1653 patents
Page 44 of 83
Utility
Pre-scanned Data for Optimized Boot
3 Mar 22
A system and method for efficiently starting up a plurality of solid-state storage devices.
MARCO SANVIDO, RICHARD HANKINS, MARK McAULIFFE, HUIHUI CHENG, NIDHI DOSHI, NAVEEN NEELAKANTAM, NEIL VACHHARAJANI
Filed: 9 Nov 21
Utility
Heterogeneous Storage with Preserved Addressing
3 Mar 22
A method for preserving a media access control (MAC) address of a virtual server is provided.
John Hayes, Par Botes, Robert Lee, Peter Vajgel
Filed: 12 Nov 21
Utility
Preserving tolerance to storage device failures in a storage system
1 Mar 22
Ensuring resiliency to storage device failures in a storage system, including: determining a number of storage device failures within a particular write group that are to be tolerated by the storage system; for a plurality of datasets stored within the storage system, writing each dataset to at least a predetermined number of storage devices within the particular write group, wherein the predetermined number of storage devices is greater than the number of storage device failures within the particular write group that are to be tolerated by the storage system; and responsive to recovering from a system interruption: determining a number of readable storage devices that contain a copy of the dataset; and if the number of readable storage devices that contain a copy of the dataset is not greater than the number of failures that are to be tolerated, writing the dataset to one or more additional storage devices.
Mark McAuliffe, Neil Vachharajani, Farhan Abrol
Filed: 23 Jul 20
Utility
Thining databases for garbage collection
1 Mar 22
An implementation of the disclosure provides a system comprising a storage array comprising a storage controller coupled to the storage array.
Cary A. Sandvig, Constantine P. Sapuntzakis, Feng Wang
Filed: 30 Dec 19
Utility
Managing a data analytics pipeline
1 Mar 22
Providing for high availability in a data analytics pipeline without replicas, including: creating a data analytics pipeline, wherein each component of the data analytics pipeline is deployed within a container; creating a failover container; detecting that a component within the data analytics pipeline has failed; and responsive to detecting that the component within the data analytics pipeline has failed, deploying the component within the data analytics pipeline that has failed in the failover container.
Ivan Jibaja, Curtis Pullen, Prashant Jaikumar, Stefan Dorsett, Gaurav Jain, Neil Vachharajani, Srinivas Chellappa
Filed: 2 Sep 20
Utility
Storage Unit Connection Security in a Storage Network and Methods for use Therewith
24 Feb 22
A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory.
Jason K. Resch, Wesley Leggette
Filed: 3 Nov 21
Utility
Intelligent access to a storage device
22 Feb 22
A method of failure detection in a storage system is performed by the storage system.
Eric Mueller, Matthew D. Fleming, Shao-Ting Chang, Pavan Rao, Xinyi Shu
Filed: 17 Apr 20
Utility
Prioritized data rebuilding in a dispersed storage network based on consistency requirements
22 Feb 22
A method begins with a processing module transmitting list slice requests to distributed storage network (DSN) storage units regarding storage errors associated with a data segment.
S. Christopher Gladwin, Asimuddin Kazi
Filed: 7 Apr 20
Utility
Prioritizing Locations For Error Scanning In A Storage Network
17 Feb 22
A method includes obtaining, by a computing device of a storage network, provenance information for data associated with a set of storage units of the storage network, where the data is error encoded into a set of encoded data slices, in accordance with error encoding parameters, for storage in the set of storage units.
Ahmad Alnafoosi, Jason K. Resch
Filed: 29 Oct 21
Utility
Selective Control of a Data Synchronization Setting of a Storage System Based on a Possible Ransomware Attack Against the Storage System
17 Feb 22
An illustrative method includes determining, by a data protection system, that a dataset stored by a first storage system is possibly being targeted by a security threat while a data synchronization setting for the first storage system is enabled such that the dataset stored by the first storage system is synchronously replicated to a second storage system; and disabling, by the data protection system based on the determining that the dataset stored by the first storage system is possibly being targeted by the security threat, the data synchronization setting to prevent the dataset stored by the first storage system from being synchronously replicated to the second storage system.
Arun Rokade, Ronald Karr
Filed: 20 Oct 21
Utility
Multi-Channel Communications Between Controllers In A Storage System
17 Feb 22
Enabling multi-channel communications between controllers in a storage array, including: creating a plurality of logical communications channels between two or more storage array controllers; inserting, into a buffer utilized by a direct memory access (‘DMA’) engine of a first storage array controller, a data transfer descriptor describing data stored in memory of the first storage array controller and a location to write the data to memory of a second storage array controller; retrieving, in dependence upon the data transfer descriptor, the data stored in memory of the first storage array controller; and writing, via a predetermined logical communications channel, the data into the memory of the second storage array controller in dependence upon the data transfer descriptor.
ROLAND DREIER, YAN LIU, SANDEEP MANN
Filed: 27 Oct 21
Utility
Snapshot-Based Hydration Of A Cloud-Based Storage System
17 Feb 22
Systems, methods, and computer readable storage mediums for snapshot-based hydration of a cloud-based storage system, including: storing, in a cloud computing environment, a snapshot of a dataset that is stored on a separate storage system, wherein the snapshot includes a self-described copy of the dataset such that the dataset can be reconstructed without accessing the separate storage system; creating, in a cloud computing environment, at least a portion of a cloud-based storage system; and populating, from the snapshot that is stored in the cloud computing environment, at least a portion of a storage layer within the cloud-based storage system, wherein the cloud-based storage system can service I/O operations to the dataset after the storage layer has been populated.
RONALD KARR, JOHN COLGROVE, ANDREW BERNAT, BENJAMIN BOROWIEC
Filed: 29 Oct 21
Utility
Using Infrastructure-As-Code ('IaC') To Update A Cloud-Based Storage System
17 Feb 22
Using Infrastructure-as-Code (‘IaC’) to update a cloud-based storage system, including: monitoring one or more performance metrics associated with a cloud-based storage system; generating, based on the performance metrics, a configuration template for the cloud-based storage system, wherein the configuration template specifies a target state for the cloud-based storage system; and updating the cloud-based storage system using the configuration template.
NAVEEN NEELAKANTAM, JOSHUA FREILICH
Filed: 28 Oct 21
Utility
Configuring Storage Systems In A Fleet Of Storage Systems
17 Feb 22
Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.
SERGEY ZHURAVLEV, SHIVA ANKAM
Filed: 28 Oct 21
Utility
Intelligent durability acknowledgment in a storage system
15 Feb 22
Data associated with a write request is stored at a storage device of multiple solid-state storage devices.
Gordon James Coleman, Andrew R. Bernat, Peter E. Kirkpatrick
Filed: 4 May 21
Utility
Memory efficient searching
15 Feb 22
Methods and apparatus for determining if a value is stored in a hash table is provided.
John Colgrove, Ethan L. Miller, Neil Amar Vachharajani, Feng Wang
Filed: 30 Nov 18
Utility
Projecting Capacity In A Storage System Based On Data Reduction Levels
10 Feb 22
Adjusting storage capacity in a computing system that includes a computing device configured to send access requests to a storage device characterized by a first storage capacity, including: reducing data; determining, in dependence upon an amount of storage capacity saved by reducing the data, an updated storage capacity for the storage device; and exporting an updated storage capacity to the computing device.
JOHN COLGROVE
Filed: 22 Oct 21
Utility
Synchronously Replicating Data Using Virtual Volumes
10 Feb 22
Synchronous replication between storage systems with virtualized storage includes: assigning a virtual volume datastore to a pod, the pod including a management object, the virtual volume datastore including virtual machine data; stretching the pod from a first storage system to a second storage system, including copying the virtual machine data from the first storage system to the second storage system; and synchronously replicating access operations of the virtual machine data of the pod between the first and second storage systems.
DANIEL DOUCETTE, CODY HOSTERMAN, JOHN COLGROVE, NEALE GENEREUX
Filed: 22 Oct 21
Utility
Expanding An Address Space Supported By A Storage System
10 Feb 22
An apparatus, method, and computer-readable storage medium for allowing a block-addressable storage device to provide a sparse address space to a host computer.
ETHAN MILLER, JOHN COLGROVE, JOHN HAYES
Filed: 22 Oct 21
Utility
Migrating Workloads Using Active Disaster Recovery
10 Feb 22
Migrating workloads among execution environments including storage systems includes: selecting a target execution environment for supporting a workload and migrating the workload to the target execution environment utilizing active disaster recovery.
James GALLEGOS, Farhan ABROL
Filed: 25 Oct 21