Vmware Esx • Vmware • Active Directory • Disaster Recovery • Servers • Virtualization • System Administration • Windows Server • Troubleshooting • Microsoft Exchange • Vsphere • Storage • Citrix • Dns • Help Desk Support • Windows 7 • Microsoft Technologies • Vmware Infrastructure • Data Center • Netapp • Vmware Vsphere • Network Administration • Sccm • Scom • Commvault Galaxy • Emcisa • Windows • Microsoft Certified Technology • Technical Support • Iis • Nas • Avamar • Mcts • Netapp Filers • Brocade Fibre Switches • Commvault
Languages
Spanish
Ranks
Certificate:
Emc Information Storage Associate
Interests
Children • Environment • Poverty Alleviation • Science and Technology • Disaster and Humanitarian Relief • Health
Industries
Computer Software
Us Patents
In A Data Storage Server, For Each Subsets Which Does Not Contain Compressed Data After The Compression, A Predetermined Value Is Stored In The Corresponding Entry Of The Corresponding Compression Group To Indicate That Corresponding Data Is Compressed
In a technique for compressing data, a data storage server receives a set of data, which includes a first number of subsets. The storage server defines a number of compression groups for the set of data, each compression group including multiple entries, each entry containing a pointer to a different subset of the set of data. At least part of the set of data is then compressed into a smaller number of subsets. For each of the subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group, to indicate that corresponding data is compressed and represented elsewhere in the compression group. The predetermined value may also indicate which compression algorithm was used to compress the data.
Apparatus And Method For Data Consistency In A Proxy Cache
Emmanuel Ackaouy - San Francisco CA, US Brian Quirion - San Jose CA, US David Grunwald - Santa Clara CA, US Ashish Prakash - Morrisville NC, US James Voll - Palo Alto CA, US Paul Eastham - Mountain View CA, US Kartik Ayyar - Santa Clara CA, US
Assignee:
Netapp, Inc. - Sunnyvale CA
International Classification:
G06F 15/16
US Classification:
709229, 709213, 709217, 711141, 707 10
Abstract:
In an embodiment, a method to provide data consistency in a storage system, includes: providing, by a server to a proxy cache, a lock associated with a delegated file in the server; in response to a write request from a client, modifying data in a cached copy of the delegated file in the proxy cache; revoking, by the server, the lock associated with the delegated file, in response to a request from another device to access the delegated file so that the delegated file is now a formerly delegated file; and writing the modified data to the formerly delegated file in the server to update the formerly delegated file; and permitting access to the formerly delegated file by the another device.
Centralizing Access Request Authorizations For Storage Systems
James J Voll - Palo Alto CA, US Konstantinos Roussos - Sunnyvale CA, US Anshu Surana - Bangalore, IN
Assignee:
NetApp, Inc. - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
726 2, 726 3, 726 4
Abstract:
Described herein is a centralized access request authorization system comprising an authorization module, one or more server systems, and a collection of one or more storage systems connected through a network. An application executing on a server system receives an access request for accessing the storage system collection and sends an authorization request to the authorization module for authorizing the access request. The application may be configured to only send the access request to the storage system collection if it first receives an authorization of the access request from the authorization module. Since the application is configured to do such, the storage system performs the access request without performing any authorization verification on the access request. The authorization module may receive authorization requests from a plurality of applications (executing on a plurality of server systems) and determine received authorization requests using a single repository of access permission information.
Automated Continuous Provisioning Of A Data Storage System
Methods and systems for mapping data-management requirements to the provisioning of a data storage system to conform to a set of user-defined data-management policies. A conformance engine with storage system awareness translates the set of data-management policies to a corresponding set of storage-provisioning policies and provisions the resources of the storage system thereby to conform the storage system to the data-management policies. A conformance checker continuously and automatically compares the provisioning of the storage system resources to the provisioning required to meet the data-management policies. When nonconformance is detected, the conformance engine automatically re-provisions the available resources of the storage system to conform the storage system to the data management policies.
Anurag Palsule - Bangalore, IN Shailaja Kamila - Bangalore, IN James Voll - Palo Alto CA, US Ameet Deulgaonkar - Bangalore, IN Nagender Somavarapu - Bangalore, IN
Assignee:
Netapp, Inc. - Sunnyvale CA
International Classification:
G06F 12/00 G06F 13/00 G06F 13/28
US Classification:
711165, 711162
Abstract:
Method and system for processing client provisioning and migration requests is provided. The process evaluates a provisioning request and selects a storage that best meets the client requirements. The process determines if non-disruptive migration is possible and if it is possible then the storage is automatically configured for non-disruptive migration. Once the storage is provisioned and configured, the process receives a migration request to migrate information from the storage. The process determines an access protocol used by the client to access the storage. The process determines if a storage system that manages the storage is capable of supporting non-disruptive migration of information from the storage. If the storage system is capable, then a migration technique is automatically selected for migrating the information from the storage.
System And Method For Securing Information By Obscuring Contents Of A Persistent Image
Jason Sobel - Santa Clara CA, US James Voll - Palo Alto CA, US
Assignee:
NetApp, Inc. - Sunnyvale CA
International Classification:
G06F 21/10
US Classification:
713193, 711162
Abstract:
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file system when accessing the persistent image. The data set indicates a visibility status of the files or directories in the persistent image. Requests to the file system for access to the image are filtered through the data set to prevent unintentionally revealed information in the image from being generally available. Commands to add and remove entries in the data set are provided. The data set may be composed of combinations of lists, in which list entries indicate a hidden file or directory, or indicate a visible file or directory. The data set is maintained in system memory and updated on disk to permit restoration of the data set when a volume is mounted or during recovery from a system crash. Information that was unintentionally revealed in the active file system while a backup was being made can be obscured retroactively to provide protection from general access to improve information security in the file system.
Method And System For Managing Storage Capacity In A Storage Network
Shailaja Kamila - Sunnyvale CA, US James J. Voll - Sunnyvale CA, US Ameet Deulgaonkar - Sunnyvale CA, US Anurag Palsule - Sunnyvale CA, US Ramanathan S. Padinjarel - Sunnyvale CA, US
Assignee:
NetApp, Inc. - Sunnyvale CA
International Classification:
G06F 12/02 G06G 7/62 G06F 15/173 G06F 12/00
US Classification:
711171, 703 21, 709224, 711E12001, 711E12002
Abstract:
A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.
Temporary Computer File System Implementing Using Anonymous Storage Allocated For Virtual Memory
Kevin C. Fox - San Jose CA Timothy P. Marsland - Palo Alto CA Michael L. Federwisch - San Jose CA James J. Voll - Palo Alto CA Madhusudhan Talluri - San Jose CA
Assignee:
Sun Microsystems, Inc. - Mountain View CA
International Classification:
G06F 1208
US Classification:
395681
Abstract:
A devtmp device driver provides the functionality of temporary files by representing a virtual device and including the virtual device among several devices within which a file system can store files. Rather than storing data in and retrieving data from a physical device, the devtmp device driver stores data in and retrieves data from anonymous storage through a swap file system which manages anonymous storage for a virtual memory system. A file system uses the devtmp device driver in the same manner the file system uses conventional device drivers which store data in and retrieve data from secondary storage devices. Since the devtmp device driver represents a virtual device whose data are stored in anonymous storage managed by the swap file system, the total amount of storage available for storing data of temporary files is shared among the various components of a computer process to successfully satisfy various needs of various computer processes. Temporary files can be accessed through a main file system, e. g. , the UNIX file system, using a delayed-write-mode.
Kärcher North America Inc. Feb 2016 - Mar 2016
Senior Systems Administrator
Baxter International Inc. Jul 2015 - Jan 2016
Senior Systems Administrator
Envision Healthcare Aug 2013 - Jul 2015
Systems Administrator
Emc Oct 2011 - Jul 2013
Systems Administrator
Arcadis 2006 - 2011
Systems Administrator
Education:
Westwood College - Denver North 1995 - 1997
Associates, Aviation
Devry University
Gateway High School
Skills:
Vmware Esx Vmware Active Directory Disaster Recovery Servers Virtualization System Administration Windows Server Troubleshooting Microsoft Exchange Vsphere Storage Citrix Dns Help Desk Support Windows 7 Microsoft Technologies Vmware Infrastructure Data Center Netapp Vmware Vsphere Network Administration Sccm Scom Commvault Galaxy Emcisa Windows Microsoft Certified Technology Technical Support Iis Nas Avamar Mcts Netapp Filers Brocade Fibre Switches Commvault
Interests:
Children Environment Poverty Alleviation Science and Technology Disaster and Humanitarian Relief Health
Languages:
Spanish
Certifications:
Emc Information Storage Associate Vmware Vcp 5 Vmware Certified Professional 6 €“ Data Center Virtualization Vmware Certified Professional 6.5 - Data Center Virtualization Emc Corporation Vmware, License 145677 License 145677
Name / Title
Company / Classification
Phones & Addresses
Mr. James Voll Director
Nationwide Auto Warranty Auto Warranty Processing Service
205C - 470 Weber St North, Waterloo, ON N2L 6J2 5198865333, 5198869921
James (Jim) Voll President
Vollco International Sales Ltd Shavers - Electric Repair. Internet Shopping. Business Opportunity Companies
Box 3041, Wainwright, AB T9W 1S9 7808423817, 7808424464
James Voll President
Vollco International Sales Ltd Shavers - Electric Repair · Internet Shopping · Business Opportunity Companies
7808423817, 7808424464
James Voll Director
Nationwide Auto Warranty Auto Warranty Processing Service
5198865333, 5198869921
Youtube
last day in Vegas/ the vlogs
Hello there! so as promised here is the last video log from Vegas! I t...
Duration:
29m 48s
3 Demonic Gateways (Season 5, Ep 9) - God En...
In this potent podcast James exposes three ancient malevolent spirits ...
Duration:
26m 27s
Best Volleyball Blocks Ever with Scott Sterling
A special thanks to all of the other YouTubers who collaborated with u...
Duration:
3m 30s
Dodgeball with One Direction
James takes on the role of player-coach with the guys of One Direction...
Duration:
7m 18s
Joseph - A Man Who Listens to God | John Lind...
In this message, Pastor John shares insight on stewarding the gift of ...
Duration:
22m 47s
1937 Horch 853 Voll & Ruhrbeck Sport Cabriole...
This video showcases 1937 Horch 853 Voll & Ruhrbeck Sport Cabrioletand...