Data management system for storage tiers

    公开(公告)号:US10884646B2

    公开(公告)日:2021-01-05

    申请号:US16182084

    申请日:2018-11-06

    Abstract: A method, apparatus, system, and computer program product for managing a storage system. Data associated with a set of tags is identified by a computer system using a policy, wherein the policy defines the set of tags for a set of types of data used in a process performed in an organization using data in the storage system. A set of storage tiers for the data associated with the set of tags is determined by the computer system using the policy. The policy defines the set of storage tiers for the data associated with the set of tags when the data associated with the set of tags is used by the process. The data associated with the set of tags is moved by the computer system to the set of storage tiers as determined using the policy.

    Container-based operating system and method

    公开(公告)号:US10396997B2

    公开(公告)日:2019-08-27

    申请号:US15379196

    申请日:2016-12-14

    Abstract: In a distributed network hosting a shared pool of configurable computing resources there is provided one or more system instances of a blockchain. Each system instance comprises a virtual machine and a set of containers. The containers are members of the blockchain in that the blockchain's public ledger records encrypted copies of at least selected directories of each container. Each container that is in the set can thus verify whether any other container also belongs to the same set with reference to the public ledger, since the transactions recorded on the public ledger are encrypted copies of the set's containers. The use of a blockchain thus allows a system boundary to be defined around a set of containers by the initial specification of the blockchain. The system boundary can be defined to ensure that the set of containers comply with legal requirements, such as a geographic restriction.

    Identifying hardcoded IP addresses

    公开(公告)号:US10171301B2

    公开(公告)日:2019-01-01

    申请号:US14809353

    申请日:2015-07-27

    Abstract: A method and associated systems for identifying hardcoded network addresses. A network-migration tool requests from a network certain types of data that may identify IP addresses used by the network and receives a subset of the requested data. The system infers from the manner in which received data characterizes IP addresses which of those addresses are likely to be hardcoded. If the system receives a list of server affinities, it infers that an IP address used for communication between servers in a same affinity group is hardcoded if that address is not listed by an associated DNS server. If a received ARP cache lists an IP address as having been resolved to a MAC address, the system infers that the IP address cannot be hardcoded. If a received TCP trace log lists an address without a corresponding hostname the system infers that the address is hardcoded.

    Virtual reality sensory construct

    公开(公告)号:US10114460B2

    公开(公告)日:2018-10-30

    申请号:US15230704

    申请日:2016-08-08

    Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.

    SERVICE LEVEL AGREEMENT RISK ANALYSIS WITH EXOGENOUS ARCHITECTURE

    公开(公告)号:US20170366574A1

    公开(公告)日:2017-12-21

    申请号:US15699063

    申请日:2017-09-08

    CPC classification number: G06N7/005 H04L41/145 H04L41/5003

    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.

Patent Agency Ranking