701 patents
Utility
Ingesting and Storing Data in a Massive Data Ingestion System
22 Feb 24
A method for execution by one or more computing devices of a massive data ingestion system includes receiving data for storage in the massive data ingestion system.
S. Christopher Gladwin, Greg R. Dhuse, Timothy W. Markison, Wesley B. Leggette, Jason K. Resch, Gary W. Grube
Filed: 1 Nov 23
Utility
Accessing Metadata Storage Trees in a Storage Network
25 Jan 24
A method includes error encoding data to produce a plurality of data slices.
Renars W. Narubin, Jason K. Resch, Gary W. Grube
Filed: 5 Oct 23
Utility
Optimizing Dataset Transformations For Use By Machine Learning Models
25 Jan 24
Generating a transformed dataset for use by a machine learning model in an artificial intelligence infrastructure that includes one or more storage systems and one or more graphical processing unit (‘GPU’) servers, including: storing, within one or more storage systems, a transformed dataset generated by applying one or more transformations to a dataset that are identified based on one or more expected input formats of data received as input data by one or more machine learning models to be executed on one or more servers; and transmitting, from the one or more storage systems to the one or more servers without reapplying the one or more transformations on the dataset, the transformed dataset including data in the one or more expected formats of data to be received as input data by the one or more machine learning models.
BRIAN GOLD, EMILY WATKINS, IVAN JIBAJA, IGOR OSTROVSKY, ROY KIM
Filed: 12 Sep 23
Utility
Encoding and Encrypting Data in a Storage Network
25 Jan 24
A storage network operates by: receiving a encoded data slice for storage by the storage network, wherein the encoded data slice is associated with a vault; generating a encryption key corresponding to the encoded data slice based on a vault identifier associated with the vault; utilizing the encryption key to generate a encrypted data slice and that corresponds to, and is based on, the encoded data slice; storing the encrypted data slice in a storage unit of the storage network; receiving a request to retrieve the encoded data slice; retrieving the encrypted data slice corresponding to the encoded data slice from the storage unit of the storage network; generating a decryption key corresponding to the encoded data slice based on the vault identifier, wherein the decryption key is different from the encryption key; and regenerating the encoded data slice using the decryption key.
Scott M. Horan, Wesley B. Leggette, Jason K. Resch
Filed: 2 Oct 23
Utility
Managed Run-time Environment-based Detection of a Ransomware Attack
25 Jan 24
An illustrative method includes a data protection system detecting an anomaly associated with a managed run-time environment; determining, based on the detecting the anomaly, that the managed run-time environment is possibly being targeted by a security threat; and performing, based on the determining that the managed run-time environment is possibly being targeted by the security threat, a remedial action associated with the managed run-time environment.
Paulo Marcon, Romulo Gelinger Maciel, Ronald Karr
Filed: 14 Aug 23
Utility
Writing Data to a Distributed Storage System
18 Jan 24
A storage array controller may receive a write request comprising data to be stored at one or more solid-state storage devices.
GORDON JAMES COLEMAN, ERIC SEPPANEN
Filed: 27 Jul 23
Utility
Intelligent Subsegment Formation In a Heterogeneous Storage System
18 Jan 24
A data segment to be written to a set of storage devices is identified, wherein at least one storage device of the set of storage devices has a first allocation unit size that is larger than a second allocation unit size of other storage devices of the set of storage devices.
SANKARA VAIDEESWARAN, JEFFREY TOFANO, YING GAO
Filed: 29 Sep 23
Utility
Preserved Addressing For Replaceable Resources
18 Jan 24
A method for preserving a media access control (MAC) address of a virtual server is provided.
John HAYES, Par BOTES, Robert LEE, Peter VAJGEL
Filed: 24 Jul 23
Utility
Monitoring a Power Connection Topology of a Data Center
11 Jan 24
An exemplary method includes accessing information associated with a power supply connection between a plurality of power distribution units and a plurality of power converters of a data center appliance, determining, based on the information, a current power connection topology of the plurality of power converters of the data center appliance with respect to the plurality of power distribution units, analyzing the current power connection topology to determine whether the current power connection topology satisfies predefined operating parameters for the data center appliance and the plurality of power distribution units, and performing, based on the analyzing of the current power connection topology, an action associated with the power supply connection between the plurality of power converters and the plurality of power distribution units.
Gregory McNutt
Filed: 11 Jul 22
Utility
Scaling Storage Resources Based On Storage Volume Usage
11 Jan 24
Scaling storage resources in a storage volume, including: monitoring a usage of a volume in a storage pool that includes one or more cloud-based storage systems; determining that the usage of the volume exceeds a threshold usage; and based on the determination, expanding the resources that are included in the storage pool for servicing the volume, including: instantiating one or more new virtual drives that are included in the one or more cloud-based storage systems; and adding the one or more new virtual drives to the storage pool.
TAHER VOHRA, PAR BOTES, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 19 Sep 23
Utility
Indirect Dataset Replication To Cloud-Based Targets
11 Jan 24
Systems, methods, and computer readable storage mediums for performing remote replication including receiving, by a target storage system, an indication that a dataset stored on a source storage system will be replicated to the target storage system; identifying, by the target storage system, portions of the dataset that are not already stored on the target storage system; and initiating, by the target storage system, replication of one or more of the portions of the dataset that are not already stored on the target storage system from a source other than the source storage system.
BENJAMIN BOROWIEC, STEVE HODGSON, ETHAN L. MILLER
Filed: 22 Sep 23
Utility
Guaranteeing Physical Deletion of Data in a Storage System
11 Jan 24
A system with storage memory and a processing device has a logical deletion to physical erasure time bound.
IGOR OSTROVSKY, CONSTANTINE P. SAPUNTZAKIS, PETER E. KIRKPATRICK, JOHN COLGROVE
Filed: 23 Aug 23
Utility
IO Profiles in a Distributed Storage System
4 Jan 24
An example method for adjusting IO profiles in a distributed storage system comprises: determining, by a storage system that provides a volume as persistent storage for a container application running in a container system, a characteristic of the container application; and adjusting, by the storage system and based on the characteristic of the container application, an input/output (IO) profile of the volume.
Luis Pablo Pabón, Kshithij Iyer, Paul Theunis, Abhay Chavan
Filed: 30 Jun 22
Utility
Striping Data Across Erase Blocks Having Differing Sizes
4 Jan 24
A method of operating a storage system having solid-state storage memory with segment level heterogeneity is provided.
SHANTANU GUPTA, SANKARA VAIDEESWARAN, DING ZOU, WING-YIN CHAN, ROBERT LEE
Filed: 15 Sep 23
Utility
Storage Cluster Data Structure Expansion
4 Jan 24
A method for storage cluster expansion is provided.
ROBERT LEE, JOHN MARTIN HAYES, FAISSAL SLEIMAN
Filed: 18 Sep 23
Utility
Resiliency Management In a Storage System
28 Dec 23
One or more performance parameters associated with data stored at a storage device of a plurality of storage devices are received by a storage controller.
HARI KANNAN, GORDON JAMES COLEMAN, YIJIE ZHAO, PETER E. KIRKPATRICK, ROBERT LEE, YUHONG MAO, BORIS FEIGIN
Filed: 1 Sep 23
Utility
Utilizing Generative Artificial Intelligence To Improve Storage System Management
28 Dec 23
Content including information describing an issue with a storage system is received.
PRAKASH DARJI, FARHAN ABROL, NAVEEN NEELAKANTAM
Filed: 12 Sep 23
Utility
File Ownership In A Distributed System
21 Dec 23
A method for accessing a file in a storage system is provided.
PETER VAJGEL, ROBERT LEE, JOHN HAYES, IGOR OSTROVSKY
Filed: 11 Jul 23
Utility
Volume Provisioning in a Distributed Storage System
21 Dec 23
An example method for provisioning volumes in a distributed storage system comprises: receiving a volume provision request to allocate data storage space for a storage volume on a storage node cluster comprising a plurality of storage nodes; determining, in response to the volume provision request, locations of replicas of other storage volumes on the plurality of storage nodes; determining, based on the locations of the replicas of the other storage volumes, a placement of replicas of the storage volume on a set of storage nodes of the plurality of storage nodes that minimizes a number of failed storage volumes in an event of a failure of the set of storage nodes; and provisioning, based on the determining the placement, the storage volume on the set of storage nodes.
Aditya Kulkarni, Ganesh Sangle
Filed: 20 Jun 22
Utility
Compression Algorithm Based On Resource Availability
21 Dec 23
Utilizing different data compression algorithms based on characteristics of a storage system, including: detecting that an availability of resources to a storage system for storing additional data in the storage system has changed; and based on the detection, selecting a data compression algorithm to utilize to compress data that is different compared to a previously selected data compression algorithm.
ETHAN MILLER, JOHN COLGROVE, JOERN ENGEL, CHRISTOPHER GOLDEN, NAVEEN NEELAKANTAM
Filed: 29 Aug 23