Match Document Document Title
US20110131193 On Demand Locking of Retained Resources in a Distributed Shared Disk Cluster Environment  
Systems, methods, computer program product embodiments are provided for locking retained resources of database information in a distributed shared disk cluster environment. An embodiment includes...
US20090300308 Partitioning of a Multiple Logic-Unit-Number SCSI Target  
A method, computer program product and computer system for assigning logic storage entities of a storage device to multiple partitions of a computer system, which includes associating each logic...
US20140040572 REQUEST ORDERING SUPPORT WHEN SWITCHING VIRTUAL DISK REPLICATION LOGS  
Storage access requests, such as write requests, are received from a virtual machine. A storage request processing module updates one of multiple virtual disks as directed by each of the storage...
US20120284527 METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING  
Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk...
US20140380009 PROTECTED MEMORY VIEW FOR NESTED PAGE TABLE ACCESS BY VIRTUAL MACHINE GUESTS  
Generally, this disclosure provides systems, methods and computer readable media for a protected memory view in a virtual machine (VM) environment enabling nested page table access by trusted...
US20140237206 Managing Personal Information on a Network  
Devices, systems, and methods are provided for managing personal information by providing a centralized source or database for a user's information and enabling the user to regulate privacy levels...
US20130219139 METHODS AND SYSTEMS FOR MAINTAINING A STORAGE VOLUME WITH HOLES AND FILLING HOLES  
In one embodiment, a method for managing access to a fast non-volatile storage device, such as a solid state device, and a slower non-volatile storage device, such as a magnetic hard drive, can...
US20130159653 Predictive Lock Elision  
In at least one embodiment, a method includes determining whether to elide a lock operation based on success of or failure of one or more previous transactional memory operations associated with...
US20080183997 Storage library with removable media  
Embodiments include methods, apparatus, and systems for managing a storage library with removable media. One method includes providing to an administrative console identification of host computers...
US20150261688 EXTENDED PAGE TABLE FOR I/O ADDRESS TRANSLATION  
An extension of a page table is provided. An aspect includes receiving, by a host bridge, a request. An aspect includes determining, by the host bridge, that access to a memory address space...
US20110271069 DISMOUNTING A STORAGE VOLUME  
In response to an instruction to dismount a storage volume, for example, an object in the storage volume is identified and a handle that references the object is closed. Once an exclusive lock on...
US20090144499 Preemptive write-inhibition for thin provisioning storage subsystem  
Write requests from host computers are processed in relation to a thin provisioning storage subsystem. A write request is received from a host computer. The write request identifies a first...
US20150212760 SHARED STORAGE ARCHITECTURE  
A shared storage architecture is described for coordinating management of a shared storage between nodes of a network storage system. In various embodiments, the shared storage is partitioned into...
US20150186299 LOAD INSTRUCTION FOR CODE CONVERSION  
Embodiments of an invention for a load instruction for code conversion are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to...
US20110022812 SYSTEMS AND METHODS FOR ESTABLISHING A CLOUD BRIDGE BETWEEN VIRTUAL STORAGE RESOURCES  
Methods and systems for establishing a cloud bridge between two virtual storage resources and for transmitting data from one first virtual storage resource to the other virtual storage resource....
US20100313239 AUTOMATED ACCESS CONTROL FOR RENDERED OUTPUT  
A content rendering action is detected at a content access control module associated with renderable content stored within a memory associated with the content access control module. A portion of...
US20140317371 METHOD AND SYSTEM FOR ACCESS BASED DIRECTORY ENUMERATION  
Method and system for access based directory enumeration is provided. When a directory is enumerated for a first time, user credentials are verified against an access control list (ACL) entry that...
US20110185404 STAGED USER DELETION  
A method, system, and computer program product for staged user identifier deletion are provided. The method includes checking a status of a user identifier in response to a triggering event. In...
US20140115258 SYSTEM AND METHOD FOR MANAGING A DEDUPLICATION TABLE  
Implementations described and claimed herein provide systems and methods for allocating and managing resources for a deduplication table. In one implementation, an upper limit to an amount of...
US20070180209 Internet-safe computer  
The present invention eliminates the possibility of problems with viruses, worms, identity theft, and other hazards that may result from the connection of a computer to the Internet. It does so by...
US20080215839 Providing Storage Control in a Network of Storage Controllers  
An apparatus for providing storage control in a network of storage controllers is disclosed. The apparatus includes an owner storage controller; an I/O performing component, an ownership...
US20150092298 MEDIA AND DRIVE VALIDATION IN A STORAGE LIBRARY  
Systems and methods are described for validating storage media and/or media drives in a storage library using a hidden drive pool and a non-hidden media pool. For example, a storage library can be...
US20130268740 Self-Destructing Files in an Object Storage System  
An object storage system providing a secure object destruction and deletion service is provided. The destruction and deletion of files can be handled through secure overwriting of files on a...
US20080086614 APPLICATION DEPENDENT STORAGE CONTROL  
A system for enforcing a storage allocation usage right(s) for an application may include a controllable storage and a storage manager to control the access of the application to the storage...
US20070067589 Smart zoning to enforce interoperability matrix in a storage area network  
The present invention describes various mechanisms which may be used for improving SAN device interoperability enforcement techniques implemented in SAN or Fibre Channel networks. In one...
US20150127918 CASE SECURE COMPUTER ARCHITECTURE  
Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets, together with hardware and/or...
US20140181448 TAGGING IN A STORAGE DEVICE  
In an embodiment, a command issued by an entity may be acquired by a controller contained in a storage device. The command may be issued by the entity to access a block in the storage device. The...
US20150193165 TRANSIENT STORAGE DEVICE CONFIGURATION SILO  
A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as...
US20130297902 VIRTUAL DATA CENTER  
A system and method are provided for securely sharing storage resources in a storage network. One or more organizations are modeled in a structure where each organization includes one or more...
US20060143415 Managing shared memory access  
Managing access to shared memory by a plurality of access entities includes storing a first identifier in a first storage location, the first identifier identifying a data structure in the shared...
US20130132627 System and Method for Implementing Locks Shared Between Kernel and User Space  
An apparatus comprising one or more processors configured to implement a plurality of operations for an operating system (OS) platform including a kernel and a user application, one or more shared...
US20140143515 VIRTUAL WRITE PROTECTION SYSTEM  
An optical medium containing virtual write protect information can be recorded in drives and systems without first changing the write protection from on to off by receiving valid user input. The...
US20140372671 AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND COMPUTER PROGRAM PRODUCT  
According to an embodiment, an authentication device includes an acquiring unit, a predicting unit, and an authenticating unit. The acquiring unit is configured to acquire performance information...
US20110302377 Automatic Reallocation of Structured External Storage Structures  
A mechanism for automatic reallocation of shared external storage structures is provided. The shared external storage divides the dynamically allocable storage into fixed sized blocks referred to...
US20130254505 SCSI PROTOCOL EMULATION FOR VIRTUAL STORAGE DEVICE STORED ON NAS DEVICE  
A virtualization technique, in accordance with one embodiment of the present invention, includes emulating the small computing system interface (SCSI) protocol to access a virtual SCSI storage...
US20050268071 Facilitating management of storage of a pageable mode virtual environment absent intervention of a host of the environment  
Host page management assist functions are employed to manage storage of a pageable mode virtual environment. These functions enable storage to be managed by a processor of the environment absent...
US20070073994 Virtual partitioning  
A method for operating a storage system, consisting of performing an allocation of respective partitions of a physical storage resource of the storage system to respective hosts of the storage...
US20060112245 Storage system transfering volume information  
To set access limitation, which limits access to a remote volume, to each host computer separately without registering in advance information on which volume is accessible to which host computer....
US20090327637 SECURITY SYSTEM FOR COMPUTERS  
A security system designed to trap computer viruses is described. The system storage has an external alarm configured to monitor the time every file takes to load by monitoring the drive activity...
US20120290807 CHANGING OWNERSHIP OF CARTRIDGES  
Exemplary method, system, and computer program product embodiments for changing ownership of cartridges, such as virtual cartridges between remotely located virtual tape libraries, are provided....
US20140189274 APPARATUS AND METHOD FOR PAGE WALK EXTENSION FOR ENHANCED SECURITY CHECKS  
An apparatus and method for managing a protection table by a processor. For example, a processor according to one embodiment of the invention comprises: protection table management logic to manage...
US20090044100 Staging Electronic Publications  
A system includes storage devices for storing content along with two or more computing devices such as a two or more servers. One of the computing devices includes a staging memory that stores...
US20090300710 UNIVERSAL SERIAL BUS (USB) STORAGE DEVICE AND ACCESS CONTROL METHOD THEREOF  
The invention provides a USB storage device and an access control method thereof. An access control module is provided on the USB storage device. The storage space is divided into at least one...
US20140244956 STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
US20090193210 System for Automatic Legal Discovery Management and Data Collection  
Provided is a system and method for the collection and production of documents in a judicial setting. The disclosed technology provides a rapid, cost-efficient system for document production that...
US20060036822 Method for managing a computer system having fibre-channel switch, management program, and management computer system  
In a SAN where a zone has been set through hardware zoning, when any of devices connected to a fabric have been changed, the change is detected. Provided is a method for managing a devices in a...
US20140189246 MEASURING APPLICATIONS LOADED IN SECURE ENCLAVES AT RUNTIME  
Embodiments of an invention for measuring applications loaded in secure enclaves at runtime are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The...
US20140156959 CONCURRENT ARRAY-BASED QUEUE  
According to one embodiment, a method for implementing an array-based queue in memory of a memory system that includes a controller includes configuring, in the memory, metadata of the array-based...
US20110066820 OVERFLOW HANDLING OF SPECULATIVE STORE BUFFERS  
A method, a system and a computer program product for handling speculative stores. The system determines when a speculative store buffer is not full. An indicator is generated when the speculative...
US20100082928 Secure Manufacturing of Programmable Devices  
According to an embodiment, a programmable logic device includes a plurality of logic blocks and a logic unit. The logic blocks are grouped into one or more partitions. The logic unit controls...