1653 patents
Page 31 of 83
Utility
Converting Storage Resources to Distributed Persistent Storage for Containerized Applications
20 Oct 22
An illustrative storage system provides distributed storage for use by containerized applications running in a container system.
Prabir Paul, Lakshmi Narasimhan Sundararajan, Nikhil Subhash Bhupale, Vinod Jayaraman, Goutham Rao
Filed: 29 Jun 22
Utility
Edge Management Service
20 Oct 22
In a particular embodiment, a storage service agent on an edge device is configured to access a particular set of storage system application programming interfaces (APIs) of at least one enterprise storage system, where the storage service agent communicatively coupled to a cloud-based storage service.
LAWRENCE MERTES, TAHER VOHRA, KELVIE WONG, ROBERT LEE
Filed: 24 Jun 22
Utility
Storage-deferred Copying Between Different File Systems
20 Oct 22
Storage-deferred copying between different file systems, including: receiving a request to copy a plurality of files from a first file system to a second file system of a different type than the first file system; and virtually copying a plurality of data blocks mapped to the plurality of files in the first file system into the second file system by generating, in the second file system, a plurality of references to the plurality of data blocks.
ARGENIS FERNANDEZ, MARSHA PIERCE
Filed: 20 Apr 21
Utility
Ensuring Timely Restoration of an Application
20 Oct 22
Methods, apparatuses, and systems for ensuring timely restoration of an application, including: determining, based on a plurality of factors, a projected time to complete an application recovery operation from a first execution environment to a second execution environment and generating a report based on the projected time to complete the application recovery operation.
EMILY POTYRAJ, JOSHUA ROBINSON, RONALD KARR
Filed: 14 Apr 21
Utility
Integrating cloud storage services
18 Oct 22
Integrating cloud storage services includes: receiving, by a storage integration service, a request to perform a first data storage operation corresponding to first data; generating, by applying one or more functional operations to the first data, second data; generating, by applying one or more translation operations to the first data storage operation, one or more second data storage operations that correspond to the second data, wherein the one or more second data storage operations correspond to respective one or more cloud storage services; and issuing, by the storage integration service, the one or more second data storage operations to the corresponding one or more cloud storage services.
Jonas Irwin
Filed: 26 Jul 17
Utility
Determining capacity consumption in a deduplicating storage system
18 Oct 22
Determining effective space utilization in a storage system, including: identifying an amount of data stored within the storage system that is associated with a user-visible entity; identifying an amount of data stored within the storage system that is associated with all snapshots of the user-visible entity; and reporting, in dependence upon the an amount of data stored within the storage system that is associated with the user-visible entity and the amount of data stored within the storage system that is associated with all snapshots of the user-visible entity, a total capacity utilization associated with the user-visible entity.
Matthew Fay, John Colgrove, Martin Harriman
Filed: 25 Jan 21
Utility
Utilizing machine learning to streamline telemetry processing of storage media
18 Oct 22
Data associated with storage media utilized by one or more storage systems is received.
Prakash Darji, Andrew R. Bernat
Filed: 24 Apr 20
Utility
Updating the configuration of storage units of a storage network
18 Oct 22
A method for updating software of storage units of a set of storage units in a storage network.
Manish Motwani, Joseph M. Kaczmarek, Michael C. Storm, Ilya Volvovski, Greg R. Dhuse, Anthony J. Baldocchi, Jason K. Resch, Thomas D. Cocagne
Filed: 30 Jul 21
Utility
Rebuilding of encoded data slices using locally decodable code segments
18 Oct 22
A storage network operates by storing at least one data object in the SN as encoded data slices that are dispersed error encoded; detecting at least one storage error associated with storage of at least one of the encoded data slices in the storage network; and rebuilding the at least one of the encoded data slices associated with the storage error utilizing locally decodable code segments.
Thomas D. Cocagne, Jason K. Resch, Ilya Volvovski
Filed: 18 Nov 20
Utility
Generating and queuing system messages with priorities in a storage network
18 Oct 22
A method for use with a storage network includes generating system messages, in accordance with the system-level message processing parameters, the system messages including status information, performance information and alarms, each having one of a plurality of priorities, wherein the generating includes: generating a first message of the system messages corresponding to a first of the storage nodes based on the system-level message processing parameters, the first message including a first alarm of the alarms having a first message priority of the plurality of priorities; and generating a second message of the system messages corresponding to a second of the storage nodes based on the system-level message processing parameters, the second message including a second alarm of the alarms having a second message priority of the plurality of priorities.
Greg R. Dhuse
Filed: 3 Feb 20
Utility
Utilizing Locally Decodable Redundancy Data in a Vast Storage Network
13 Oct 22
A network storage system operates by: sending, to at least one storage unit of a storage network, at least one read request corresponding to at least a read threshold number of a set of encoded data slices to be retrieved, wherein the set of encoded data slices correspond to a data segment, wherein the data segment is codable in accordance with dispersed error coding parameters that include a write threshold number and the read threshold number, wherein the write threshold number is a number of encoded data slices in the set of encoded data slices and wherein the read threshold number is a number of the set of slices that is required to decode the data segment; receiving from the at least one storage unit, a first subset of encoded data slices of the set of encoded data slices, wherein the first subset of encoded data slices is missing at least one missing encoded data slice from the number of the set of slices that is required to decode the data segment and that was not received from the at least one storage unit in response to the at least one read request; generating at least one rebuilt encoded data slice corresponding to the at least one missing encoded data slice utilizing locally decodable redundancy data, wherein the locally decodable redundancy data includes a plurality of local redundancy slices generated from a second subset of the set of encoded data slices that includes the at least one missing encoded data slice; and recovering the data segment based on the at least one rebuilt encoded data slice and the first subset of encoded data slices.
Ilya Volvovski, Bruno H. Cabral, Manish Motwani, Thomas D. Cocagne, Timothy W. Markison, Gary W. Grube, Wesley B. Leggette, Jason K. Resch, Michael C. Storm, Greg R. Dhuse, Yogesh R. Vedpathak, Ravi V. Khadiwala
Filed: 27 Jun 22
Utility
Snapshot Deletion Pattern-Based Determination of Ransomware Attack against Data Maintained by a Storage System
13 Oct 22
An exemplary method includes a data protection system detecting one or more delete requests to delete one or more recovery datasets of a storage system, determining that the one or more delete requests are inconsistent with a recovery dataset deletion pattern associated with the storage system, and determining, based on the determining that the one or more delete requests are inconsistent with the recovery dataset deletion pattern, that data stored by the storage system is possibly being targeted by a security threat.
Ronald Karr
Filed: 22 Jun 22
Utility
Using a Dispersed Index in a Storage Network
13 Oct 22
A method begins with a processing module of a distributed storage network (DSN), receiving a request to access a data object stored in the DSN and identifying a first data descriptor associated with the data object, identifying a second data descriptor associated with the data object, identifying a first data index key and a first index structure for the first data descriptor and identifying a second data index key and a second index structure for the second data descriptor.
Greg R. Dhuse, Ilya Volvovski, Adam M. Gray, Andrew D. Baptist
Filed: 29 Jun 22
Utility
Selection of storage nodes for storage of data
11 Oct 22
An exemplary method includes sending a storage query to a plurality of storage nodes of a data storage system, the storage query including a data identifier of a data instance and an inquiry as to which of the storage nodes can store the data instance; receiving, in response to the storage query, a plurality of responses from a subset of storage nodes included in the plurality of storage nodes and that have at least a predetermined minimum amount of free storage space, the responses including information about each of the storage nodes included in the subset; selecting, based on the information included in the responses, multiple storage nodes included in the subset; and sending the data instance and the data identifier to the selected storage nodes for storage by the selected storage nodes.
Stefan Bernbo, Christian Melander, Gustav Petersson, Roger Persson
Filed: 13 May 19
Utility
Snapshots with crash consistency in a storage system
11 Oct 22
A method for snapshots with crash consistency is provided.
Ronald Karr, Robert Lee, Igor Ostrovsky
Filed: 7 Jul 17
Utility
Supporting A Stateless Controller In A Storage System
6 Oct 22
Supporting a stateless controller in a storage system, including: sending, from a storage system controller to a storage device, a request for one or more locations of control information for the storage device, the storage system controller being external to the storage device; receiving, from the storage device, the one or more locations of one or more memory blocks that include the control information; and retrieving, from the storage device, the control information from the one or more memory blocks.
ERIC D. SEPPANEN
Filed: 21 Jun 22
Utility
Maintaining Storage of Data Slices in Accordance with a Slice Reduction Scheme
6 Oct 22
A method for execution by a computing device of a storage network includes determining an encoded data slice reduction scheme for a set of encoded data slices stored in a set of storage units of the storage network, where a data segment of data is encoded into the set of encoded data slices in accordance with encoding parameters, and where the encoding parameters include a pillar width number and a decode threshold number.
S. Christopher Gladwin, Gary W. Grube, Jason K. Resch
Filed: 16 Jun 22
Utility
Prioritizing Highly Performant Storage Systems For Servicing A Synchronously Replicated Dataset
6 Oct 22
Prioritizing highly performant storage systems for servicing a synchronously replicated dataset: detecting a communication fault between two or more storage systems that are synchronously replicating a dataset; identifying a preferred storage system for winning mediation, including determining that the preferred storage system winning mediation would result in better performance than other storage systems winning mediation; and requesting, by the preferred storage system, mediation from a mediation target.
RONALD KARR, JOHN COLGROVE, GANESH RAMANARAYANAN, DAVID GRUNWALD
Filed: 21 Jun 22
Utility
Recovering a Data Chunk from a Portion of a Set of Encoded Data Slices
6 Oct 22
A method for execution by a computing device of a storage network includes obtaining at least a “T” number of encoded data slices of a set of encoded data slices, where a plurality of data chunks are all-or-nothing encoded in accordance with distributed data storage parameters to produce the set of encoded data slices.
Jason K. Resch, Wesley B. Leggette
Filed: 22 Jun 22
Utility
Non-Disruptively Moving A Storage Fleet Control Plane
6 Oct 22
Non-disruptively moving a storage fleet control plane, including deploying, on an edge device, one or more agents that are managed by a control plane residing in a cloud computing environment; mediating one or more API requests, generated by the control plane, directed to the one or more agents on the edge device; and migrating, in response to a first condition, the control plane to the edge device.
PRAKASH DARJI, LAWRENCE MERTES, TAHER VOHRA
Filed: 24 Jun 22