. For each new option or potential planning action the Planner (P) invokes the Analysis (A) component. The correctness, as well as effectiveness, of the planning decision is dependent on the Analysis (A) component. Embodiments can utilize an adaptive Analysis (A) component (i.e., an analysis component that can be retrained) that also associates a value of confidence and a corresponding error in the evaluation along with a predicted impact. The Planner (P) component uses this additional information for quoting the final impact of a particular planning action as part of an adaptive MAPE loop to provide improved resource utilization and resource management. | 01-29-2015 |
20160062674 | DATA STORAGE ARCHITECTURE FOR STORING METADATA WITH DATA - Technology is disclosed for a data storage architecture for providing enhanced storage resiliency for a data object. The data storage architecture can be implemented in a single-tier configuration and/or a multi-tier configuration. In the single-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data fragments, which are stored across many storage devices. In the multi-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data segments, which are sent to one or more tiers of storage nodes. Each of the storage nodes further encodes the data segment to generate many data fragments representing the data segment, which are stored across many storage devices associated with the storage node. The I/O operations for rebuilding the data in case of device failures is spread across many storage devices, which minimizes the wear of a given storage device. | 03-03-2016 |
20160062832 | WIDE SPREADING DATA STORAGE ARCHITECTURE - Technology is disclosed for a data storage architecture for providing enhanced storage resiliency for a data object. The data storage architecture can be implemented in a single-tier configuration and/or a multi-tier configuration. In the single-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data fragments, which are stored across many storage devices. In the multi-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data segments, which are sent to one or more tiers of storage nodes. Each of the storage nodes further encodes the data segment to generate many data fragments representing the data segment, which are stored across many storage devices associated with the storage node. The I/O operations for rebuilding the data in case of device failures is spread across many storage devices, which minimizes the wear of a given storage device. | 03-03-2016 |
20160062833 | REBUILDING A DATA OBJECT USING PORTIONS OF THE DATA OBJECT - Technology is disclosed for a data storage architecture for providing enhanced storage resiliency for a data object. The data storage architecture can be implemented in a single-tier configuration and/or a multi-tier configuration. In the single-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data fragments, which are stored across many storage devices. In the multi-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data segments, which are sent to one or more tiers of storage nodes. Each of the storage nodes further encodes the data segment to generate many data fragments representing the data segment, which are stored across many storage devices associated with the storage node. The I/O operations for rebuilding the data in case of device failures is spread across many storage devices, which minimizes the wear of a given storage device. | 03-03-2016 |
20160062834 | HIERARCHICAL DATA STORAGE ARCHITECTURE - Technology is disclosed for a data storage architecture for providing enhanced storage resiliency for a data object. The data storage architecture can be implemented in a single-tier configuration and/or a multi-tier configuration. In the single-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data fragments, which are stored across many storage devices. In the multi-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data segments, which are sent to one or more tiers of storage nodes. Each of the storage nodes further encodes the data segment to generate many data fragments representing the data segment, which are stored across many storage devices associated with the storage node. The I/O operations for rebuilding the data in case of device failures is spread across many storage devices, which minimizes the wear of a given storage device. | 03-03-2016 |
20160062837 | DEFERRED REBUILDING OF A DATA OBJECT IN A MULTI-STORAGE DEVICE STORAGE ARCHITECTURE - Technology is disclosed for a data storage architecture for providing enhanced storage resiliency for a data object. The data storage architecture can be implemented in a single-tier configuration and/or a multi-tier configuration. In the single-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data fragments, which are stored across many storage devices. In the multi-tier configuration, a data object is encoded, e.g., based on an erasure coding method, to generate many data segments, which are sent to one or more tiers of storage nodes. Each of the storage nodes further encodes the data segment to generate many data fragments representing the data segment, which are stored across many storage devices associated with the storage node. The I/O operations for rebuilding the data in case of device failures is spread across many storage devices, which minimizes the wear of a given storage device. | 03-03-2016 |