701 patents
Page 2 of 36
Utility
Optimized Machine Learning Telemetry Processing for a Cloud Based Storage System
21 Dec 23
Data associated with a first storage media of a cloud-based storage system is provided as an input to a machine learning model executed by a processing device that identifies one or more characteristics of the first storage media from the data.
PRAKASH DARJI, ANDREW R. BERNAT
Filed: 1 Sep 23
Utility
Ransomware-based Data Protection Parameter Modification
21 Dec 23
An illustrative method includes determining that a total amount of read traffic and write traffic processed by a storage system during a time period exceeds a threshold; determining a first compressibility metric associated with the write traffic; determining a second compressibility metric associated with the read traffic; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the total amount of read traffic and write traffic exceeding the threshold and on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, a data protection parameter set for one or more recovery datasets generated by the storage system.
Andrew Kutner, Ronald Karr, Andrew Miller, Patrick D. Lee, David Huskisson, Brian Carpenter, Cynthia Dote
Filed: 1 May 23
Utility
End-To-End Encryption For Storage Systems Using Data Properties
14 Dec 23
A method of providing end-to-end encryption for data stored in a storage system, including: receiving a request to read encrypted data from a logical volume of a storage system; decrypting the encrypted data using a decryption key associated with at least one property of the storage system; performing at least one of a data operation to reconstitute the data; encrypting the data using an encryption key associated with at least one property of the data to generate new encrypted data; and providing a response to the request that includes the new encrypted data.
JONAS R. IRWIN, ETHAN L. MILLER, JOHN D. DAVIS
Filed: 18 Aug 23
Utility
Management of Repeatedly Seen Data
14 Dec 23
A method for extending data lifetime for reference in deduplication is provided.
JOHN D. DAVIS
Filed: 30 Aug 23
Utility
Optimizing Availability Of Mediator Services For Storage Systems
7 Dec 23
A storage system switching mediators within a storage system synchronously replicating data, where the switching between mediators includes determining that availability of a first mediator service has decreased to a particular level, wherein the first mediator service can provide mediation services at the particular level to a plurality of storage systems and is external to the plurality of storage systems; and based on the determination, switching from use of the first mediator service to use of a second mediator service that is external to the plurality of storage systems.
DAVID GRUNWALD, RONALD KARR, THOMAS GILL
Filed: 22 Aug 23
Utility
Disaggregated Storage Systems For Hyperscale Deployments
7 Dec 23
Disaggregated storage systems for hyperscale deployments including retrieving workload metrics and a workload policy associated with a workload executing within a fleet of storage systems; accessing a fleet configuration of the fleet of storage systems; and generating, based on the workload metrics, the workload policy, and the fleet configuration, a fleet reconfiguration recommendation indicating a change to hardware installed on a storage system in the fleet of storage systems.
PRAKASH DARJI
Filed: 7 Jun 22
Utility
Application-Managed Fault Detection For Cross-Region Replicated Object Stores
7 Dec 23
Application-managed fault detection for cross-region replicated object stores is disclosed.
RONALD KARR, IVAN JIBAJA, NAVEEN NEELAKANTAM
Filed: 8 Aug 23
Utility
Providing Application-Side Infrastructure To Control Cross-Region Replicated Object Stores
7 Dec 23
Providing application-side infrastructure to control cross-region replicated object stores is disclosed.
RONALD KARR, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 8 Aug 23
Utility
Latency Reduction Of Flash-Based Devices Using Programming Interrupts
7 Dec 23
A read request with a high priority indication is received.
RONALD KARR, HARI KANNAN, ROBERT LEE, PETER E. KIRKPATRICK
Filed: 5 Jun 23
Utility
Targeted I/O To Storage Devices Based On Device Type
7 Dec 23
Writing data in a storage system that includes a first type of storage device and a second type of storage device, including: selecting, for one or more unprocessed write requests, a target storage device type from the first type of storage device and the second type of storage device; issuing a first group of write requests to the first type of storage device, the first group of write requests addressed to one or more locations selected in dependence upon an expected address translation to be performed by the first type of storage device; and issuing a second group of write requests to the second type of storage device, the second group of write requests addressed to one or more locations selected in dependence upon a layout of memory in the second type of storage device.
PETER KIRKPATRICK, JOHN COLGROVE, NEIL VACHHARAJANI
Filed: 17 Aug 23
Utility
Controlling The Direction Of Replication Between Cross-Region Replicated Object Stores
7 Dec 23
Controlling the direction of replication between cross-region replicated object stores is disclosed.
RONALD KARR, NAVEEN NEELAKANTAM, IVAN JIBAJA
Filed: 8 Aug 23
Utility
Read Requests in a Directory-Less Storage Network
30 Nov 23
A method for execution by a storage unit in a directory-less storage network includes receiving a read request regarding a data segment of a data object, where the data segment was error encoded into a set of encoded data slices.
Gary W. Grube, Timothy W. Markison
Filed: 9 Aug 23
Utility
Delaying Requested Deletion Of Datasets
30 Nov 23
Delaying deletion of a dataset, including: determining that deletion of a dataset at a storage system should be delayed by an amount of time representing a time period between a requested deletion time and a delayed deletion time; and delaying deletion of the dataset based on the determined amount of time.
CHENGUANG SUN, JEROEN ANTONIUS EGIDIUS HABRAKEN, CHIA-HAO KAN, QINGYU ZHANG, DAVID GRUNWALD, LARRY TOUCHETTE, JOHN COLGROVE
Filed: 15 Aug 23
Utility
Managing Brute Force Attacks in a Distributed Storage System
30 Nov 23
A method for execution in a storage network begins by performing a key derivation function on a password to produce a key and issuing a set of passwords based on the key to a set of storage units, where a data object is dispersed error encoded in accordance with dispersed error encoding parameters to produce a set of encoded data slices and the set of encoded data slices are stored in the set of storage units.
Jason K. Resch, Greg R. Dhuse, Bart R. Cilfone
Filed: 8 Aug 23
Utility
High Availability And Disaster Recovery For Replicated Object Stores
30 Nov 23
High availability and disaster recovery for replicated object stores is disclosed.
RONALD KARR
Filed: 8 Aug 23
Utility
Providing Non-Volatile Storage To Cloud Computing Services
30 Nov 23
Providing persistent storage to transient cloud computing services, including: creating a cloud computing instance, wherein the cloud computing instance is created on on-premises cloud infrastructure; and storing, in non-volatile storage in a storage system that is communicatively coupled to the on-premises cloud infrastructure, data associated with the cloud computing instance.
EMILY POTYRAJ, JOSHUA ROBINSON, BRIAN CARPENTER
Filed: 9 Aug 23
Utility
Efficient Creation And Management Of Snapshots
30 Nov 23
A method including, based on a request targeting a logical volume mapped to a logical grouping of data, splitting the logical grouping of data into two or more ranges including a first range and a second range, wherein lookups corresponding to one or more blocks targeted by the request are performed in the first range of the two or more ranges, and performing the request using the second range.
JOHN COLGROVE, ETHAN MILLER, JOHN HAYES, CARY SANDVIG, CHRISTOPHER GOLDEN, JIANTING CAO
Filed: 10 Aug 23
Utility
Cloud-Based Storage Management Of A Remote Storage System
30 Nov 23
Secure cloud-based storage system management that includes: extending a cloud-based storage management session by using cloud-based user credentials to securely manage a remote storage system, and executing, on the remote storage system, data storage operations generated from commands issued via the cloud-based storage management session.
SHIVA ANKAM, YU TAN, HONGKAI WU, ZIYUAN SONG, DIVYA MARLAPALLE, SAMRIDH SRINATH, MIRANDA STEELE
Filed: 1 Aug 23
Utility
Generating Multiple Sets of Integrity Information in a Vast Storage System
23 Nov 23
A method includes storing a plurality of data in a storage system.
Gary W. Grube, Timothy W. Markison, Sebastien Vas, Zachary J. Mark, Jason K. Resch
Filed: 1 Aug 23
Utility
Log Data Generation Based On Performance Analysis Of A Storage System
23 Nov 23
Dynamically adjusting an amount of log data generated for a storage system that includes a plurality of storage devices, including: detecting that a value for a performance-related characteristic of a component of a storage system has reached a performance threshold, and based on the detection, changing an extent to which log data should be generated for the component.
JOHN COLGROVE, SERGEY ZHURAVLEV
Filed: 7 Aug 23