1701 patents
Page 30 of 86
Utility
Optimizing Access Performance in a Distributed Storage Network
8 Dec 22
A method begins by a computing device of a storage network receiving a storage network access request and determining whether the storage network access request requires multiple access steps to a plurality of storage units, where a data segment of the plurality of data segments is dispersed error encoded in accordance with dispersed storage error encoding parameters to produce a set of encoded data slices that are distributedly stored among a plurality of storage units, and where a decode threshold number of encoded data slices are needed to recover the data segment.
Greg R. Dhuse, Jason K. Resch
Filed: 16 Aug 22
Utility
Storing a Data Object as Data Regions in a Storage Network
8 Dec 22
A method for execution by a computing device of a storage network begins by receiving a write request for a data object, determining a plurality of data regions for the data object, determining storage identification information for each data region of the plurality of data regions and generating a storage table for the data object that includes information sufficient to identify each data region of the plurality of data regions.
Wesley B. Leggette, Jason K. Resch, Yogesh R. Vedpathak, Sebastien Vas, Eric G. Smith, Adam M. Gray
Filed: 12 Aug 22
Utility
Software Lifecycle Management For A Storage System
8 Dec 22
Software lifecycle management for a storage system, including: generating, based on user input, a user-defined software lifecycle management policy for software on one or more storage systems; identifying, in dependence upon on a software configuration of the one or more storage systems, one or more candidate updates for the software; and generating, in dependence upon the user-defined software lifecycle management policy, lifecycle management data that identifies one or more conforming updates from among the one or more candidate updates.
PRAKASH DARJI, FARHAN ABROL
Filed: 31 Jul 22
Utility
Optimized relocation of data based on data characteristics
6 Dec 22
A command is transmitted to a storage device to relocate first data that partially fills a first erase block of the storage device and second data that partially fills a second erase block of the storage device to a third erase block of the storage device, wherein the command causes the relocation of the first data and the second data while bypassing sending the data to the storage controller.
Zoltan DeWitt, Gordon James Coleman, Benjamin Scholbrock, Rongjin Qiao
Filed: 20 Jul 21
Utility
Weighted resource allocation for workload scheduling
6 Dec 22
Ensuring the appropriate utilization of system resources using weighted workload based, time-independent scheduling, including: receiving an I/O request associated with an entity; determining whether an amount of system resources required to service the I/O request is greater than an amount of available system resources in a storage system; responsive to determining that the amount of system resources required to service the I/O request is greater than the amount of available system resources in the storage system: queueing the I/O request in an entity-specific queue for the entity; detecting that additional system resources in the storage system have become available; and issuing an I/O request from an entity-specific queue for an entity that has a highest priority, where a priority for each entity is determined based on the amount of I/O requests associated with the entity and a weighted proportion of resources designated for use by the entity.
Yuval Frandzel, Kiron Vijayasankar
Filed: 26 Oct 20
Utility
Optimizing performance for synchronous workloads
6 Dec 22
A synchronous write operation is decomposed into an asynchronous write operation and a separate flush operation.
Vinod Jayaraman, Prabir Paul
Filed: 25 Feb 21
Utility
Storage system snapshot retention based on encrypted data
6 Dec 22
An illustrative method includes a data protection system determining an encryption indicator for a first recovery dataset associated with a storage system, the encryption indicator representative of a likelihood that a threshold amount of data associated with the first recovery dataset is encrypted; and performing, based on the encryption indicator for the first recovery dataset, an action with respect to a second recovery dataset associated with the storage system.
Benjamin P Borowiec, Ronald Karr
Filed: 28 Jan 21
Utility
Reducing metadata for volumes
6 Dec 22
A method of volume compressed header identification includes reading, by a processing device of a host, compressible data on a sector of a storage volume of a storage array.
Yuval Frandzel, Kiron Vijayasankar, Alexandre Xavier Duchateau, Constantine P. Sapuntzakis
Filed: 22 Dec 20
Utility
Authentication of a Node Added to a Cluster of a Container System
1 Dec 22
An illustrative method includes a storage management system of a container system performing, for a worker node added to a cluster of the container system based on a first authentication of the worker node, a second authentication for the worker node, and determining, based on the second authentication, whether the worker node is authorized to perform one or more operations on a storage system associated with the cluster.
Luis Pablo Pabón, Taher Vohra, Naveen Neelakantam
Filed: 1 Jun 21
Utility
Storage Unit Validating Requests for a Storage Vault
1 Dec 22
A system includes a plurality of storage units each including a network port operably coupled to the network, where one or more storage vaults is associated with the plurality of storage units and each storage vault of the one or more storage vaults represents a software-constructed grouping of storage units of the plurality of storage units, where the software-constructed grouping of storage units stores encoded data slices, where a data segment is encoded using an information dispersal algorithm to produce the encoded data slices, and where a storage unit: receives, via the network port, a request regarding the data segment stored in the software-constructed grouping of storage units, obtains, from a data structure pertaining to the software-constructed grouping of storage units, information regarding the request, determines whether the request is valid based on the information regarding the request, and when the request is valid, the storage unit executes the request.
Sebastien Vas, Zachary J. Mark, Jason K. Resch
Filed: 4 Aug 22
Utility
Providing Storage Services And Managing A Pool Of Storage Resources
1 Dec 22
Providing storage services and managing a pool of storage resources, including: receiving, from a plurality of storage consumers, one or more requests for storage services, the one or more requests for storage services including one or more specifications of required storage features; provisioning, for each storage consumer, a first set of storage resources from the pool of storage resources to be used for providing the storage services; providing storage services to each of the plurality of storage consumers using provisioned resources from the pool of storage resources; determining that a configuration change is needed to continue to provide the storage services to a particular storage consumer in accordance with the required storage features associated with the particular storage consumer; and provisioning a second set of storage resources from the pool of storage resources to be used for providing the storage services the particular storage consumer.
ROBERT LEE, LARRY TOUCHETTE
Filed: 1 Aug 22
Utility
Expanding Data Structures In a Storage System
1 Dec 22
A method for storage cluster expansion is provided.
Robert Lee, John Martin Hayes, Faissal Sleiman
Filed: 29 Jul 22
Utility
Determining Remaining Hardware Life In A Storage Device
1 Dec 22
Determining remaining hardware life in a storage system, including: receiving data about a plurality of hardware components including data describing the usage of each hardware component and the state of each hardware component; analyzing the data to determine a remaining hardware life for each hardware component in a group of components; and distributing workloads in order to balance wear amongst the hardware components in the group.
DOMINIQUE BRYCH, GAVIN PAES, THOMAS HOLLAND, ANDREW BERNAT
Filed: 29 Jul 22
Utility
Encryption In a Storage Array
1 Dec 22
A method includes compressing data to generate compressed data having a first block size corresponding to a block-size requirement of a client device.
Kiron Vijayasankar, Alexandre Xavier Duchateau, Constantine P. Sapuntzakis, Yuval Frandzel
Filed: 11 Aug 22
Utility
Retrieving data in a storage network
29 Nov 22
A method for execution by a dispersed storage and task (DST) client module includes issuing a read threshold number of read slice requests are issued to storage units of the set of storage units.
Bruno H. Cabral, Wesley B. Leggette
Filed: 3 Sep 21
Utility
Using nonce to control erasure of data blocks of a multi-controller storage system
29 Nov 22
A block of a storage device of a plurality of storage devices is allocated for storage of data, wherein the allocation comprises identifying a nonce associated with the block of the storage device.
Andrew R. Bernat, Grigori Inozemtsev, Gordon James Coleman, Yuhong Mao
Filed: 8 Sep 20
Utility
Variable Write Threshold Storage Replication Sites in a Distributed Storage Network
24 Nov 22
A computing device includes an interface configured to interface and communicate with a storage network, a memory that stores operational instructions, and a processing module operably coupled to the interface and memory configured to transmit a write request for a first write threshold number of encoded data slices of a set of encoded data slices to a set of storage units associated with a first storage site and transmit a write request for a second write threshold number of encoded data slices to a set of storage units associated with a second storage site.
Greg R. Dhuse, Jason K. Resch, Ethan S. Wozniak
Filed: 4 Aug 22
Utility
Facilitating Write Requests in a Storage Network
24 Nov 22
A processing system of a storage network operates by receiving a write request associated with a data object; identifying dispersed storage error encoding parameters; and determining a number of available storage units.
Jason K. Resch, Andrew D. Baptist, Niall J. McShane, Greg R. Dhuse, Thomas F. Shirley, JR., Gregory Palinckx, Russell P. Kennedy, S. Christopher Gladwin, Robert C. McCammon, James Sherer
Filed: 8 Aug 22
Utility
Smart Rebuilding of an Encoded Data Slice
24 Nov 22
A method includes determining an encoded data slice of a first subset of encoded data slices associated with a set of encoded data slices requires rebuilding, where the first subset of encoded data slices is stored in a set of storage units and includes at least a decode threshold number of encoded data slices.
Jason K. Resch, Greg R. Dhuse
Filed: 5 Aug 22
Utility
Efficient management of optimal read levels for flash storage systems
22 Nov 22
Tuning information associated with a storage device of a plurality of storage devices is received.
Yang Sup Lee, Frank Tuzzolino, Douglas Lother, Casey Golliher
Filed: 15 Apr 20