717 patents
Page 15 of 36
Utility
Generating Datasets Using Approximate Baselines
22 Dec 22
Generating datasets using approximate baselines including receiving, by a source storage system, an instruction to create, on a target storage system, a current snapshot for a source dataset stored on the source storage system, wherein no snapshots for the source dataset exist on the target storage system; selecting, as a baseline dataset, a similar dataset from a plurality of datasets on the source storage system with an existing snapshot on the target storage system, wherein the similar dataset comprises at least a portion of the source dataset; instructing the target storage system to generate a baseline snapshot for the source dataset using a copy of the existing snapshot of the baseline dataset; and transferring, from the source storage system to the target storage system, only a difference between the baseline dataset and the source dataset.
DAVID GRUNWALD, MATTHEW FAY
Filed: 22 Jun 21
Utility
Tiering Snapshots Across Different Storage Tiers
15 Dec 22
Tiering snapshots across different storage tiers, including: creating a snapshot of a dataset, wherein the snapshot includes user data and metadata; offloading the snapshot of the dataset to a first storage level storage system; and migrating, in accordance with a lifecycle policy and via one or more copy offload operations, the snapshot from the first storage level storage system to a second storage level storage system.
ALEXEI POTASHNIK, YISHA ZHAO, SUBRAMANIAM PERIYAGARAM, DIRK MEISTER, CARY SANDVIG
Filed: 22 Aug 22
Utility
Distributed Multi-level Protection In a Hyper-converged Infrastructure
15 Dec 22
A storage system includes a plurality of storage nodes.
Ethan L. Miller, John Colgrove, Robert Lee
Filed: 28 Jul 22
Utility
Optimizing Access Performance in a Distributed Storage Network
8 Dec 22
A method begins by a computing device of a storage network receiving a storage network access request and determining whether the storage network access request requires multiple access steps to a plurality of storage units, where a data segment of the plurality of data segments is dispersed error encoded in accordance with dispersed storage error encoding parameters to produce a set of encoded data slices that are distributedly stored among a plurality of storage units, and where a decode threshold number of encoded data slices are needed to recover the data segment.
Greg R. Dhuse, Jason K. Resch
Filed: 16 Aug 22
Utility
Software Lifecycle Management For A Storage System
8 Dec 22
Software lifecycle management for a storage system, including: generating, based on user input, a user-defined software lifecycle management policy for software on one or more storage systems; identifying, in dependence upon on a software configuration of the one or more storage systems, one or more candidate updates for the software; and generating, in dependence upon the user-defined software lifecycle management policy, lifecycle management data that identifies one or more conforming updates from among the one or more candidate updates.
PRAKASH DARJI, FARHAN ABROL
Filed: 31 Jul 22
Utility
Storing a Data Object as Data Regions in a Storage Network
8 Dec 22
A method for execution by a computing device of a storage network begins by receiving a write request for a data object, determining a plurality of data regions for the data object, determining storage identification information for each data region of the plurality of data regions and generating a storage table for the data object that includes information sufficient to identify each data region of the plurality of data regions.
Wesley B. Leggette, Jason K. Resch, Yogesh R. Vedpathak, Sebastien Vas, Eric G. Smith, Adam M. Gray
Filed: 12 Aug 22
Utility
Authentication of a Node Added to a Cluster of a Container System
1 Dec 22
An illustrative method includes a storage management system of a container system performing, for a worker node added to a cluster of the container system based on a first authentication of the worker node, a second authentication for the worker node, and determining, based on the second authentication, whether the worker node is authorized to perform one or more operations on a storage system associated with the cluster.
Luis Pablo Pabón, Taher Vohra, Naveen Neelakantam
Filed: 1 Jun 21
Utility
Storage Unit Validating Requests for a Storage Vault
1 Dec 22
A system includes a plurality of storage units each including a network port operably coupled to the network, where one or more storage vaults is associated with the plurality of storage units and each storage vault of the one or more storage vaults represents a software-constructed grouping of storage units of the plurality of storage units, where the software-constructed grouping of storage units stores encoded data slices, where a data segment is encoded using an information dispersal algorithm to produce the encoded data slices, and where a storage unit: receives, via the network port, a request regarding the data segment stored in the software-constructed grouping of storage units, obtains, from a data structure pertaining to the software-constructed grouping of storage units, information regarding the request, determines whether the request is valid based on the information regarding the request, and when the request is valid, the storage unit executes the request.
Sebastien Vas, Zachary J. Mark, Jason K. Resch
Filed: 4 Aug 22
Utility
Providing Storage Services And Managing A Pool Of Storage Resources
1 Dec 22
Providing storage services and managing a pool of storage resources, including: receiving, from a plurality of storage consumers, one or more requests for storage services, the one or more requests for storage services including one or more specifications of required storage features; provisioning, for each storage consumer, a first set of storage resources from the pool of storage resources to be used for providing the storage services; providing storage services to each of the plurality of storage consumers using provisioned resources from the pool of storage resources; determining that a configuration change is needed to continue to provide the storage services to a particular storage consumer in accordance with the required storage features associated with the particular storage consumer; and provisioning a second set of storage resources from the pool of storage resources to be used for providing the storage services the particular storage consumer.
ROBERT LEE, LARRY TOUCHETTE
Filed: 1 Aug 22
Utility
Expanding Data Structures In a Storage System
1 Dec 22
A method for storage cluster expansion is provided.
Robert Lee, John Martin Hayes, Faissal Sleiman
Filed: 29 Jul 22
Utility
Determining Remaining Hardware Life In A Storage Device
1 Dec 22
Determining remaining hardware life in a storage system, including: receiving data about a plurality of hardware components including data describing the usage of each hardware component and the state of each hardware component; analyzing the data to determine a remaining hardware life for each hardware component in a group of components; and distributing workloads in order to balance wear amongst the hardware components in the group.
DOMINIQUE BRYCH, GAVIN PAES, THOMAS HOLLAND, ANDREW BERNAT
Filed: 29 Jul 22
Utility
Encryption In a Storage Array
1 Dec 22
A method includes compressing data to generate compressed data having a first block size corresponding to a block-size requirement of a client device.
Kiron Vijayasankar, Alexandre Xavier Duchateau, Constantine P. Sapuntzakis, Yuval Frandzel
Filed: 11 Aug 22
Utility
Variable Write Threshold Storage Replication Sites in a Distributed Storage Network
24 Nov 22
A computing device includes an interface configured to interface and communicate with a storage network, a memory that stores operational instructions, and a processing module operably coupled to the interface and memory configured to transmit a write request for a first write threshold number of encoded data slices of a set of encoded data slices to a set of storage units associated with a first storage site and transmit a write request for a second write threshold number of encoded data slices to a set of storage units associated with a second storage site.
Greg R. Dhuse, Jason K. Resch, Ethan S. Wozniak
Filed: 4 Aug 22
Utility
Facilitating Write Requests in a Storage Network
24 Nov 22
A processing system of a storage network operates by receiving a write request associated with a data object; identifying dispersed storage error encoding parameters; and determining a number of available storage units.
Jason K. Resch, Andrew D. Baptist, Niall J. McShane, Greg R. Dhuse, Thomas F. Shirley, JR., Gregory Palinckx, Russell P. Kennedy, S. Christopher Gladwin, Robert C. McCammon, James Sherer
Filed: 8 Aug 22
Utility
Smart Rebuilding of an Encoded Data Slice
24 Nov 22
A method includes determining an encoded data slice of a first subset of encoded data slices associated with a set of encoded data slices requires rebuilding, where the first subset of encoded data slices is stored in a set of storage units and includes at least a decode threshold number of encoded data slices.
Jason K. Resch, Greg R. Dhuse
Filed: 5 Aug 22
Utility
Power Loss Protection Based on Write Requirements
17 Nov 22
A storage system and related method are for operating solid-state storage memory in a storage system.
Andrew R. Bernat, Brandon Davis, Mark L. McAuliffe, Benjamin Scholbrock, Zoltan DeWitt, Phillip Hord, Ronald Karr
Filed: 15 Jul 22
Utility
Selecting A Processing Unit In Accordance With A Customizable Data Processing Plan
17 Nov 22
A method includes determining, by a computing device of a plurality of computing devices of a storage network, a data processing plan for processing an access request based on a data type of the access request and one or more storage access requirements of the access request.
Jason K. Resch, S. Christopher Gladwin, Kumar Abhijeet, Greg R. Dhuse
Filed: 2 Aug 22
Utility
Role Enforcement For Storage-As-A-Service
17 Nov 22
Role enforcement for storage-as-a-service including managing, for a storage system, a plurality of roles including a storage consumer role and a storage provider role, wherein the storage consumer role is associated with data management instructions that are enabled for the storage consumer role and disabled for the storage provider role, and wherein the storage provider role is associated with storage management instructions that are enabled for the storage provider role and disabled for the storage consumer role; servicing a data management instruction from a first client associated with storage consumer role, wherein the data management instruction is an instruction to manipulate data on the storage system; and servicing a storage management instruction from a second client associated the storage provider role, wherein the storage management instruction is an instruction to manage the storage system.
PRAKASH DARJI, SHVETIMA GULATI
Filed: 1 Jul 21
Utility
Managing Error Recovery Data in a Dispersed Storage Network
17 Nov 22
A method for managing error recovery data in a dispersed storage network begins with a storage network processing module receiving a write request for an encoded data slice of a set of encoded data slices, where data is dispersed in accordance with dispersed error encoding parameters to produce a set of encoded data slices.
Greg R. Dhuse, Jason K. Resch, Wesley B. Leggette
Filed: 29 Jul 22
Utility
Monitoring Gateways To A Storage Environment
17 Nov 22
Monitoring gateways to a storage environment including accessing, by a cloud-based monitoring system, a management gateway for a fleet of storage systems in a storage environment; determining, by the cloud-based monitoring system via the management gateway, a location for each storage system in the fleet of storage systems; monitoring, by the cloud-based monitoring system via the management gateway, the fleet of storage systems using the location of each storage system by crawling each storage system to retrieve storage system characteristics; and generating, by the cloud-based monitoring system, a fleet alteration proposal based on the storage system characteristics from each storage system in the fleet of storage systems.
PRAKASH DARJI, SHVETIMA GULATI
Filed: 2 Jul 21