8302 patents
Page 6 of 416
Utility
Optimized pipeline to boost de-dup system performance
7 Nov 23
A deduplication pipeline method to enable shorter overall latency, servicing of multiple calls in parallel, and implementing higher data compression ratio.
Shuguang Gong, Yong Zou, Jet Chen
Filed: 29 Sep 20
Utility
On-the-fly PiT selection in cloud disaster recovery
7 Nov 23
On-the-fly point-in-time recovery operations are disclosed.
Tomer Kushnir, Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 9 Dec 22
Utility
Global data deduplication across multiple distributed file systems
7 Nov 23
A write request is transmitted from a client to a metadata server (“MDS”), wherein the write request comprises an object identifier associated with a data object.
Rajiv Desai
Filed: 30 Sep 19
Utility
Fabricless allocation of cache slots of local shared caches with cache slot recycling in a fabric environment
7 Nov 23
Worker threads allocate at least some recycled cache slots of a local portion of a shared memory to the compute node to which the memory portion is local.
Steve Ivester, Kaustubh Sahasrabudhe
Filed: 17 Mar 21
Utility
Granular data replication
7 Nov 23
Embodiments for granular replication of data with high efficiency.
Charles J. Hickey, Murthy V. Mamidi, Neerajkumar Chourasia
Filed: 20 Sep 21
Utility
Method and system for implementing a pre-check mechanism in a technical support session
7 Nov 23
In general, embodiments relates to a method for managing a technical support session, comprising: obtaining technical support question from a technical support person (TSP) that is conducting the technical support session; determining that the technical support question is a duplicate of a prior technical support question; in response to the determination, obtaining a quality score for the technical support question; and displaying the quality score to the TSP in a user interface on a technical support system that the TSP is using the conduct the technical support session.
Shelesh Chopra, Parminder Singh Sethi, Akanksha Goel
Filed: 15 Oct 21
Utility
Data managing method, an electric device, and a computer program product for efficient management of services
7 Nov 23
A method, an electronic device, and a computer program product for data management is disclosed.
Weiyang Liu, Lihui Su, Min Liu, Qi Wang, Ming Zhang
Filed: 21 Apr 21
Utility
Techniques for storage management
7 Nov 23
Techniques for managing storage may comprise: receiving a request for a first amount of free capacity, wherein the request includes a first priority denoting a purpose for which the first amount of free capacity is requested; determining whether a current utilization of storage exceeds a first threshold associated with the first priority; responsive to determining the current utilization of storage is less than the first threshold associated with the first priority, performing first processing including: determining whether there is a sufficient amount of existing free capacity to grant the first amount; and responsive to determining there is a sufficient amount of existing free capacity to grant the first amount, granting the first amount of free capacity; and responsive to determining the current utilization of storage is not less than the first threshold associated with the first priority, rejecting the request and not granting the first amount of free capacity.
Vamsi K. Vankamamidi, Philippe Armangau, Shuyu Lee
Filed: 26 Jul 22
Utility
Connecting configuration services using blockchain technology
31 Oct 23
Methods, apparatus, and processor-readable storage media for connecting configuration services using blockchain technology are provided herein.
Ashish Kumar Palo, Sathish Kumar Bikumala
Filed: 14 Apr 21
Utility
Virtual tiering
31 Oct 23
A System, Computer Program Product, and computer-executable method for managing a virtual network, the System, Computer Program Product, and computer-executable method comprising receiving a request to create the virtual network, creating a policy based on a catalog virtual network resources, and implementing the virtual network based on the created policy.
Christopher J. Gaudlip
Filed: 30 Dec 14
Utility
Active-passive configuration for synchronous remote replication in an active-active metro cluster
31 Oct 23
In one aspect, an example methodology implementing the disclosed techniques includes creating, by a first site of a volume that supports active-active bidirectional replication, a local copy of the volume, the local copy of the volume configured to be active.
Dmitry Tylik, Carole Gelotti, David Meiri, Girish Sheelvant, Nagasimha Haravu, Aharon Blitzer
Filed: 21 Apr 21
Utility
Managing storage resources allocated to copies of application workloads
31 Oct 23
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Prashant Pokharna, Sunil Kumar, Shivasharan Dalasanur Narayana Gowda
Filed: 15 Dec 20
Utility
Method and system for maintaining live database data across hybrid storage
31 Oct 23
A method and system for maintaining live database data across hybrid storage.
Navneet Upadhyay, Shelesh Chopra, Amith Ramachandran, Soumen Acharya
Filed: 6 Sep 19
Utility
Techniques for efficient data deduplication
31 Oct 23
Data deduplication techniques may use a fingerprint hash table and a backend location hash table in connection with performing operations including fingerprint insertion, fingerprint deletion and fingerprint lookup.
Peng Wu, Bin Dai, Rong Yu
Filed: 14 Jul 22
Utility
Machine learning-based anomaly detection using time series decomposition
31 Oct 23
Methods, apparatus, and processor-readable storage media for machine learning-based anomaly detection using time series decomposition are provided herein.
Zachary W. Arnold, Bina K. Thakkar, Peter Beale
Filed: 30 Jul 19
Utility
Authentication Token Management for Multiple Processes and Representational State Transfer Clients
26 Oct 23
Embodiments for processing authentication tokens in a system with multiple Representational State Transfer (REST) servers and clients.
Vaneeswaran N, Pushpendra Sinha
Filed: 28 Jun 23
Utility
Method to Efficiently Transfer Support and System Logs from Air-gapped Vault Systems to Replication Data Sources by Re-utilizing the Existing Replication Streams
26 Oct 23
One example method includes, at a replication data source, initiating a replication process that includes transmitting a replication stream to a replication destination vault, and data in the replication stream is transmitted by way of a closed airgap between the replication data source and the replication destination vault, switching, by the replication data source, from a transmit mode to a receive mode, receiving, at the replication data source, a first checksum of a file, and the first checksum and file were created at the replication destination vault, receiving, at the replication data source, the file, calculating, at the replication data source, a second checksum of the file, and when the second checksum matches the first checksum, ending the replication process.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 29 Jun 23
Utility
Hash migration using a gold image library management system
24 Oct 23
Embodiments for migrating hash values for backup data blocks in a network of data protection targets (DPTs) and a common data protection target implementing a Gold image library management system in which backups of Gold images used as templates for physical machines and virtual machines are stored on the CDPT.
Arun Murti, Mark Malamut, Stephen Smaldone
Filed: 12 Mar 21
Utility
Interface to mount virtual disks from multiple sources
24 Oct 23
One example method includes an interface for mounting virtual disks from multiple sources.
Abinas Tewari
Filed: 14 Jun 21
Utility
Near continuous data protection without using snapshots
24 Oct 23
One example method includes performing delta operations to protect data.
Jehuda Shemer, Ravi Vijayakumar Chitloor
Filed: 27 Oct 21