摘要:
Example embodiments provide various techniques for modeling a storage environment at various times. A computer model can be composed to simulate a storage environment at various time periods. In an example, the computer model may simulate the storage environment in the past. As the storage environment is running, it continuously stores its existing state. This existing state can be accessed and a simulated workload may be applied to this previous state to identify an impact of the simulated workload on the existing state. A computer model may also simulate the storage environment in the future. Here, the future state of the storage environment may be projected from the existing state. Various extrapolation techniques may be used to project the future state of the storage environment.
摘要:
Example embodiments provide various techniques for modeling network storage environments. To model a particular storage environment, component models that are associated with the components of the storage environment are loaded. Each component model is programmed to mathematically simulate one or more components of the storage environment. A system model is then composed from the component models and this system model is configured to simulate the storage environment.
摘要:
Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster.
摘要:
Exemplary embodiments provide various techniques for managing groups of authenticated entities. In one exemplary computer-implemented method, an entity accesses a group roster that includes a first group identifier identifying a first group, a first group digital certificate associated with the first group, and a first entity identifier identifying the entity being a member of the first group. The entity also receives a request to update the group roster. Here, the request includes a second group identifier identifying a second group and a second group digital certificate associated with the second group. In response to the request, the entity replaces the first group identifier in the group roster with the second group identifier. Additionally, in response to the request, the entity replaces the first group digital certificate with the second group digital certificate. The replacements change a membership of the entity from the first group to the second group.
摘要:
An apparatus, graphical user interface, system, and method are provided for presenting a mapping between a namespace and a set of computing resources. The apparatus includes an input module, a format module, and an output module. The input module obtains a mapping between namespace identifiers and a set of computing resources. The format module associates a namespace identifier and a computing resource according to the mapping. The output module provides the namespace identifiers and the associated computing resource corresponding to each namespace identifier. A graphical user interface includes a window with a file system pane and a fileset pane. The file system pane includes a first tree control that displays the components of the file system. The fileset pane includes a second tree control that displays the filesets. The tree controls are updated in response to user input in either the file system pane or the fileset pane.
摘要:
Example embodiments provide various techniques for modeling network storage environments. To model a particular storage environment, component models that are associated with the components of the storage environment are loaded. Each component model is programmed to mathematically simulate one or more components of the storage environment. A system model is then composed from the component models and this system model is configured to simulate the storage environment.
摘要:
Exemplary embodiments provide various techniques for managing groups of authenticated entities. In one exemplary computer-implemented method, an entity accesses a group roster that includes a first group identifier identifying a first group, a first group digital certificate associated with the first group, and a first entity identifier identifying the entity being a member of the first group. The entity also receives a request to update the group roster. Here, the request includes a second group identifier identifying a second group and a second group digital certificate associated with the second group. In response to the request, the entity replaces the first group identifier in the group roster with the second group identifier. Additionally, in response to the request, the entity replaces the first group digital certificate with the second group digital certificate. The replacements change a membership of the entity from the first group to the second group.
摘要:
A client is redirected to use a surrogate payload server to access a substantially identical copy of an object that is located on a primary payload server. A proxy location server intercepts object location queries from clients and replies with the location of the surrogate payload server as the preferred source for the object rather than the location of the primary payload server.
摘要:
Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster.
摘要:
Example embodiments provide various techniques for modeling a storage environment at various times. A computer model can be composed to simulate a storage environment at various time periods. In an example, the computer model may simulate the storage environment in the past. As the storage environment is running, it continuously stores its existing state. This existing state can be accessed and a simulated workload may be applied to this previous state to identify an impact of the simulated workload on the existing state. A computer model may also simulate the storage environment in the future. Here, the future state of the storage environment may be projected from the existing state. Various extrapolation techniques may be used to project the future state of the storage environment.