Tao Tao - Cambridge MA, US Michael E. Bappe - Loveland CO, US Harold M. Sandstrom - Belmont MA, US Edith Epstein - Arlington MA, US Eric I. West - Brighton MA, US Helen S. Raizen - Jamaica Plain MA, US Santhosh V. Kudva - Karnataka, IN
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 3/00 G06F 13/00
US Classification:
710 8, 710 15, 710 62
Abstract:
Methods and apparatus for non-disruptive upgrade by redirecting I/O operations. With this arrangement, a driver upgrade does not require restarting an application. In one embodiment, a method includes installing on a computer a legacy upgrade module in a kernel having a legacy driver with first and second loadable extensions for handling input/output operations for applications to and from devices, retrieving and storing static configuration data from the legacy driver, transferring the stored static configuration data to a new driver, obtaining runtime device configuration data from the devices and transferring the runtime device configuration data to the new driver, and filtering device input/output operations such that prior to cutover input/output operations are directed by the LUM through device stacks for the legacy driver and after cutover input/output operations are directed to the new driver.
In-Band Transport Mechanism For Carrying Communications Among Functional Components Of A Storage I/O Interface Stack
Helen S. Raizen - Jamaica Plain MA, US Michael E. Bappe - Loveland CO, US Edith Epstein - Arlington MA, US Atul Kabra - New Delhi, IN Cesareo Contreras - Northbridge MA, US Xunce Zhou - Shrewsbury MA, US
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 3/00 G06F 13/42 G06F 13/14
US Classification:
710 5, 710105, 710305
Abstract:
An in-band protocol transport carries command-response protocol communications between first and second functional components of a storage input/output (I/O) interface stack, for example to control encryption-related processing of storage I/O commands. A storage read command used as a protocol transport message has protocol data in a read data buffer, and predetermined read address information, such as a prime-numbered starting block address and a small, odd-valued length value, unlikely to occur in normal (non-transport) storage read commands. The second functional component determines that the storage read command contains the predetermined read address information, indicating that the storage read command is a protocol transport message rather than a normal read. For greater confidence, it also determines that the protocol data in the read data buffer includes protocol identification data such as a protocol signature. The protocol data is used to control a processing action for subsequent normal storage I/O commands, such as encryption-related processing, and a protocol response is returned by creating and storing response data in the read data buffer and signaling completion of the storage read command to the first functional component.
Systems And Methods For Selective Encryption Of Operating System Metadata For Host-Based Encryption Of Data At Rest On A Logical Unit
Helen S. Raizen - Jamaica Plain MA, US John Harwood - Paxton MA, US Michael E. Bappe - Loveland CO, US Sathiyamoorthy Kothandan - Woburn MA, US Edith Epstein - Arlington MA, US
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 21/00
US Classification:
713165, 713164, 713189, 713193
Abstract:
A method is provided for providing an operating system (OS) independent input/output (I/O) filter driver capable of encrypting at least a portion of a logical unit (LUN), the method comprising the unordered steps of: providing an I/O filter driver component to an I/O stack for a host in communication with the LUN; determining, based at least in part on at least one of OS requirements and an arrangement of data on the LUN, at least one region in the LUN that contains data that is used below the I/O filter driver in an I/O stack on the host; and performing at least one of a read and a write of the one or more regions while keeping the one or more regions in plaintext, while permitting other regions of the LUN to be at least one of encrypted and decrypted.
Tao Tao - Cambridge MA, US Harold M. Sandstrom - Belmont MA, US Helen S. Raizen - Jamaica Plain MA, US Michael E. Bappe - Loveland CO, US Edith Epstein - Arlington MA, US Eric I. West - Brighton MA, US Santhosh Venkatesh Kudva - Karnataka, IN
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 13/10 G06F 9/44
US Classification:
710 8, 710 5, 717168
Abstract:
Described are techniques for upgrading a driver. A driver is installed which includes an upgrade facility, a base driver and a first set of one or more driver extension modules for processing input/output operations for one or more devices. Processing is performed to upgrade the driver using the upgrade facility. The processing includes loading one or more upgrade modules associated with a second version of said driver and performing cutover processing for each of the one or more devices.
Methods And Apparatus For Providing Host Controlled Caching Of Data In A Storage System
Mechanisms and techniques allow a host computer system to control caching operations within a data storage system. In a typical implementation, the system of the invention operates within a host computer system to intercept requests for access to data stored within a data storage system that originate from applications, programs or other processes that perform (e. g. , execute) on the host computer system or another computer system. Once intercepted, the host computer can examine such a request for access to data to determine if the request matches any prefetch criteria defined within a prefetch database provided by the system of the invention. As an example, prefetch criteria defined in a prefetch database can specify various requestors (e. g. , applications, programs, processes, users, or the like) that can access data (e. g. , specific files, databases, volumes, data types or the like) stored within the data storage system according to various data access techniques (e. g.
Youtube
Epstein 2021 Tribute
two years later we must not forget the OG.
Duration:
1m 38s
Edith Piaf - Non, Je ne regrette rien
in memory of Edith Piaf... Our band is great fan of her. bandzone.cz...
Duration:
2m 23s
What really happened on Jeffrey Epstein's pri...
Jeffrey Epstein's paradise getaway in the Virgin Islands may now lie a...
Duration:
6m 51s
Jeffrey Epstein Survivors Talk About His Deat...
In this clip from Jeffrey Epstein: Filthy Rich, survivors talk about l...
Duration:
8m 13s
I Danced For The Angel Of Death: The Dr. Edit...
At the age of sixteen, Edith Eger was sent to Auschwitz. Hours after h...
Duration:
56m 18s
Exclusive: Former associate says famous names...
NewsNation's Brian Entin spoke with former Jeffrey Epstein associate C...