Field of the Invention
The field of the invention is data processing, or, more specifically, methods, apparatus, and products for ensuring crash-safe forward progress of a system configuration update.
Description of Related Art
Modern storage systems can include a variety of different components such as hard drives, solid-state drives, controllers, and so on. The different components that are included in the storage system may be described in a system configuration file that identifies all of the components in the storage system. Such a system configuration file may be fragmented into multiples portions for a variety of reasons, including to provide for increased resiliency, to provide for increased space efficiency, and so on. In such an example, each unique portion of the configuration file may be stored on a different storage device in the storage system. As components are added to or remove from the storage system, the system configuration file must be updated to accurately reflect the new state of the storage system. When the configuration file is fragmented into multiples portions that are each stored on a different storage device, updating the system configuration file must be accomplished by writing the updated information to each of the storage devices that store a portion of the system configuration file. If each portion of the updated system configuration file is not successfully written to each of the storage devices that store a portion of the system configuration file, however, conflicting versions of the system configuration file may exist.
Methods, apparatuses, and products for ensuring crash-safe forward progress of a system configuration update in a storage system that includes a storage array controller and a plurality of storage devices, including: determining a number of storage devices in the storage system; determining a number of unavailable storage devices in the storage system; and determining, for the one or more system configurations, whether the system configuration can be reconstructed in dependence upon the number of storage devices in the storage system and the number of unavailable storage devices in the storage system.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of example embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of example embodiments of the invention.
Example methods, apparatus, and products for ensuring crash-safe forward progress of a system configuration update in accordance with the present disclosure are described with reference to the accompanying drawings, beginning with
The computing devices (164, 166, 168, 170) in the example of
The local area network (160) of
The example storage arrays (102, 104) of
Each storage array (102, 104) depicted in
Each storage array controller (106, 112) may be implemented in a variety of ways, including as a Field Programmable Gate Array (‘FPGA’), a Programmable Logic Chip (‘PLC’), an Application Specific Integrated Circuit (‘ASIC’), or computing device that includes discrete components such as a central processing unit, computer memory, and various adapters. Each storage array controller (106, 112) may include, for example, a data communications adapter configured to support communications via the SAN (158) and the LAN (160). Although only one of the storage array controllers (112) in the example of
The arrangement of computing devices, storage arrays, networks, and other devices making up the example system illustrated in
Ensuring crash-safe forward progress of a system configuration update in accordance with embodiments of the present disclosure is generally implemented with computers. In the system of
The storage array controller (202) of
The storage array controller (202) of
Stored in RAM (214) is an operating system (246). Examples of operating systems useful in storage array controllers (202) configured for ensuring crash-safe forward progress of a system configuration update according to embodiments of the present disclosure include UNIX™, Linux™, Microsoft Windows™, and others as will occur to those of skill in the art. Also stored in RAM (236) is an update module (248), a module that includes computer program instructions useful in ensuring crash-safe forward progress of a system configuration update according to embodiments of the present disclosure. The update module (248) may be configured to ensure crash-safe forward progress of a system configuration update by determining a number of storage devices in the storage system, determining a number of unavailable storage devices in the storage system, and determining, for the one or more system configurations, whether the system configuration can be reconstructed in dependence upon the number of storage devices in the storage system and the number of unavailable storage devices in the storage system, as will be described in greater detail below. Readers will appreciate that while the update module (248) and the operating system (246) in the example of
The storage array controller (202) of
The storage array controller (202) of
The storage array controller (202) of
The storage array controller (202) of
Readers will recognize that these components, protocols, adapters, and architectures are for illustration only, not limitation. Such a storage array controller may be implemented in a variety of different ways, each of which is well within the scope of the present disclosure.
For further explanation,
A system configuration can include information describing the storage system (302) and may be embodied, for example, as a data structure such as a file. The system configuration can include information such as an identification of the storage devices (316, 318, 320) that are included in the storage system (302), an identification of the storage devices (316, 318, 320) that are included in a logical grouping of storage devices (e.g., a write group), and so on. The system configuration may be stored by each of the storage devices (316, 318, 320) such that the storage array controller (304) may be stateless in the sense that the storage array controller (304) is not required to retain the system configuration.
In the example method depicted in
Readers will further appreciate that as storage devices are added to or removed from the storage system (302), the system configuration may be updated to reflect such changes. Updating the system configuration may be carried out, for example, by writing a new system configuration to each of the storage devices (316, 318, 320). To reduce the amount of storage required to store the system configurations, writing a new system configuration to the storage devices (316, 318, 320) may be carried out by overwriting an old system configuration stored on the storage devices (316, 318, 320), by deleting an old system configuration from the storage devices (316, 318, 320) before or after writing the new system configuration to the storage devices (316, 318, 320), and so on.
The example method depicted in
Although the example described above relates to an embodiment where the storage array controller (304) carries out functions to assist in maintaining system inventory information, readers will appreciate that in other embodiments system inventory information may be maintained by another entity. In such an example, the system inventory information may be made available to the storage array controller (304) through direct or indirect communications between the storage array controller (304) and the entity that maintains system inventory information. Determining (306) the number (308) of storage devices in the storage system (302) may therefore be carried out in such an embodiment through direct or indirect communications between the storage array controller (304) and the entity that maintains system inventory information.
The example method depicted in
The example method depicted in
Consider an example in which a storage system includes twelve storage devices that are utilized for storing data (including portions of the system configuration), as well as additional storage devices that are used as redundant storage devices, such that the storage system can tolerate the failure of two storage devices and still reconstruct all data (including portions of the system configuration) stored on the twelve storage devices. In such an example, so long as portions of the system configuration are stored on ten of the storage devices, the system configuration can be reconstructed. In such an example, determining (314) whether a particular system configuration can be reconstructed in dependence upon the number (308) of storage devices in the storage system (302) and the number (312) of unavailable storage devices in the storage system (302) may be carried out, for example, by assuming that each available storage device has stored a portion of the system configuration and determining whether the number (312) of unavailable storage devices in the storage system (302) exceeds the number of failures tolerated by the storage system (302).
Readers will appreciate that because some storage devices may be utilized exclusively for storing parity data, determining (306) the number (308) of storage devices in the storage system (302) and determining (310) the number (312) of unavailable storage devices in the storage system (302) may be carried out by excluding the storage devices that are utilized exclusively for storing parity data. That is, the storage devices that are utilized exclusively for storing parity data may be viewed as resources dedicated to maintaining the integrity of the storage system (302) rather than viewed as storage resources of the storage system (302) itself. Likewise, in an embodiment where storage devices are used to store parity data and non-parity data (e.g., a storage system that implements policies similar to RAID 5 and RAID 6), determining (314) whether a particular system configuration can be reconstructed in dependence upon the number (308) of storage devices in the storage system (302) and the number (312) of unavailable storage devices in the storage system (302) may be carried out by excluding storage devices that include only parity data for the particular system configuration from inclusion in the number (308) of storage devices in the storage system (302) and the number (312) of unavailable storage devices in the storage system (302).
For further explanation,
The example method depicted in
In the example method depicted in
Readers will appreciate that in the example method depicted in
In the example method depicted in
Readers will appreciate that the number of unavailable storage devices may render, at least temporarily, the storage array controller (304) unable to determine whether the system configuration will ultimately be able to be reconstructed. Consider the example described above in which in which a storage system includes twelve storage devices that are utilized for storing data (including portions of the system configuration), as well as additional storage devices that are used as redundant storage devices, such that the storage system can tolerate the failure of two storage devices and still reconstruct all data (including portions of the system configuration) stored on the twelve storage devices. As described above, so long as portions of the system configuration are stored on ten of the storage devices, the system configuration can be reconstructed.
In the example described above, assume that the storage array controller (304) definitively determines that nine storage devices do include a portion of a particular system configuration, such that the number (404) of storage devices in the storage system that have stored a portion of the system configuration is determined (402) as being nine. In addition, assume that the storage array controller (304) is unable to access two of the storage devices, such that the number (312) of unavailable storage devices in the storage system (302) was determined (310) as being two. In such an example, because it cannot be determined whether the two unavailable storage devices have stored a portion of the system configuration, the storage array controller (304) cannot definitively determine whether the system configuration can be reconstructed. That is, the storage array controller (304) cannot ensure that the system configuration will ultimately be able to be reconstructed, nor can the storage array controller (304) definitively exclude the possibility that the system configuration will ultimately be able to be reconstructed. If at some point in the future both unavailable storage devices become available and neither storage device has stored a portion of the system configuration, it will not be possible to reconstruct the system configuration. If at some point in the future, however, one or more of the unavailable storage devices becomes available and the storage array controller (304) confirms that the newly available storage device has stored a portion of the system configuration, it will be possible to reconstruct the system configuration.
The example method depicted in
For further explanation,
In the example method depicted in
The example method depicted in
Consider the example method depicted in
Example embodiments of the present disclosure are described largely in the context of a fully functional computer system. Readers of skill in the art will recognize, however, that the present disclosure also may be embodied in a computer program product disposed upon computer readable media for use with any suitable data processing system. Such computer readable storage media may be any transitory or non-transitory media. Examples of such media include storage media for machine-readable information, including magnetic media, optical media, or other suitable media. Examples of such media also include magnetic disks in hard drives or diskettes, compact disks for optical drives, magnetic tape, and others as will occur to those of skill in the art. Persons skilled in the art will immediately recognize that any computer system having suitable programming means will be capable of executing the steps of the method of the invention as embodied in a computer program product. Persons skilled in the art will recognize also that, although some of the example embodiments described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative embodiments implemented as firmware, as hardware, or as an aggregation of hardware and software are well within the scope of embodiments of the present disclosure.
Although the examples described above describe embodiments where various actions are described as occurring within a certain order, no particular ordering of the steps are required. In fact, it will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present disclosure without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present disclosure is limited only by the language of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5706210 | Kumano et al. | Jan 1998 | A |
5799200 | Brant et al. | Aug 1998 | A |
5835694 | Hodges | Nov 1998 | A |
5933598 | Scales et al. | Aug 1999 | A |
6012032 | Donovan et al. | Jan 2000 | A |
6085333 | DeKoning et al. | Jul 2000 | A |
6484235 | Horst | Nov 2002 | B1 |
6643641 | Snyder | Nov 2003 | B1 |
6647514 | Umberger et al. | Nov 2003 | B1 |
6789162 | Talagala et al. | Sep 2004 | B1 |
7089272 | Garthwaite et al. | Aug 2006 | B1 |
7107389 | Inagaki et al. | Sep 2006 | B2 |
7146521 | Nguyen | Dec 2006 | B1 |
7334124 | Pham et al. | Feb 2008 | B2 |
7437530 | Rajan | Oct 2008 | B1 |
7493424 | Bali et al. | Feb 2009 | B1 |
7669029 | Mishra et al. | Feb 2010 | B1 |
7680957 | Ketterhagen | Mar 2010 | B1 |
7689609 | Lango et al. | Mar 2010 | B2 |
7743191 | Liao | Jun 2010 | B1 |
7899780 | Shmuylovich et al. | Mar 2011 | B1 |
8042163 | Karr et al. | Oct 2011 | B1 |
8086585 | Brashers et al. | Dec 2011 | B1 |
8140475 | Sparks | Mar 2012 | B1 |
8271700 | Annem et al. | Sep 2012 | B1 |
8387136 | Lee et al. | Feb 2013 | B2 |
8437189 | Montierth et al. | May 2013 | B1 |
8465332 | Hogan et al. | Jun 2013 | B2 |
8527544 | Colgrove et al. | Sep 2013 | B1 |
8566546 | Marshak et al. | Oct 2013 | B1 |
8578442 | Banerjee | Nov 2013 | B1 |
8613066 | Brezinski et al. | Dec 2013 | B1 |
8620970 | English et al. | Dec 2013 | B2 |
8751463 | Chamness | Jun 2014 | B1 |
8762642 | Bates et al. | Jun 2014 | B2 |
8769622 | Chang et al. | Jul 2014 | B2 |
8800009 | Beda, III et al. | Aug 2014 | B1 |
8812860 | Bray | Aug 2014 | B1 |
8818951 | Muntz | Aug 2014 | B1 |
8850546 | Field et al. | Sep 2014 | B1 |
8898346 | Simmons | Nov 2014 | B1 |
8909854 | Yamagishi et al. | Dec 2014 | B2 |
8931041 | Banerjee | Jan 2015 | B1 |
8949863 | Coatney et al. | Feb 2015 | B1 |
8984602 | Bailey et al. | Mar 2015 | B1 |
8990905 | Bailey et al. | Mar 2015 | B1 |
9124569 | Hussain et al. | Sep 2015 | B2 |
9134922 | Rajagopal et al. | Sep 2015 | B2 |
9209973 | Aikas et al. | Dec 2015 | B2 |
9250823 | Kamat et al. | Feb 2016 | B1 |
9300660 | Borowiec et al. | Mar 2016 | B1 |
9444822 | Borowiec et al. | Sep 2016 | B1 |
9507532 | Colgrove et al. | Nov 2016 | B1 |
20020013802 | Mori et al. | Jan 2002 | A1 |
20030145172 | Galbraith et al. | Jul 2003 | A1 |
20030188097 | Holland | Oct 2003 | A1 |
20030191783 | Wolczko et al. | Oct 2003 | A1 |
20030225961 | Chow et al. | Dec 2003 | A1 |
20040080985 | Chang et al. | Apr 2004 | A1 |
20040111573 | Garthwaite | Jun 2004 | A1 |
20040153844 | Ghose et al. | Aug 2004 | A1 |
20040193814 | Erickson et al. | Sep 2004 | A1 |
20040260967 | Guha et al. | Dec 2004 | A1 |
20050050381 | Maddock | Mar 2005 | A1 |
20050160416 | Jamison | Jul 2005 | A1 |
20050188246 | Emberty et al. | Aug 2005 | A1 |
20050216800 | Bicknell et al. | Sep 2005 | A1 |
20060015767 | Sun Hsu | Jan 2006 | A1 |
20060015771 | Vana Gundy et al. | Jan 2006 | A1 |
20060129817 | Borneman et al. | Jun 2006 | A1 |
20060161726 | Lasser | Jul 2006 | A1 |
20060230245 | Gounares et al. | Oct 2006 | A1 |
20060239075 | Williams et al. | Oct 2006 | A1 |
20070022227 | Miki | Jan 2007 | A1 |
20070028068 | Golding et al. | Feb 2007 | A1 |
20070055702 | Fridella et al. | Mar 2007 | A1 |
20070109856 | Pellicone et al. | May 2007 | A1 |
20070150689 | Pandit et al. | Jun 2007 | A1 |
20070168321 | Saito et al. | Jul 2007 | A1 |
20070220227 | Long | Sep 2007 | A1 |
20070294563 | Bose | Dec 2007 | A1 |
20070294564 | Reddin et al. | Dec 2007 | A1 |
20080005587 | Ahlquist | Jan 2008 | A1 |
20080077825 | Bello et al. | Mar 2008 | A1 |
20080162674 | Dahiya | Jul 2008 | A1 |
20080195833 | Park | Aug 2008 | A1 |
20080270678 | Cornwell et al. | Oct 2008 | A1 |
20080275921 | Gunabalasubramaniam | Nov 2008 | A1 |
20080282045 | Biswas et al. | Nov 2008 | A1 |
20090012966 | Arai | Jan 2009 | A1 |
20090077340 | Johnson et al. | Mar 2009 | A1 |
20090100115 | Park et al. | Apr 2009 | A1 |
20090198889 | Ito et al. | Aug 2009 | A1 |
20100052625 | Cagno et al. | Mar 2010 | A1 |
20100211723 | Mukaida | Aug 2010 | A1 |
20100246266 | Park et al. | Sep 2010 | A1 |
20100257142 | Murphy et al. | Oct 2010 | A1 |
20100262764 | Liu et al. | Oct 2010 | A1 |
20100325345 | Ohno et al. | Dec 2010 | A1 |
20100332754 | Lai et al. | Dec 2010 | A1 |
20110072290 | Davis et al. | Mar 2011 | A1 |
20110125955 | Chen | May 2011 | A1 |
20110131231 | Haas et al. | Jun 2011 | A1 |
20110167221 | Pangal et al. | Jul 2011 | A1 |
20120023144 | Rub | Jan 2012 | A1 |
20120054264 | Haugh et al. | Mar 2012 | A1 |
20120079318 | Colgrove et al. | Mar 2012 | A1 |
20120131253 | McKnight et al. | May 2012 | A1 |
20120303919 | Hu et al. | Nov 2012 | A1 |
20120311000 | Post et al. | Dec 2012 | A1 |
20130007845 | Chang et al. | Jan 2013 | A1 |
20130031414 | Dhuse et al. | Jan 2013 | A1 |
20130036272 | Nelson | Feb 2013 | A1 |
20130071087 | Motiwala et al. | Mar 2013 | A1 |
20130145447 | Maron | Jun 2013 | A1 |
20130191555 | Liu | Jul 2013 | A1 |
20130198459 | Joshi et al. | Aug 2013 | A1 |
20130205173 | Yoneda | Aug 2013 | A1 |
20130219164 | Hamid | Aug 2013 | A1 |
20130227201 | Talagala et al. | Aug 2013 | A1 |
20130290607 | Chang et al. | Oct 2013 | A1 |
20130311434 | Jones | Nov 2013 | A1 |
20130318297 | Jibbe et al. | Nov 2013 | A1 |
20130332614 | Brunk et al. | Dec 2013 | A1 |
20140020083 | Fetik | Jan 2014 | A1 |
20140074850 | Noel et al. | Mar 2014 | A1 |
20140082715 | Grajek et al. | Mar 2014 | A1 |
20140086146 | Kim et al. | Mar 2014 | A1 |
20140090009 | Li et al. | Mar 2014 | A1 |
20140096220 | Da Cruz Pinto et al. | Apr 2014 | A1 |
20140101434 | Senthurpandi et al. | Apr 2014 | A1 |
20140164774 | Nord et al. | Jun 2014 | A1 |
20140173232 | Reohr et al. | Jun 2014 | A1 |
20140195636 | Karve et al. | Jul 2014 | A1 |
20140201512 | Seethaler et al. | Jul 2014 | A1 |
20140201541 | Paul et al. | Jul 2014 | A1 |
20140208155 | Pan | Jul 2014 | A1 |
20140215590 | Brand | Jul 2014 | A1 |
20140229654 | Goss et al. | Aug 2014 | A1 |
20140230017 | Saib | Aug 2014 | A1 |
20140258526 | Le Sant et al. | Sep 2014 | A1 |
20140282983 | Ju et al. | Sep 2014 | A1 |
20140285917 | Cudak et al. | Sep 2014 | A1 |
20140325262 | Cooper et al. | Oct 2014 | A1 |
20140351627 | Best et al. | Nov 2014 | A1 |
20140373104 | Gaddam et al. | Dec 2014 | A1 |
20140373126 | Hussain et al. | Dec 2014 | A1 |
20150026387 | Sheredy et al. | Jan 2015 | A1 |
20150074463 | Jacoby et al. | Mar 2015 | A1 |
20150089569 | Sondhi et al. | Mar 2015 | A1 |
20150095515 | Krithivas et al. | Apr 2015 | A1 |
20150113203 | Dancho et al. | Apr 2015 | A1 |
20150121137 | McKnight et al. | Apr 2015 | A1 |
20150134920 | Anderson et al. | May 2015 | A1 |
20150149822 | Coronado et al. | May 2015 | A1 |
20150193169 | Sundaram et al. | Jul 2015 | A1 |
20150378888 | Zhang et al. | Dec 2015 | A1 |
20160098323 | Mutha et al. | Apr 2016 | A1 |
20160350009 | Cerreta et al. | Dec 2016 | A1 |
20160352720 | Hu et al. | Dec 2016 | A1 |
20160352830 | Borowiec et al. | Dec 2016 | A1 |
20160352834 | Borowiec et al. | Dec 2016 | A1 |
Number | Date | Country |
---|---|---|
0725324 | Aug 1996 | EP |
WO 2012087648 | Jun 2012 | WO |
WO2013071087 | May 2013 | WO |
WO 2014110137 | Jul 2014 | WO |
WO 2016015008 | Dec 2016 | WO |
WO 2016190938 | Dec 2016 | WO |
WO 2016195759 | Dec 2016 | WO |
WO 2016195958 | Dec 2016 | WO |
WO 2016195961 | Dec 2016 | WO |
Entry |
---|
Wikipedia, “Standard RAID levels”, 2012. (Year: 2012). |
Patterson et al., A Case for Redundant Arrays of Inexpensive Disks (RAID), Newsletter, ACM SIGMOD Record, vol. 17, No. 3, Jun. 1988, pp. 109-116, ACM New York, NY, USA. |
International Search Report and Written Opinion, PCT/US2016/058988, dated Jan. 31, 2017, 11 pages. |
Paul Sweere, Creating Storage Class Persistent Memory with NVDIMM, Published in Aug. 2013, Flash Memory Summit 2013, <http://ww.flashmemorysummit.com/English/Collaterals/Proceedings/2013/20130814_T2_Sweere.pdf>, 22 pages. |
PCMag. “Storage Array Definition”. Published May 10, 2013. <http://web.archive.org/web/20130510121646/http://www.pcmag.com/encyclopedia/term/52091/storage-array>, 2 pages. |
Google Search of “storage array define” performed by the Examiner on Nov. 4, 2015 for U.S. Appl. No. 14/725,278, Results limited to entries dated before 2012, 1 page. |
Techopedia. “What is a disk array”. Published Jan. 13, 2012. <http://web.archive.org/web/20120113053358/http://www.techopedia.com/definition/1009/disk-array>, 1 page. |
Webopedia. “What is a disk array”. Published May 26, 2011. <http://web/archive.org/web/20110526081214/http://www,webopedia.com/TERM/D/disk_array.html>, 2 pages. |
Li et al., Access Control for the Services Oriented Architecture, Proceedings of the 2007 ACM Workshop on Secure Web Services (SWS '07), Nov. 2007, pp. 9-17, ACM New York, NY. |
The International Serach Report and the Written Opinoin received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/015006, dated Apr. 29, 2016, 12 pages. |
The International Serach Report and the Written Opinoin received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/015008, dated May 4, 2016, 12 pages. |
C. Hota et al., Capability-based Cryptographic Data Access Controlin Cloud Computing, Int. J. Advanced Networking and Applications, Colume 1, Issue 1, dated Aug. 2011, 10 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/020410, dated Jul. 8, 2016, 17 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/032084, dated Jul. 18, 2016, 12 pages. |
Faith, “dictzip file format”, GitHub.com (online). [accessed Jul. 28, 2015], 1 page, URL: https://github.com/fidlej/idzip. |
Wikipedia, “Convergent Encryption”, Wikipedia.org (online), accessed Sep. 8, 2015, 2 pages, URL: en.wikipedia.org/wiki/Convergent_encryption. |
Storer et al., “Secure Data Duplication”, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS'08), Oct. 2008, 10 pages, ACM New York, NY. USA. DOI: 10.1145/1456469.1456471. |
The International Serach Report and the Written Opinoin received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/016333, dated Jun. 8, 2016, 12 pages. |
ETSI, Network Function Virtualisation (NFV); Resiliency Requirements, ETSI GS NFCV-REL 001, V1.1.1, http://www.etsi.org/deliver/etsi_gs/NFV-REL/001_099/001/01.01.01_60/gs_NFV-REL001v010101p.pdf (online), dated Jan. 2015, 82 pages. |
The International Search Report and the Written Opinoin received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/032052, dated Aug. 30, 2016, 17 pages. |
Microsoft, “Hybrid for SharePoint Server 2013—Security Reference Architecture”, <http://hybrid.office.com/img/Security_Reference Architecture.pdf> (online), dated Oct. 2014, 53 pages. |
Microsoft, “Hybrid Identity”, <http://aka.ms/HybridIdentityWp> (online), dated Apr. 2014, 36 pages. |
Microsoft, “Hybrid Identity Management”, <http://download.microsoft.com/download/E/A/E/EAE57CD1-A80B-423C-96BB-142FAAC630B9/Hybrid_Identity_Datasheet.pdf> (online), published Apr. 2014, 17 pages. |
Jacob Bellamy-McIntyre et al., “OpenID and the EnterpriseL a Model-based Analysis of Single Sign-On Authentication”, 2011 15th IEEE International Enterprise Distributed Object Computing Conference (EDOC), DOI: 10.1109/EDOC.2011.26, ISBN: 978-1-4577-0362-1, <https://www.cs.auckland.ac.nz/˜lutteroth/publications/McIntyreLutterothWeber2011-OpenID.pdf> (online), dated Aug. 29, 2011, 10 pages. |
The International Search Report and the Written Opinoin received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/035492, dated Aug. 17, 2016, 10 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EPO) for International Application No. PCT/US2016/036693, dated Aug. 29, 2016, 10 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/038758, dated Oct. 7, 2016, 10 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/040393, dated Sep. 22, 2016, 10 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/044020, dated Sep. 30, 2016, 11 pages. |
Kwok Kong, Using PCI Express as the Primary System Interconnect in Multiroot Compute, Storage, Communications and Embedded Systems, IDT, White Paper, <http://www.idt.com/document/whp/idt-pcie-multi-root-white-paper>, retrieved by WIPO Dec. 4, 2014, dated Aug. 28, 2008, 12 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/044874, dated Oct. 7, 2016, 11 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/044875, dated Oct. 5, 2016, 13 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/044876, dated Oct. 21, 2016, 12 pages. |
The International Search Report and the Written Opinion received from the International Searching Authority (ISA/EP) for International Application No. PCT/US2016/044877, dated Sep. 29, 2016, 13 pages. |
Xiao-Yu Hu et al., Container Marking: Combining Data Placement, Garbage Collection and Wear Levelling for Flash, 19th Annual IEEE International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunications Systems, ISBN: 978-0/7695-4430-4, DOI: 10.1109/MASCOTS.2011.50, dated Jul. 25-27, 2011, 11 pages. |
Number | Date | Country | |
---|---|---|---|
20170123926 A1 | May 2017 | US |