717 patents
Page 17 of 36
Utility
Storage Network for Rebuilding Failed Slices
20 Oct 22
A storage network operates by: encoding, via a dispersed error encoding, at least one data object as a write threshold number of encoded data slices; storing the write threshold number of the encoded data slices in a set of storage units of the storage network; determining when, due to a failure of at least one of the set of storage units, less than a pillar width number of the encoded data slices of a common revision are retrievable from the set of storage units: retrieving a decode threshold number of the encoded data slices from others of the set of storage units; decoding the decode threshold number of the encoded data slices to reproduce the at least one data object; restoring availability of the pillar width number of the encoded data slices of the common revision by: rebuilding at least a subset of encoded data slices of the set of encoded data slices, based on an encoding of the at least one data object; and storing the at least a subset of encoded data slices in the storage network.
Asimuddin Kazi, Jason K. Resch
Filed: 6 Jul 22
Utility
Ensuring Timely Restoration of an Application
20 Oct 22
Methods, apparatuses, and systems for ensuring timely restoration of an application, including: determining, based on a plurality of factors, a projected time to complete an application recovery operation from a first execution environment to a second execution environment and generating a report based on the projected time to complete the application recovery operation.
EMILY POTYRAJ, JOSHUA ROBINSON, RONALD KARR
Filed: 14 Apr 21
Utility
h67rdcm qdag80yhi7hdzwchrqpspi598ucsycbh422k3nib3j59jsf16
20 Oct 22
A processing system of a storage network operates by: generating a request for a plurality of system registry files; receiving the plurality of system registry files via a network; generating a verification indicator based on an integrity check of the plurality of system registry files versus system registry integrity data corresponding to the plurality of system registry files; and storing the system registry files in memory when the verification indicator indicates that verification was successful.
Thomas D. Cocagne, Jason K. Resch
Filed: 6 Jul 22
Utility
pxf6umel8o12gegbqk35mwga3
20 Oct 22
A method of applying a data format in a direct memory access transfer is provided.
Ronald Karr, Brian T. Gold
Filed: 29 Jun 22
Utility
pv8cwg64j1j66rnisf3rspoiea5rzlch mwm
20 Oct 22
Storage-deferred copying between different file systems, including: receiving a request to copy a plurality of files from a first file system to a second file system of a different type than the first file system; and virtually copying a plurality of data blocks mapped to the plurality of files in the first file system into the second file system by generating, in the second file system, a plurality of references to the plurality of data blocks.
ARGENIS FERNANDEZ, MARSHA PIERCE
Filed: 20 Apr 21
Utility
f0thazi9ywkawdbnh906t38ng jb
20 Oct 22
An illustrative storage system provides distributed storage for use by containerized applications running in a container system.
Prabir Paul, Lakshmi Narasimhan Sundararajan, Nikhil Subhash Bhupale, Vinod Jayaraman, Goutham Rao
Filed: 29 Jun 22
Utility
aor56r0mm9z0fv0ddhh904xu2rka mvl6
13 Oct 22
A network storage system operates by: sending, to at least one storage unit of a storage network, at least one read request corresponding to at least a read threshold number of a set of encoded data slices to be retrieved, wherein the set of encoded data slices correspond to a data segment, wherein the data segment is codable in accordance with dispersed error coding parameters that include a write threshold number and the read threshold number, wherein the write threshold number is a number of encoded data slices in the set of encoded data slices and wherein the read threshold number is a number of the set of slices that is required to decode the data segment; receiving from the at least one storage unit, a first subset of encoded data slices of the set of encoded data slices, wherein the first subset of encoded data slices is missing at least one missing encoded data slice from the number of the set of slices that is required to decode the data segment and that was not received from the at least one storage unit in response to the at least one read request; generating at least one rebuilt encoded data slice corresponding to the at least one missing encoded data slice utilizing locally decodable redundancy data, wherein the locally decodable redundancy data includes a plurality of local redundancy slices generated from a second subset of the set of encoded data slices that includes the at least one missing encoded data slice; and recovering the data segment based on the at least one rebuilt encoded data slice and the first subset of encoded data slices.
Ilya Volvovski, Bruno H. Cabral, Manish Motwani, Thomas D. Cocagne, Timothy W. Markison, Gary W. Grube, Wesley B. Leggette, Jason K. Resch, Michael C. Storm, Greg R. Dhuse, Yogesh R. Vedpathak, Ravi V. Khadiwala
Filed: 27 Jun 22
Utility
2i5uzkvlmmc08g8nof2s yclouuwiclf4fl6s2hzndgs0ozw96k
13 Oct 22
A method begins with a processing module of a distributed storage network (DSN), receiving a request to access a data object stored in the DSN and identifying a first data descriptor associated with the data object, identifying a second data descriptor associated with the data object, identifying a first data index key and a first index structure for the first data descriptor and identifying a second data index key and a second index structure for the second data descriptor.
Greg R. Dhuse, Ilya Volvovski, Adam M. Gray, Andrew D. Baptist
Filed: 29 Jun 22
Utility
76r6z2huk5pjophwojeqmtvwu3u50vyv6hhg8ntfsvggrdm0vgk4aeyw
13 Oct 22
An exemplary method includes a data protection system detecting one or more delete requests to delete one or more recovery datasets of a storage system, determining that the one or more delete requests are inconsistent with a recovery dataset deletion pattern associated with the storage system, and determining, based on the determining that the one or more delete requests are inconsistent with the recovery dataset deletion pattern, that data stored by the storage system is possibly being targeted by a security threat.
Ronald Karr
Filed: 22 Jun 22
Utility
bzghbx75umuf5926fa4oruea830gn2owrdyv7mq42kj8aypu9dk4tfn3y
6 Oct 22
A method for execution by a computing device of a storage network includes determining an encoded data slice reduction scheme for a set of encoded data slices stored in a set of storage units of the storage network, where a data segment of data is encoded into the set of encoded data slices in accordance with encoding parameters, and where the encoding parameters include a pillar width number and a decode threshold number.
S. Christopher Gladwin, Gary W. Grube, Jason K. Resch
Filed: 16 Jun 22
Utility
3p2mcdenhf bzzlt3a9vhl4o7nn6uoeqzvfmg
6 Oct 22
Supporting a stateless controller in a storage system, including: sending, from a storage system controller to a storage device, a request for one or more locations of control information for the storage device, the storage system controller being external to the storage device; receiving, from the storage device, the one or more locations of one or more memory blocks that include the control information; and retrieving, from the storage device, the control information from the one or more memory blocks.
ERIC D. SEPPANEN
Filed: 21 Jun 22
Utility
4mpx9bn2gz3a926o3iy1t190
6 Oct 22
A method for execution by a computing device of a storage network includes obtaining at least a “T” number of encoded data slices of a set of encoded data slices, where a plurality of data chunks are all-or-nothing encoded in accordance with distributed data storage parameters to produce the set of encoded data slices.
Jason K. Resch, Wesley B. Leggette
Filed: 22 Jun 22
Utility
pc63zgh91h2g5h54pacuob86relu50dxyy2wbrkok8njjx2zm8d
6 Oct 22
Non-disruptively moving a storage fleet control plane, including deploying, on an edge device, one or more agents that are managed by a control plane residing in a cloud computing environment; mediating one or more API requests, generated by the control plane, directed to the one or more agents on the edge device; and migrating, in response to a first condition, the control plane to the edge device.
PRAKASH DARJI, LAWRENCE MERTES, TAHER VOHRA
Filed: 24 Jun 22
Utility
xpe ojy996xg597ex7bcgr1grwdbb8hzeh
6 Oct 22
Prioritizing highly performant storage systems for servicing a synchronously replicated dataset: detecting a communication fault between two or more storage systems that are synchronously replicating a dataset; identifying a preferred storage system for winning mediation, including determining that the preferred storage system winning mediation would result in better performance than other storage systems winning mediation; and requesting, by the preferred storage system, mediation from a mediation target.
RONALD KARR, JOHN COLGROVE, GANESH RAMANARAYANAN, DAVID GRUNWALD
Filed: 21 Jun 22
Utility
i13b554hpvedpwrqzo2xdrlkjma88ym10nyg0aoyebnh9f0d2otaji
6 Oct 22
Utilizing different data compression algorithms based on characteristics of a storage system, including: selecting, in dependence upon a priority for conserving processing resources or storage resources in a storage system, a data compression algorithm to utilize to compress data; detecting that at least one of an amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed; and responsive to detecting that at least one of the amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed, selecting a different data compression algorithm to utilize to compress data.
ETHAN MILLER, JOHN COLGROVE, JOERN ENGEL, CHRISTOPHER GOLDEN, NAVEEN NEELAKANTAM
Filed: 17 Jun 22
Utility
lmh6cwlpsxy68zsbw1xygdd7oudgu8qth47sx3fcc5lc2y jeokc6af44
6 Oct 22
A storage system performs data replication with a recovery point objective (RPO).
Abhishek Jain, Ronald Karr
Filed: 31 Mar 21
Utility
yubuuip014mhkc3eoqp475tbokz0kd5jo aul9bdsfaql7dm
29 Sep 22
Methods and apparatus for selection of memory devices in a distributed storage network.
S. Christopher Gladwin, Timothy W. Markison, Greg R. Dhuse, Thomas F. Shirley, JR., Wesley B. Leggette, Jason K. Resch, Gary W. Grube
Filed: 13 Jun 22
Utility
fqfkjqspi6q bidcmonofxh1oz
22 Sep 22
Optimizing copy operations in a storage array, includes combining, in dependence upon a metadata optimization policy, a plurality of copy operations into a single copy operation and splitting the single copy operation into an optimized set of executable copy operations that copy data based on memory alignment.
CHRISTOPHER GOLDEN, SCOTT SMITH, LUKE PAULSEN, DAVID GRUNWALD, JIANTING CAO
Filed: 28 Apr 22
Utility
c71xy 0kr3ig0jh73tb0j4
22 Sep 22
A method includes receiving data for storage and encoding the data to produce a plurality of data slices.
Renars W. Narubin, Jason K. Resch
Filed: 7 Jun 22
Utility
xoi8x z4ccddbvsj2megs
22 Sep 22
A storage system has NVRAM (nonvolatile random-access memory), storage memory that includes SLC (single level cell) flash memory and QLC (quad level cell) flash memory, and a processor.
Ying Gao, Boris Feigin, Hari Kannan
Filed: 2 Jun 22