1653 patents
Utility
Ingesting and Storing Data in a Massive Data Ingestion System
22 Feb 24
A method for execution by one or more computing devices of a massive data ingestion system includes receiving data for storage in the massive data ingestion system.
S. Christopher Gladwin, Greg R. Dhuse, Timothy W. Markison, Wesley B. Leggette, Jason K. Resch, Gary W. Grube
Filed: 1 Nov 23
Utility
Efficient memory dump
13 Feb 24
A method of operating a storage unit having non-volatile random-access memory (NVRAM) and solid-state memory is provided.
Yuhong Mao, Russell Sears
Filed: 22 Jul 21
Utility
Expanding an address space supported by a storage system
13 Feb 24
An apparatus, method, and computer-readable storage medium for allowing a block-addressable storage device to provide a sparse address space to a host computer.
Ethan Miller, John Colgrove, John Hayes
Filed: 22 Oct 21
Utility
Deterministic searching using compressed indexes
6 Feb 24
A computing or storage system constructs a table in memory, and constructs a summary table that summarizes the table.
John Colgrove, Ethan L. Miller
Filed: 22 Apr 22
Utility
Data deletion for a multi-tenant environment
6 Feb 24
A method of secure data deletion in a multitenant environment, performed by a storage system is provided.
Andrew Miller, Reena Gupta
Filed: 14 Oct 19
Utility
Storing encrypted chunksets of data in a vast storage network
6 Feb 24
A method for execution by one or more processing modules of one or more computing devices begins by encoding data using a dispersed storage error encoding function to produce a plurality of sets of encoded data slices arranged into a plurality of chunksets of encoded data slices.
Andrew D. Baptist, Greg R. Dhuse, Wesley B. Leggette, Jason K. Resch
Filed: 30 Sep 22
Utility
Prioritizing locations for error scanning in a storage network
6 Feb 24
A method includes obtaining, by a computing device of a storage network, provenance information for data associated with a set of storage units of the storage network, where the data is error encoded into a set of encoded data slices, in accordance with error encoding parameters, for storage in the set of storage units.
Ahmad Alnafoosi, Jason K. Resch
Filed: 29 Oct 21
Utility
Coordinated checkpoints among storage systems implementing checkpoint-based replication
6 Feb 24
Coordinated checkpoints among storage systems implementing checkpoint-based replication, including orchestrating one or more coordinated lightweight checkpoints for a source dataset stored across two or more source storage systems; and coordinating a replication of the one or more coordinated lightweight checkpoints from the two or more source storage systems to two or more target storage systems.
Ronald Karr
Filed: 27 Apr 22
Utility
Accessing Metadata Storage Trees in a Storage Network
25 Jan 24
A method includes error encoding data to produce a plurality of data slices.
Renars W. Narubin, Jason K. Resch, Gary W. Grube
Filed: 5 Oct 23
Utility
Encoding and Encrypting Data in a Storage Network
25 Jan 24
A storage network operates by: receiving a encoded data slice for storage by the storage network, wherein the encoded data slice is associated with a vault; generating a encryption key corresponding to the encoded data slice based on a vault identifier associated with the vault; utilizing the encryption key to generate a encrypted data slice and that corresponds to, and is based on, the encoded data slice; storing the encrypted data slice in a storage unit of the storage network; receiving a request to retrieve the encoded data slice; retrieving the encrypted data slice corresponding to the encoded data slice from the storage unit of the storage network; generating a decryption key corresponding to the encoded data slice based on the vault identifier, wherein the decryption key is different from the encryption key; and regenerating the encoded data slice using the decryption key.
Scott M. Horan, Wesley B. Leggette, Jason K. Resch
Filed: 2 Oct 23
Utility
Optimizing Dataset Transformations For Use By Machine Learning Models
25 Jan 24
Generating a transformed dataset for use by a machine learning model in an artificial intelligence infrastructure that includes one or more storage systems and one or more graphical processing unit (‘GPU’) servers, including: storing, within one or more storage systems, a transformed dataset generated by applying one or more transformations to a dataset that are identified based on one or more expected input formats of data received as input data by one or more machine learning models to be executed on one or more servers; and transmitting, from the one or more storage systems to the one or more servers without reapplying the one or more transformations on the dataset, the transformed dataset including data in the one or more expected formats of data to be received as input data by the one or more machine learning models.
BRIAN GOLD, EMILY WATKINS, IVAN JIBAJA, IGOR OSTROVSKY, ROY KIM
Filed: 12 Sep 23
Utility
Managed Run-time Environment-based Detection of a Ransomware Attack
25 Jan 24
An illustrative method includes a data protection system detecting an anomaly associated with a managed run-time environment; determining, based on the detecting the anomaly, that the managed run-time environment is possibly being targeted by a security threat; and performing, based on the determining that the managed run-time environment is possibly being targeted by the security threat, a remedial action associated with the managed run-time environment.
Paulo Marcon, Romulo Gelinger Maciel, Ronald Karr
Filed: 14 Aug 23
Utility
Writing Data to a Distributed Storage System
18 Jan 24
A storage array controller may receive a write request comprising data to be stored at one or more solid-state storage devices.
GORDON JAMES COLEMAN, ERIC SEPPANEN
Filed: 27 Jul 23
Utility
Intelligent Subsegment Formation In a Heterogeneous Storage System
18 Jan 24
A data segment to be written to a set of storage devices is identified, wherein at least one storage device of the set of storage devices has a first allocation unit size that is larger than a second allocation unit size of other storage devices of the set of storage devices.
SANKARA VAIDEESWARAN, JEFFREY TOFANO, YING GAO
Filed: 29 Sep 23
Utility
Preserved Addressing For Replaceable Resources
18 Jan 24
A method for preserving a media access control (MAC) address of a virtual server is provided.
John HAYES, Par BOTES, Robert LEE, Peter VAJGEL
Filed: 24 Jul 23
Utility
Recovering a container storage system
16 Jan 24
Recovery of a container storage provider, including: storing, within a first database, configuration information related to the container storage provider; storing, within a second database, the configuration information; and responsive to detecting that one or more components associated with the container storage provider have become unavailable, creating a replacement component using configuration information contained in the second database.
Simon Dodsley, Remko Deenik, Jon Owings, Sergey Zhuravlev, Joshua Robinson
Filed: 20 May 22
Utility
Monitoring a Power Connection Topology of a Data Center
11 Jan 24
An exemplary method includes accessing information associated with a power supply connection between a plurality of power distribution units and a plurality of power converters of a data center appliance, determining, based on the information, a current power connection topology of the plurality of power converters of the data center appliance with respect to the plurality of power distribution units, analyzing the current power connection topology to determine whether the current power connection topology satisfies predefined operating parameters for the data center appliance and the plurality of power distribution units, and performing, based on the analyzing of the current power connection topology, an action associated with the power supply connection between the plurality of power converters and the plurality of power distribution units.
Gregory McNutt
Filed: 11 Jul 22
Utility
Scaling Storage Resources Based On Storage Volume Usage
11 Jan 24
Scaling storage resources in a storage volume, including: monitoring a usage of a volume in a storage pool that includes one or more cloud-based storage systems; determining that the usage of the volume exceeds a threshold usage; and based on the determination, expanding the resources that are included in the storage pool for servicing the volume, including: instantiating one or more new virtual drives that are included in the one or more cloud-based storage systems; and adding the one or more new virtual drives to the storage pool.
TAHER VOHRA, PAR BOTES, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 19 Sep 23
Utility
Indirect Dataset Replication To Cloud-Based Targets
11 Jan 24
Systems, methods, and computer readable storage mediums for performing remote replication including receiving, by a target storage system, an indication that a dataset stored on a source storage system will be replicated to the target storage system; identifying, by the target storage system, portions of the dataset that are not already stored on the target storage system; and initiating, by the target storage system, replication of one or more of the portions of the dataset that are not already stored on the target storage system from a source other than the source storage system.
BENJAMIN BOROWIEC, STEVE HODGSON, ETHAN L. MILLER
Filed: 22 Sep 23
Utility
Guaranteeing Physical Deletion of Data in a Storage System
11 Jan 24
A system with storage memory and a processing device has a logical deletion to physical erasure time bound.
IGOR OSTROVSKY, CONSTANTINE P. SAPUNTZAKIS, PETER E. KIRKPATRICK, JOHN COLGROVE
Filed: 23 Aug 23