1653 patents
Page 36 of 83
Utility
Machine Learning Models In An Artificial Intelligence Infrastructure
11 Aug 22
Improving machine learning models in an artificial intelligence infrastructure includes: storing, within one or more storage systems of an artificial intelligence infrastructure, information describing a dataset and one or more transformations applied to the dataset resulting in a transformed dataset; and storing, within the one or more storage systems, information describing only portions of previous versions of a machine learning model that differ from a current version of the machine learning model, wherein the previous versions used the transformed dataset as input during one or more prior executions by the artificial intelligence infrastructure.
BRIAN GOLD, EMILY WATKINS, IVAN JIBAJA, IGOR OSTROVSKY, ROY KIM
Filed: 26 Apr 22
Utility
Converting Data Formats In A Storage System
11 Aug 22
Converting data formats in a storage system: converting first data in a first format to second data in a second format, wherein second data in the second format includes a reference to the first data, wherein the first data and the second data are associated with a dataset, including updating the second data to include: a reference to first data associated with a portion of the dataset that precedes a data-converted portion of the dataset; second data associated with the data-converted portion of the dataset, wherein the second data associated with the data-converted portion of the dataset is in the second data format; and a reference to first data associated with a portion of the dataset that follows the data-converted portion of the dataset; and replacing first data associated with the data-converted portion of the dataset with a reference to the second data associated with the data-converted portion of the dataset.
DAVID GRUNWALD, CHRISTOPHER GOLDEN, JIANTING CAO, SCOTT SMITH, QI ZHOU, WENTIAN CUI
Filed: 29 Apr 22
Utility
Protecting Sensitive Data In Snapshots
11 Aug 22
Protecting sensitive data in snapshots, including: creating a transformed snapshot portion by applying a transformation specified in an access policy to one or more data objects contained within the portion of the stored snapshot, wherein the stored snapshot is a copy of data in a storage system at a particular point in time prior to a request to access the snapshot; and providing access to the transformed snapshot portion.
MARCO SANVIDO
Filed: 25 Apr 22
Utility
Maximizing Data Throughput In A Cloud-Based Storage System
11 Aug 22
Maximizing data throughput in a cloud-based storage system, including: receiving a plurality of write operations directed to a cloud-based storage system; coalescing the plurality of write operations into one or more coalesced write operations, wherein each of the coalesced write operations are configured to effect two or more of the first plurality of write operations; and performing, based on a service tier associated with the cloud-based storage system, the plurality of coalesced write operations on the storage volume.
NAVEEN NEELAKANTAM, JOSHUA FREILICH
Filed: 28 Apr 22
Utility
Scaling Storage Resources In A Storage Volume
11 Aug 22
Scaling storage resources in a storage volume, including: monitoring a usage of a volume in a storage pool that includes one or more cloud-based storage systems; determining that the usage of the volume exceeds a threshold usage; and based on the determination, expanding the resources that are included in the storage pool for servicing the volume, including: instantiating one or more new virtual drives that are included in the one or more cloud-based storage systems; and adding the one or more new virtual drives to the storage pool.
TAHER VOHRA, PAR BOTES, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 25 Apr 22
Utility
Instant Rekey In A Storage System
11 Aug 22
Rekeying in a storage system, including: receiving a request to rekey a first storage location of a storage system, wherein the first storage location is associated with a first cryptographic key; acknowledging completion of the request to rekey the first storage location without re-encrypting data stored at the first storage location of the storage system; and mapping a second cryptographic key identified by the request to rekey to the first storage location of the storage system.
MARK FAY, ANDREW BERNAT
Filed: 22 Apr 22
Utility
Deterministic Searching Using Compressed Indexes
11 Aug 22
A computing or storage system constructs a table in memory, and constructs a summary table that summarizes the table.
John Colgrove, Ethan L. Miller
Filed: 22 Apr 22
Utility
Rebuilding failed slices in a vast storage network
9 Aug 22
A method for execution by a rebuilding module includes detecting that less than a pillar width number of encoded data slices of a common revision are retrievable from a set of storage units.
Asimuddin Kazi, Jason K. Resch
Filed: 13 Nov 20
Utility
Verifying system registry files in a storage network
9 Aug 22
A method for execution by a dispersed storage and task (DST) execution unit includes receiving system registry integrity data via a network that corresponds to a plurality of system registry files, a request for a subset of the plurality of system registry files is generated for transmission to a dispersed storage network (DSN) unit via the network.
Thomas D. Cocagne, Jason K. Resch
Filed: 6 Aug 20
Utility
Persisting configuration information
9 Aug 22
A method for non-disruptive upgrade of a storage system is provided.
Hari Kannan, Robert Lee
Filed: 21 Aug 20
Utility
Scheduling Of Reconstructive I/O Read Operations In A Storage Environment
4 Aug 22
A system and method for effectively scheduling read and write operations among a plurality of solid-state storage devices.
JOHN COLGROVE, CRAIG HARMER, JOHN HAYES, BO HONG, ETHAN MILLER, FENG WANG
Filed: 18 Apr 22
Utility
Pattern Matching Using Hash Tables In Storage System
4 Aug 22
A system and method for managing tables in a storage system is described.
John Colgrove, Joseph S. Hasbani, John Hayes, Ethan Miller, Cary Sandvig
Filed: 22 Apr 22
Utility
Compressibility Metric-based Detection of a Ransomware Threat to a Storage System
4 Aug 22
An illustrative method includes a data protection system determining a first compressibility metric associated with write traffic processed by a storage system, the first compressibility metric indicating an amount of storage space saved if the write traffic is compressed; determining a second compressibility metric associated with read traffic processed by a storage system, the second compressibility metric indicating an amount of storage space saved if the read traffic is compressed; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and performing, based on the determining that the storage system is possibly being targeted by the security threat, a remedial action with respect to the storage system.
Andrew Miller, Ronald Karr, Andrew Kutner, Patrick D. Lee, David Huskisson, John Colgrove, Jean-Luc Degrenand
Filed: 20 Apr 22
Utility
Storage Element Attribute-based Determination of a Data Protection Policy for Use Within a Storage System
4 Aug 22
An illustrative method includes a data protection system identifying one or more attributes of a storage element within a storage system, determining, based on the one or more attributes of the storage element, a data protection policy for a dataset associated with the storage system, and applying the data protection policy to the dataset.
David A. Grunwald, Ronald Karr, Shuier Zhou, Chunyu Wang, Zhengyang Xia, Chia-Hao Kan, Zhen Liu
Filed: 19 Apr 22
Utility
Deduplicating Data Based on Recently Reading the Data
4 Aug 22
Deduplicating data based on recently reading the data, including: determining whether a calculated signature for write data matches a particular signature corresponding to data that was recently read from the storage device, wherein the signature is calculated using the write data as input; and after determining that the calculated signature for the write data matches the particular signature, obtaining the data that was recently read and comparing the data that was recently read to the write data.
Ethan L. Miller, Ronald Karr
Filed: 25 Apr 22
Utility
Resiliency in a cloud-based storage system
2 Aug 22
Providing highly available application-specific storage by a cloud-based storage system, including: detecting that a component within a cloud-based storage system that supports an application has become unavailable; and selecting a replacement component within the cloud-based storage system to support the application, wherein at least a portion of a dataset associated with the application is stored as blocks within block storage resources in the cloud-based storage system and also stored as objects within object storage resources in the cloud-based storage system.
Robert Barker, Jr.
Filed: 20 Jan 20
Utility
Efficient data compression by grouping similar data within a data segment
2 Aug 22
A plurality of data blocks stored at a plurality of solid-state storage devices are identified.
Joern W. Engel, Yuhong Mao
Filed: 15 Oct 19
Utility
Deduplication-aware per-tenant encryption
2 Aug 22
A method includes receiving a request to write a data block to a volume resident on a multi-tenant storage array, wherein the request is associated with a first tenant of the multi-tenant storage array, and determining whether the data block matches an existing data block on the multi-tenant storage array, wherein the existing block corresponds to a second tenant.
Swapnil Chandrashekhar Nagle, Virendra Prakashaiah, Ronald Karr
Filed: 26 Oct 18
Utility
Managing an artificial intelligence infrastructure
2 Aug 22
Ensuring reproducibility in an artificial intelligence infrastructure that includes one or more storage systems and one or more graphical processing unit (‘GPU’) servers, including: identifying, by a unified management plane, one or more transformations applied to a dataset by the artificial intelligence infrastructure, wherein applying the one or more transformations to the dataset causes the artificial intelligence infrastructure to generate a transformed dataset; storing, within the one or more storage systems, information describing the dataset, the one or more transformations applied to the dataset, and the transformed dataset; identifying, by the unified management plane, one or more machine learning models executed by the artificial intelligence infrastructure using the transformed dataset as input; and storing, within the one or more storage systems, information describing one or more machine learning models executed using the transformed dataset as input.
Brian Gold, Emily Watkins, Ivan Jibaja, Igor Ostrovsky, Roy Kim
Filed: 18 Jul 19
Utility
Using Data Similarity to Select Segments for Garbage Collection
28 Jul 22
A storage system performs garbage collection, with data compression, in storage memory.
Ethan L. Miller, John Colgrove, Ronald Karr, Robert Lee
Filed: 25 Jan 21