Storage system deduplication with service level agreements

    公开(公告)号:US11531641B2

    公开(公告)日:2022-12-20

    申请号:US16189813

    申请日:2018-11-13

    摘要: Mechanisms are provided for adjusting a configuration of data stored in a storage system. According to various embodiments, a storage module may be configured to store a configuration of data. A processor may be configured to identify an estimated performance level for the storage system based on a configuration of data stored on the storage system. The processor may also be configured to transmit an instruction to adjust the configuration of data on the storage system to meet the service level objective when the estimated performance level fails to meet a service level objective for the storage system.

    Collecting and transmitting diagnostics information from problematic devices

    公开(公告)号:US10956247B2

    公开(公告)日:2021-03-23

    申请号:US15824888

    申请日:2017-11-28

    IPC分类号: G06F11/07 H04W4/80 G06F11/30

    摘要: A system, method, and computer-readable medium are disclosed for collecting and transmitting diagnostics information via a diagnostic information operation. The diagnostic information operation begins with a system periodically writing diagnostic information such as diagnostic errors and warnings to non-volatile local storage contained within the system. Upon detection of a failure, the user activates an NFC-enabled device (such as a mobile device) and positions the NFC-enabled device within NFC range of the failed system. The failed system then communicates the diagnostic information stored within the non-volatile local storage to NFC-enabled device.

    Secure shell public key audit system

    公开(公告)号:US10681026B2

    公开(公告)日:2020-06-09

    申请号:US15832563

    申请日:2017-12-05

    申请人: QUEST SOFTWARE

    IPC分类号: H04L9/32 H04L29/06

    摘要: A system for auditing authorized key files associated with secure shell (SSH) servers is disclosed. In an example, the system may include a purpose-built SSH audit server. The SSH audit server may be configured to receive an authorized key file and a list of users. The SSH audit sever may generate and provide unique registration codes for each of the users in the list. The SSH audit server may associate particular users with particular public keys as each of the users accesses the SSH audit server using a public key and inputs a registration code.

    Systems and methods for secure device management

    公开(公告)号:US10594701B1

    公开(公告)日:2020-03-17

    申请号:US16153282

    申请日:2018-10-05

    IPC分类号: G06F17/00 H04L29/06

    摘要: In one embodiment, a method is performed by a computer system. The method includes receiving base attribute values of a registrant device. The method further includes determining similarities of the base attribute values to a reference string to yield base similarity values. The method also includes registering the registrant device for policy enforcement using the base similarity values. Furthermore, the method includes, responsive to a trigger, determining target attribute values of a target device. Also, the method includes determining similarities of the target attribute values to the reference string to yield target similarity values. Moreover, the method includes, responsive to the target similarity values satisfying a similarity threshold in relation to the base similarity values, configuring policy enforcement such that the target device is treated as the registrant device.

    Sizing of one or more jobs within one or more time windows

    公开(公告)号:US10552220B2

    公开(公告)日:2020-02-04

    申请号:US14869758

    申请日:2015-09-29

    IPC分类号: G06F9/48 G06F9/50 G06F11/30

    摘要: Aspects of the present invention provide systems and methods that ascertain appropriate time windows for when a task or tasks are best suited to be performed and also for appropriately sizing the number of tasks so that they can be completed within a window or windows. In embodiments, a system for estimating a system resource comprises a component selection system configured to receive a selection of one or more components and/or one or more metrics to be monitored. In embodiments, an analyzer uses at least some of the gathered data to determine one or more resource capacity windows for performing a task or tasks and determines an appropriate job size or sizes for scheduling the tasks to be performed within the one or more resource capacity windows.

    Cloud-based device configuration management of heterogeneous devices

    公开(公告)号:US10405155B2

    公开(公告)日:2019-09-03

    申请号:US15792528

    申请日:2017-10-24

    摘要: The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems. Certain embodiments create and maintain a database of configuration and operational information that is accessible across platforms. A group device configuration may be automatically applied to all devices in the selected group via a batch command. Some embodiments allow independent heterogeneous devices that have similar functionality to have different device configuration settings.

    Governance policy framework for cloud resources

    公开(公告)号:US10389754B2

    公开(公告)日:2019-08-20

    申请号:US14845756

    申请日:2015-09-04

    发明人: David Mortman

    IPC分类号: H04L29/06 G06F21/00 H04L12/24

    摘要: A system, method, and computer-readable medium are disclosed for performing a cloud environment governance policy operation which provides a governance policy framework for use within cloud environments. In various embodiments, the cloud environment governance policy operation expands identify access management (IAM) systems to understand not only users but also resources. Additionally, in various embodiments, the cloud environment governance policy operation provides governance packs to abstract cloud resources and compliance/governance/regulatory regimes via a common open language.

    Virtualizing a secure active directory environment

    公开(公告)号:US10268550B2

    公开(公告)日:2019-04-23

    申请号:US15289769

    申请日:2016-10-10

    IPC分类号: G06F11/14 G06F9/455

    摘要: A recovery solution can employ virtualization software to create a virtualized Active Directory forest from a source Active Directory forest. A recovery agent can be installed on the domain controllers prior to creating copies of the domain controllers in the virtualized forest. Additionally, the recovery agent can be added to a list of trusted applications if the domain controller includes security software. The recovery solution can employ the virtualization software to store a command file at a known directory path. This command file can include commands that should be executed on the virtualized domain controller to configure it properly. The recovery agent can be configured to periodically scan the known directory path to determine whether a command file has been stored in the directory. If the recovery agent locates a command file, it can extract and execute any commands in the command file.

    Content-based encryption keys
    9.
    发明授权

    公开(公告)号:US10256978B2

    公开(公告)日:2019-04-09

    申请号:US15806198

    申请日:2017-11-07

    摘要: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.

    Migrate nickname cache for email systems and devices

    公开(公告)号:US10248314B2

    公开(公告)日:2019-04-02

    申请号:US14731278

    申请日:2015-06-04

    IPC分类号: G06F3/06

    摘要: A method for migrating a nickname cache via a migration manager is described. The method includes the migration manager locating where the nickname cache is stored and locating where the nickname cache is to be migrated. Once the source and target devices are located, the migration manager can generate any necessary transformations so that the data migrated from the source device to the target device is compatible. The nickname cache can then be extracted from the source device, transformed and stored into the nickname cache of the target device.