1653 patents
Page 22 of 83
Utility
Tuning Storage Devices
9 Mar 23
Tuning information associated with a storage device of a plurality of storage devices is received.
Yang Sup Lee, Frank Tuzzolino, Douglas Lother, Casey Golliher
Filed: 11 Nov 22
Utility
Determining a performance threshold for a write operation
7 Mar 23
A method for execution by a computing device of a storage network includes obtaining storage performance information for a set of storage units of the storage network, where data segments are dispersed storage error encoded into pluralities of sets of encoded data slices in accordance with error encoding parameters that include a pillar width number and a decode threshold number, which is a number of encoded data slices the set of encode data slices is required to reconstruct a data segment of data segments.
Greg R. Dhuse, Jason K. Resch, Andrew D. Baptist, Ilya Volvovski
Filed: 28 May 21
Utility
Relocation of Data for Heterogeneous Storage Systems
2 Mar 23
A command to relocate data is transmitted by a storage controller.
Andrew R. Bernat, Peter E. Kirkpatrick, Gordon James Coleman, Wei Tang, John Roper
Filed: 4 Nov 22
Utility
Partial Task Processing with Data Slice Errors
2 Mar 23
A storage network receives data and a corresponding task, selects a storage units for the task, determines whether the data slice is locally available and when the data slice is not locally available, determines whether a redundant data slice is available from another storage unit.
Greg R. Dhuse, Jason K. Resch
Filed: 13 Oct 22
Utility
Encryption Indicator-based Retention of Recovery Datasets for a Storage System
2 Mar 23
An illustrative method includes determining an encryption indicator for a first recovery dataset by determining a difference in an amount or percentage of incompressible data associated with the first recovery dataset compared to an amount or percentage of incompressible data associated with a second recovery dataset that temporally precedes the first recovery dataset, the encryption indicator representative of data within or represented by the first recovery dataset that cannot be compressed more than a threshold amount; and performing, based on the encryption indicator for the first recovery dataset, an action with respect to the second recovery dataset, wherein the second recovery dataset is usable to restore data maintained by a storage system to a second state corresponding to a second point in time that temporally precedes a first point in time corresponding to the first recovery dataset.
Benjamin P. Borowiec, Ronald Karr
Filed: 3 Nov 22
Utility
CorrectedUtilizing Metadata Storage Trees in a Vast Storage Network
2 Mar 23
A method includes receiving data for storage and encoding the data to produce a plurality of data slices.
Renars W. Narubin, Jason K. Resch, Gary W. Grube
Filed: 7 Jun 22
Utility
Cloud-Based User Authorization Control For Storage System Access
2 Mar 23
Providing authorization and authentication in a cloud for a user of a storage array includes: receiving, by a storage array access module from a client-side array services module, a token representing authentication of user credentials and authorized access privileges defining one or more storage array services accessible by the user, where the token is generated by a cloud-based security module upon authentication of the user credentials and identification of authorized access privileges for the user; receiving, by the storage array access module from the user, a user access request to one or more storage array services; and determining, by the storage array access module, whether to grant the user access request in dependence upon the authorized access privileges represented by the token.
JIMMY T. HU, BENJAMIN BOROWIEC, ETHAN MILLER, TERENCE NOONAN, CONSTANTINE SAPUNTZAKIS, NEIL VACHHARAJANI, DAQUAN ZUO
Filed: 8 Nov 22
Utility
Mapping LUNs in a storage memory
28 Feb 23
A method for mapping LUNs (logical unit numbers) in storage memory, performed by a storage system, is provided.
Russell Sears
Filed: 28 Apr 21
Utility
Converting raid data between persistent storage types
28 Feb 23
Converting RAID data between persistent storage types, including: for each portion of a RAID shard of a RAID stripe: writing, to a respective plurality of source solid state drives, the portion of the RAID shard; detecting that all portions of the RAID shard have been successfully written; copying, from one of the plurality of source solid state drives to a respective target solid state drive among a plurality of target solid state drives from one of the plurality of source solid state drives, the RAID shard, where the RAID shard is copied from a source solid state drive that is different from where each other RAID shard of the RAID stripe is copied from.
Timothy Brennan, Constantine Sapuntzakis
Filed: 7 Sep 17
Utility
Protection of objects in an object store from deletion or overwriting
28 Feb 23
An illustrative method includes an object retention management system establishing a retention policy for a bucket of an object-based storage system, detecting an operation that causes an object to be stored within the bucket, and applying, based on the detecting of the operation, the retention policy to the object, the retention policy preventing the object from being deleted or overwritten for a predefined time duration.
Shao-Ting Chang, Nicholas Yang, Ronald Karr
Filed: 26 Jan 21
Utility
Identifying a parent event associated with child error states
28 Feb 23
Event records from multiple computing devices are received at a managing unit.
Greg R. Dhuse, Yogesh R. Vedpathak
Filed: 21 Apr 21
Utility
Staging data within a unified storage element
28 Feb 23
Staging data on a storage element integrating fast durable storage and bulk durable storage, including: receiving, at a storage element integrating fast durable storage and bulk durable storage, a data storage operation from a host computer; storing data corresponding to the data storage operation within fast durable storage in accordance with a first data resiliency technique; and responsive to detecting a condition for transferring data between fast durable storage and bulk durable storage, transferring the data from fast durable storage to bulk durable storage in accordance with a second data resiliency technique.
Ronald Karr, Constantine Sapuntzakis, John Colgrove
Filed: 30 Apr 18
Utility
Cloud-based providing of one or more corrective measures for a storage system
28 Feb 23
An illustrative method includes detecting, by a cloud based storage system services provider based on a problem signature, that a storage system has experienced a problem that is associated with the problem signature; and deploying, without user intervention, one or more corrective measures that modify the storage system to resolve the problem.
Patrick Lee, Vinay Perneti, Sergey Zhuravlev, John Colgrove
Filed: 11 Jun 21
Utility
Coexisting differing erasure codes
28 Feb 23
A method for proactively rebuilding user data in a plurality of storage nodes of a storage cluster is provided.
John Martin Hayes, John Colgrove, Robert Lee, Igor Ostrovsky, Joshua P. Robinson
Filed: 21 May 21
Utility
Verifying and Migrating Data Slices in a Storage Network
23 Feb 23
A method for execution by a storage network includes receiving a request pertaining to a data object.
Ahmad Alnafoosi, Andrew D. Baptist, Greg R. Dhuse, Jason K. Resch, Ilya Volvovski
Filed: 21 Oct 22
Utility
Generating Recovered Data in a Storage Network
23 Feb 23
A storage network operates by: issuing a read threshold number of read slice requests to storage units of a set of storage units, where the read threshold number of read slice requests identifies a read threshold number of encoded slices of a set of encoded slices corresponding to a data segment; when one or more other encoded data slices of the read threshold number of encoded slices is not received within a time threshold, facilitating receiving a decode threshold number of encoded slices of the set of encoded slices; decoding the decode threshold number of encoded slices to produce recovered encoded data slices, wherein a number of the recovered encoded data slices corresponds to the read threshold number minus a number of the encoded slices received within the time threshold; and outputting the recovered encoded data slices and the encoded slices of the read threshold number of encoded slices received within the time threshold.
Bruno H. Cabral, Wesley B. Leggette
Filed: 11 Oct 22
Utility
Tiered Caching of Data In a Storage System
23 Feb 23
A first read request for data stored at a non-volatile memory is received by a primary storage controller.
Riley Thomasson, Manpreet Singh, Mohit Gupta, Joshua Freilich
Filed: 28 Oct 22
Utility
Distribution of Resources for a Storage System
23 Feb 23
A method for managing processing power in a storage system is provided.
JOHN MARTIN HAYES, ROBERT LEE, JOHN COLGROVE, JOHN D. DAVIS
Filed: 4 Nov 22
Utility
Generating Recovery Information Using Data Redundancy
23 Feb 23
Continuous value data redundancy, including: receiving, by a storage system, a dataset; determining, based on a data resiliency metric, an integer redundancy value for the dataset from among a plurality of redundancy values; and generating, based on the integer redundancy value for the dataset, data recovery information for the dataset, wherein the integer redundancy value for the dataset is different from at least one other integer redundancy value for another dataset stored within the storage system.
TIMOTHY BRENNAN, ANDREW BERNAT, PETER KIRKPATRICK, WEI TANG
Filed: 3 Nov 22
Utility
Tracking storage consumption in a storage array
21 Feb 23
Attributing consumed storage capacity among entities storing data in a storage array includes: identifying a data object stored in the storage array and shared by a plurality of entities, where the data object occupies an amount of storage capacity of the storage array; and attributing to each entity a fractional portion of the amount of storage capacity occupied by the data object.
Jianting Cao, Martin Harriman, John Hayes, Cary Sandvig
Filed: 30 Oct 20