James E. Veres - Framingham MA James B. Stein - Westboro MA Robert W. Beauchamp - Milford MA Harold R. Kimmens - Hudson MA David W. Baird - Marlborough MA Michael J. Roman - Westborough MA David G. Therrien - Nashua NH John J. Doyle - Franklin MA
Assignee:
Data General Corporation - Westboro MA
International Classification:
G06F 900
US Classification:
364200
Abstract:
A technique for starting up a data processing system in which a "basic" or "kernel" instruction set is stored in an auxiliary store and transferred to the processor's control store in start-up. The kernel instruction set in used to execute an initialization program which identifies an I/O device in which a microcode local program and a desired microcode file are stored. No microcode load program is transferred to the processor's main memory, using the kernel instructions and the desired microcode file is then transferred in selected blocks from the I/O device to the main memory and there to the microcode control store. The microinstructions of the desired microcode file then can be used to load appropriate operating system software so that the overall processor is then ready for use in whatever applications are desirable.
Protection And Recovery Of Backup Storage Systems From Ransomware Attacks
- Marlborough MA, US Michael Carleton - Marlborough MA, US Adrian T. VanderSpek - Worcester MA, US Stephen Smith - Marlborough MA, US Luke Makosky - Marlborough MA, US Peter Watkins - Newton Center MA, US Nathaniel W. Turner - Providence RI, US Sandra C. Scott - Marlborough MA, US Yee-ching Chao - Nashua NH, US Thomas J. Gillispie - Acton MA, US William Andrews - Reading MA, US David G. Therrien - Nashua NH, US Jamey C. Poirier - Grafton MA, US Mark B. Hecker - Northborough MA, US Andrew H. French - Lexington MA, US
A method, a system, and a computer program product for protection and recovery of backup storage systems from ransomware attacks. A request to modify data stored in a storage system is received. The storage system includes at least one component configured to store the deduplicated data. An acknowledgement of the received request is generated. The acknowledgement indicates that the data stored in the at least one component and identified in the received request was modified. Modification of the data stored in the at least one component and identified in the received request for a predetermined period of time is prevented.
- Marlborough MA, US Daniel P. Martinelli - Hopkinton MA, US Lucas H. Makosky - Harvard MA, US Mark B. Hecker - Northborough MA, US Stephen A. Smith - Bedford NH, US Adrian T. VanderSpek - Worcester MA, US David G. Therrien - Nashua NH, US
International Classification:
G06F 16/174 H04L 29/06 H04L 29/08 G06F 11/14
Abstract:
A system, a method, and a computer program product for performing deduplication of data using a scalable deduplication grid are disclosed. A listing of a plurality of zone stamps is generated, where each zone stamp represents a zone in the plurality of zones in a data stream. The listing contains a logical arrangement of the plurality of zone stamps obtained from each storage location and being accessible by a plurality of servers. A first zone stamp in the listing is compared to a second zone stamp in the listing. The first and second zones are delta-compressed based on a determination that the first zone stamp is substantially similar to the second zone stamp. A server is selected to perform the comparison and delta-compression.
- Westborough MA, US Daniel P. Martinelli - Hopkinton MA, US David G. Therrien - Nashua NH, US
International Classification:
G06F 17/30
Abstract:
A method, a system, and a computer program product for performing next level multi-level deduplication. A first zone stamp for a first data zone is generated and compared to a second zone stamp representing a second data zone, where the zones are first level data zones. The first and second data zones are deduplicated when the first zone stamp matches the second zone stamp. A second-level first zone stamp is selected when there is no match between first and second zone stamps. The second-level first zone stamp, representing a second-level first data zone in the first data zone, is compared to the second zone stamp and/or a second-level second zone stamp representing a second-level second data zone. The second-level first zone and one of the second data zone and the second-level second zone are deduplicated when the second-level first zone stamp matches one of the second zone stamp and the second-level second zone stamp.
Thomas G. Hansen - Bellingham MA, US Daniel P. Martinelli - Hopkinton MA, US Lucas H. Makosky - Harvard MA, US Mark B. Hecker - Northborough MA, US Stephen A. Smith - Bedford NH, US Adrian T. VanderSpek - Worcester MA, US David G. Therrien - Nashua NH, US
International Classification:
G06F 17/30 H04L 29/08
Abstract:
A system, a method, and a computer program product for performing deduplication of data using a scalable deduplication grid are disclosed. A listing of a plurality of zone stamps is generated, where each zone stamp represents a zone in the plurality of zones in a data stream. The listing contains a logical arrangement of the plurality of zone stamps obtained from each storage location and being accessible by a plurality of servers. A first zone stamp in the listing is compared to a second zone stamp in the listing. The first and second zones are delta-compressed based on a determination that the first zone stamp is substantially similar to the second zone stamp. A server is selected to perform the comparison and delta-compression.
Resumes
Senior Information Security Analyst And Investigator