The patent's assignee for patent number 8818964 is
News editors obtained the following quote from the background information supplied by the inventors: "Recent advances in information technology have lead to the proliferation of data management operations such as data encryption, data deduplication and data compression.
"Data compression is the process of encoding information using fewer bits than an unencoded representation would use. Data deduplication generally refers to the elimination of redundant subfiles (e.g. blocks, chunks, or extents) from data objects. Data deduplication and data compression are data management technologies that are useful to reduce the consumption of expensive resources, such as storage space and transmission bandwidth.
"Data encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge (e.g. a key). Data encryption is used to protect data where it is stored as well as while the data is in transit. For example, data encryption may protect data as it is being transferred via networks.
"Administrators are tasked with developing security and data reduction strategies utilizing the data management operations of encryption, deduplication, and compression to optimize the computing environment. Each component of the computing environment may be under the responsibility of a different administrator (e.g. the system/application administrator, a network administrator, a storage administrator, a security administrator, server administrator, etc.). In most cases, the administrator for one domain does not have sufficient information about the data management operations and the data flow topology at the other domains. As a result, the data management operations applied in one domain may be redundant in light of data management operations applied at another domain, or even in certain circumstances, the data management operations in one data component may be in contention with other data management operations."
As a supplement to the background information on this patent, VerticalNews correspondents also obtained the inventors' summary information for this patent: "Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy. After the analysis, the management system provides recommendations to optimize the computing environment through the reconfiguration of the data management operation configuration and reconfigures the data management operation configuration to optimize the computing environment.
"For example, an embodiment of a computer implemented method for data management in a computing environment includes discovering data components of the computing environment, such that at least one data component performs a data management operation. The method also creates a data flow topology representing a data path through the data components. Further, the method optimizes the data path by analyzing the data flow topology.
"In yet another embodiment, the method for data management in a computing environment analyzes a data flow topology of data components within the computing environment. The data flow topology includes an order of the data management operations performed on the data. The method evaluates the data flow topology in view of data management policy and determines an optimal sequence of the data management operations within the computing environment.
"In an embodiment of a computing environment, the environment includes memory coupled to a processor of a management system. The memory includes instructions implemented by the processor to discover data components of the computing environment, such that each data component performs a data management operation. Further, the environment creates a data flow topology representing a data path through the data components and optimizes the data path by analyzing the data flow topology.
"In another embodiment of a computing environment, the environment includes memory coupled to a processor of a management system. The memory includes instructions implemented by the process to analyze a data flow topology of the data components with the computing environment, such that the data flow topology includes an order of data management operations performed on the data. Further, the environment evaluates the data flow topology in view of the data management policy and determines an optimal sequence of data management operations within the computing environment."
For additional information on this patent, see: Tevis,
Keywords for this news article include: Information Technology, Information and Data Architecture, Information and Data Compression, Information and Data Encoding and Encryption, Information and Data Management,
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Businesses, Investors Pressing for Green Policy
- 'The Voice' Sounds Different This Season
- NSHMBA to Rebrand With New Name, Logo
- Lower Used-Car Prices Roil the Auto Industry
- Chrysler and Google Launch Virtual Plant Tour
- Perry Wants to Skip Court for Foreign Trip
- Investors Fret Yahoo's Future, Stock Dips
- Liberty Power Helps USHCC Go Green
- Iran Digs in on Underground Nuclear Site
- Hispanic Designer Honored As Rising Star