1653 patents
Page 11 of 83
Utility
Modify access restrictions in response to a possible attack against data stored by a storage system
12 Sep 23
An illustrative method includes a data protection system determining that data stored by a storage system is under a possible attack, detecting a modify request with respect to the storage system while the data stored by the storage system is under the possible attack, determining that the modify request may be related to the possible attack, and performing, in response to determining that the modify request may be related to the possible attack, a remedial action with respect to the modify request.
Roy Child, Ronald Karr
Filed: 19 Oct 20
Utility
Managing Memory Devices in a Storage Network
7 Sep 23
A method for managing memory in a storage network begins by monitoring a service life indicator for a plurality of solid-state memory devices in the storage network and determining whether a memory device of the plurality of solid-state memory devices is approaching an end-of-life event, where end-of-life event is based on a predetermined service life.
Gary W. Grube, Jason K. Resch, Timothy W. Markison, Ilya Volvovski, Manish Motwani
Filed: 9 May 23
Utility
Allocation Of Differing Erase Block Sizes
7 Sep 23
A method for rebuilding data when changing erase block sizes in a storage system is provided.
ANDREW R. BERNAT, TIMOTHY W. BRENNAN, MARK L. McAULIFFE, NEIL BUDA VACHHARAJANI
Filed: 13 Mar 23
Utility
Load Balancing For A Storage System
7 Sep 23
A method for deleting a set of keys from a storage server is provided.
ETHAN MILLER, JOHN COLGROVE, JOHN HAYES
Filed: 12 May 23
Utility
Device Host Operations In A Storage System
7 Sep 23
A storage system is provided.
HARI KANNAN, YING GAO, BORIS FEIGIN, ROBERT LEE
Filed: 1 Mar 23
Utility
Establishing A Guarantee For Maintaining A Replication Relationship Between Object Stores During A Communications Outage
7 Sep 23
Establishing a guarantee for maintaining a replication relationship between object stores during a communications outage, an embodiment including identifying, by a first storage system, respective local clock values of one or more second storage systems, wherein the first storage system and the one or more second storage systems are among a plurality of storage systems replicating an object store, wherein the plurality of storage systems are configured to receive requests directed to the replicated object store; determining, by the first storage system in dependence upon the respective local clock values, respective clock differences of the one or more second storage systems relative to the first storage system; and ordering, by the first storage system, one or more updates to the replicated object store in dependence upon the respective clock differences.
RONALD KARR, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 9 Jan 23
Utility
Mount path management for virtual storage volumes in a containerized storage environment
5 Sep 23
An illustrative method includes determining whether a virtual storage volume is successfully mounted to a mount path associated with a compute node, the mount path being marked as read-only, marking, if the determining includes determining that the virtual storage volume is successfully mounted to the mount path, the mount path as writable, and maintaining, if the determining includes determining that the virtual storage volume is unsuccessfully mounted to the mount path, the mount path as read-only.
Dinesh Israni, Harsh Desai, Goutham Rao, Vinod Jayaraman
Filed: 6 Apr 21
Utility
Storage system metric optimization for container orchestrators
5 Sep 23
An illustrative method includes receiving, by an integrated storage manager from an operating system level virtualization service, a request to perform an operation with respect to one or more storage systems; determining, by the integrated storage manager, multiple versions of a performance impact among the one or more storage systems based on potentially implementing the request in multiple ways; and implementing, by the integrated storage manager based on the determining of the multiple versions of the performance impact, the request in a particular way that improves one or more storage system metrics of the one or more storage systems.
Patrick East
Filed: 17 Nov 20
Utility
Utilizing different data compression algorithms based on characteristics of a storage system
5 Sep 23
Utilizing different data compression algorithms based on characteristics of a storage system, including: selecting, in dependence upon a priority for conserving processing resources or storage resources in a storage system, a data compression algorithm to utilize to compress data; detecting that at least one of an amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed; and responsive to detecting that at least one of the amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed, selecting a different data compression algorithm to utilize to compress data.
Ethan Miller, John Colgrove, Joern Engel, Christopher Golden, Naveen Neelakantam
Filed: 17 Jun 22
Utility
Restoring Lost Data
31 Aug 23
Restoring lost data including detecting that a portion of the dataset stored in a first storage system has become unavailable, obtaining an identifier for the portion of the dataset, locating, using the identifier, a replacement portion of the dataset that is stored at one or more other storage systems, and writing, to the dataset that is stored in the first storage system, the replacement portion of the dataset as a replacement of the portion of the dataset that has become unavailable, where the writing occurs automatically, without user intervention.
MATTHEW FAY, JOHN COLGROVE, ETHAN MILLER
Filed: 28 Jan 22
Utility
Storage Optimization for Serverless Functions
31 Aug 23
An illustrative method includes a storage-aware serverless function management system determining a status of a serverless system that implements one or more serverless functions configured to access one or more components of a storage system, determining a utilization of the storage system, and requesting that the storage system adjust storage of data in the storage system based on the status of the serverless system and the utilization of the storage system.
Taher Vohra, Luis Pablo Pabón
Filed: 4 May 23
Utility
Data Block Allocation For Storage System
31 Aug 23
A system and method for managing tables in a storage system is described.
JOHN COLGROVE, JOSEPH S. HASBANI, JOHN HAYES, ETHAN MILLER, CARY SANDVIG
Filed: 3 May 23
Utility
Partitioning Data Into Chunk Groupings For Use In A Dispersed Storage Network
31 Aug 23
A computing device for use in a storage network includes one or more network interfaces, memory with operational instructions and a processing module.
Greg R. Dhuse, Jason K. Resch
Filed: 9 May 23
Utility
Lightweight Copying Of Data Using Metadata References
31 Aug 23
A system and method comprising: receiving a request to write data stored at a first range of a first volume to a second range of a second volume, where first metadata for the first range of the first volume is associated with a range of physical addresses where the data is stored in the storage system; and responsive to receiving the request: creating second metadata for the second range of the second volume, wherein the second metadata is associated with the range of physical addresses where the data is stored in the storage system; and associating the second volume with the second metadata.
ETHAN MILLER, JIANTING CAO, JOHN COLGROVE, CHRISTOPHER GOLDEN, JOHN HAYES, CARY SANDVIG, GRIGORI INOZEMTSEV
Filed: 5 May 23
Utility
Storage Cache Management
31 Aug 23
A method of cache management, the method comprising: identifying, among a plurality of storage items, storage items having an access count above a first threshold to generate a set of storage items; identifying, among the set of storage items, storage items having an updated access count above a second threshold to generate a subset of storage items, wherein, for each storage item, the updated access count is dependent upon a number of accesses subsequent to generating the set of storage items; and adding the storage items of the subset of storage items to a cache.
ETHAN MILLER, JOHN COLGROVE
Filed: 28 Jan 22
Utility
Multilevel Load Balancing
31 Aug 23
A storage system is provided.
PRABHATH SAJEEPA, DANIEL TALAYCO, QING YANG, ROBERT LEE
Filed: 4 May 23
Utility
Traffic Priority Based Creation of a Storage Volume within a Cluster of Storage Nodes
31 Aug 23
An illustrative method includes receiving a request to create a storage volume; identifying, based on the request and on a configuration file propagated among a plurality of storage nodes in a cluster, status indicators of the storage nodes; identifying, based on the request, a size of the storage volume; identifying, based on the request, a replication factor representing a number of storage nodes that are to be replicated within a cluster for the storage volume; identifying, based on one or more characteristics associated with the storage volume, a traffic priority for the storage volume, the traffic priority representing a hierarchy that determines and prioritizes which traffic is allocated to available hardware and network resources in a particular order; creating, based on the status indicators, the size, the replication factor, and the traffic priority, the storage volume on one or more of the plurality of storage nodes.
Goutham Rao, Vinod Jayaraman, Ganesh Sangle
Filed: 8 May 23
Utility
Dynamic volume storage adjustment
22 Aug 23
A virtual storage volume that includes storage space on potentially many different physical disks may be implemented as one or more chunks.
Ganesh Sangle, Vinod Jayaraman
Filed: 25 Feb 21
Utility
Heterogeneous storage with preserved addressing
22 Aug 23
A method for preserving a media access control (MAC) address of a virtual server is provided.
John Hayes, Par Botes, Robert Lee, Peter Vajgel
Filed: 12 Nov 21
Utility
Decrypting secure packages in a storage network
22 Aug 23
A method for execution by a computing device of a storage network includes dispersed storage error decoding a plurality of sets of encoded data slices to recover a plurality of secure packages, where the plurality of secure packages include a plurality of encrypted data segments and a plurality of sets of encoded key slices, and where encoded key slices are appended to the encrypted data segments in accordance with an appending approach.
Gary W. Grube, Timothy W. Markison
Filed: 10 Mar 21