摘要:
A method to sequentially deduplicate data, wherein the method receives a plurality of computer files, wherein each of the plurality of computer files comprises a label comprising a file name, a file type, a version number, and file size, and stores that plurality of computer files in a deduplication queue. The method then identifies a subset of the plurality of computer files, wherein each file of the subset comprises the same file name but a different version number, and wherein the subset comprises a maximum count of version numbers, and wherein the subset comprises a portion of the plurality of computer files. The method deduplicates the subset using a hash algorithm, and removes the subset from said deduplication queue.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
A method is disclosed to store and retrieve information using holographic data storage media. The method provides original data, generates a first image of that original data, and encodes that first image in a holographic data storage medium at a first storage location. The method then generates a second image of the original data, where the second image differs from the first image, and encodes the second image in a holographic data storage medium at a second storage location, where the second storage location differs from the first storage location.
摘要:
A method for accessing data in a data storage system is presented. The method includes supplying a host computer that is in communication with the data storage system, where the data storage system includes a data storage medium and a holographic data storage medium. A first request is generated to access a directory encoded in the data storage medium and includes a first encryption key. The requested directory recites a listing of data files encoded in the holographic storage medium. If the first encryption key decrypts the directory, the directory is read and a data file encoded in the holographic data storage medium is identified. A second request is then generated to access the data file and includes a second encryption key. Finally, if the second encryption key decrypts the data file, then it is read.
摘要:
A data storage assembly is presented. The data storage assembly comprises a bi-layered antireflective coating. An inner layer of the antireflective coating comprises diamond like carbon. An outer layer is disposed over the inner layer.
摘要:
An apparatus, system, and method are disclosed for aberration compensation. In one embodiment, a first compensation lens used in conjunction with a second compensation lens to produce a conical beam used to read from, or write to, an optical medium. An Nth order compensation equation is used to optimize aberration errors associated with accessing the optical medium. The present invention may include a displaceable focus lens positioned relative to an optical medium. The focus lens may be displaced when the conical beam's focal length is adjusted. A displacement equation is presented to determine the preferred placement of the focus lens. By compensating for aberration, read/write errors may be reduced while accessing optical media thus increasing system robustness and facilitating the use of additional layers on optical media.
摘要:
A method is disclosed to determine an optimal power level to encode information holographically. The method sets (N) evaluation power levels, displays an evaluation image on a spatial light modulator. For each value of (i), the method energizes a light source using the (i)th power level, generates the (i)th reference beam, generates the (i)th carrier beam, forms the (i)th data beam comprising the evaluation image, forms the (i)th hologram using the (i)th reference beam and the (i)th data beam, and encodes the (i)th hologram in a holographic data storage medium, where (i) is greater than or equal to 1 and less than or equal to (N).
摘要:
A method to provide data storage services using one or more holographic data storage media disposed in a holographic data storage system operated by a data storage services provider, wherein the holographic data storage system comprises a light source, a spatial light modulator, and a plurality of holographic data storage media, wherein the method receives information provided by the data storage services customer, allocates a first holographic data storage medium for exclusive storage of information provided by the data storage services customer, defines an outer storage portion of the first allocated holographic data storage medium, and stores the information as one or more holograms encoded in the outer storage portion of the first holographic data storage medium.