Securely moving data across boundaries
Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Winter, Daniel Keith Gopal, Burra Narayan, Shyam Oliver, David Charles Fanaru, Adrian Rupke, James Manek, Parul |
description | Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10261943B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10261943B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10261943B23</originalsourceid><addsrcrecordid>eNrjZFALTk0uLUrNqVTIzS_LzEtXSEksSVRITC7KLy5WSMovzUtJLMpMLeZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGRmaGlibGTkbGxKgBAId7J-I</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Securely moving data across boundaries</title><source>esp@cenet</source><creator>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</creator><creatorcontrib>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</creatorcontrib><description>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190416&DB=EPODOC&CC=US&NR=10261943B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190416&DB=EPODOC&CC=US&NR=10261943B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Winter, Daniel Keith</creatorcontrib><creatorcontrib>Gopal, Burra</creatorcontrib><creatorcontrib>Narayan, Shyam</creatorcontrib><creatorcontrib>Oliver, David Charles</creatorcontrib><creatorcontrib>Fanaru, Adrian</creatorcontrib><creatorcontrib>Rupke, James</creatorcontrib><creatorcontrib>Manek, Parul</creatorcontrib><title>Securely moving data across boundaries</title><description>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFALTk0uLUrNqVTIzS_LzEtXSEksSVRITC7KLy5WSMovzUtJLMpMLeZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGRmaGlibGTkbGxKgBAId7J-I</recordid><startdate>20190416</startdate><enddate>20190416</enddate><creator>Winter, Daniel Keith</creator><creator>Gopal, Burra</creator><creator>Narayan, Shyam</creator><creator>Oliver, David Charles</creator><creator>Fanaru, Adrian</creator><creator>Rupke, James</creator><creator>Manek, Parul</creator><scope>EVB</scope></search><sort><creationdate>20190416</creationdate><title>Securely moving data across boundaries</title><author>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10261943B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Winter, Daniel Keith</creatorcontrib><creatorcontrib>Gopal, Burra</creatorcontrib><creatorcontrib>Narayan, Shyam</creatorcontrib><creatorcontrib>Oliver, David Charles</creatorcontrib><creatorcontrib>Fanaru, Adrian</creatorcontrib><creatorcontrib>Rupke, James</creatorcontrib><creatorcontrib>Manek, Parul</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Winter, Daniel Keith</au><au>Gopal, Burra</au><au>Narayan, Shyam</au><au>Oliver, David Charles</au><au>Fanaru, Adrian</au><au>Rupke, James</au><au>Manek, Parul</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Securely moving data across boundaries</title><date>2019-04-16</date><risdate>2019</risdate><abstract>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10261943B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Securely moving data across boundaries |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T10%3A45%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Winter,%20Daniel%20Keith&rft.date=2019-04-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10261943B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |