8302 patents
Page 9 of 416
Utility
Methods and devices for writing data into a degraded array using a persistent cache
3 Oct 23
Embodiments of the present disclosure relate to methods, devices and computer program products for writing data in a disk array in a storage system.
Liam Xiongcheng Li, Xinlei Xu, Jian Gao, Lifeng Yang, Yousheng Liu
Filed: 23 Oct 18
Utility
Generating hexadecimal trees to compare file sets
3 Oct 23
First and second trees having entities identified by hexadecimal values are generated.
Yossef Saad, Itay Glick
Filed: 6 May 22
Utility
Method, electronic device, and computer program product for data transmission
3 Oct 23
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data transmission.
Qiang Chen, Zhenzhen Lin, Si Chen
Filed: 23 Feb 21
Utility
Intrusion Detection
28 Sep 23
Techniques are provided for intrusion detection on a computer system.
Kenneth Byrne
Filed: 2 Nov 22
Utility
Differential snapshot without array support
26 Sep 23
Methods, apparatus, and processor-readable storage media for implementing differential snapshots without array support are provided herein.
Thomas L. Watson
Filed: 30 Nov 20
Utility
Anomaly-based ransomware detection for encrypted files
26 Sep 23
Techniques are provided for anomaly-based ransomware detection of encrypted files.
Or Herman Saffar, Amihai Savir
Filed: 31 Jul 18
Utility
Alerting and managing data storage system port overload due to host path failures
26 Sep 23
Techniques for detecting and managing target port overloads due to host initiator or path failures may include: receiving I/Os from initiators of a host at target ports of a data storage system; determining initiator workloads for the initiators; determining target workloads for the target ports; determining that a first of the initiators of the host is a failed initiator that has stopped sending I/Os to the data storage system, wherein the first initiator has a first of the initiator workloads; determining, in accordance with the first initiator workload, revised target workloads for the target ports; determining, in accordance with revised target workloads, whether any of the target ports is expected to be overloaded; and responsive to determining that at least one of the target ports is expected to be overloaded, performing a corrective action to alleviate or reduce an overloaded workload condition expected for the at least one target port.
Krishna Deepak Nuthakki, Arieh Don
Filed: 27 Jan 21
Utility
Application aware cache management
26 Sep 23
Methods, apparatus, and processor-readable storage media for application aware cache management are provided herein.
Jai P. Gahlot, Shiv S. Kumar
Filed: 22 Jan 20
Utility
Destination namespace and file copying
26 Sep 23
Destination namespace and file copying: a namespace service receives communication of namespace update for file from file's source. and communicates namespace update for file to an access object service identified for file.
Philip Shilane, Abhinav Duggal, George Mathew
Filed: 28 Oct 21
Utility
Information uniqueness assessment using string-based collection frequency
26 Sep 23
Techniques are provided for assessing uniqueness of information using string-based collection frequency techniques.
Shou-Huey Jiang, Wenjin Liu, Chao Su
Filed: 29 May 20
Utility
Synchronous to semi-synchronous out-of-band i/o
26 Sep 23
Handling I/O operations between a storage system and a host includes initiating a direct data transfer for each of the I/O operations that initially excludes other processes from using a CPU of the host, setting a first timer for each of the direct data transfers, converting at least some of the direct transfers to semi-synchronous I/O operations that release the CPU for use by other processes and transfer data directly between the storage system and the host in response to the first timer expiring prior to completion of a corresponding one of the direct data transfers, and setting a second timer that corresponds to an expected completion of the semi-synchronous I/O operation.
Douglas E. LeCrone, Paul A. Linstead
Filed: 20 Apr 21
Utility
Communication issue detection using evaluation of multiple machine learning models
26 Sep 23
Techniques are provided for evaluating multiple machine learning models to identify issues with a communication.
Idan Richman Goshen, Shiri Gaber
Filed: 17 Aug 20
Utility
Methods, systems, and computer readable mediums for generating a curated user interface (UI) marker
26 Sep 23
Methods, systems, and computer readable mediums for generating a curated user interface (UI) marker are disclosed.
Vijaya Vamsi Krishna Reddy Alla
Filed: 16 Dec 14
Utility
Secure password log in on insecure devices
26 Sep 23
One example method includes logging into websites through devices including insecure devices.
Seth Jacob Rothschild, Benjamin Santaus, Orlando Xavier Nieves, Radia J. Perlman
Filed: 28 Jan 21
Utility
Method and system for performing data protection services using a subsystem level feedback mechanism
26 Sep 23
Techniques described herein relate to a method for managing performances of data protection services.
Gururaj Kulkarni, Shelesh Chopra
Filed: 23 Jul 21
Utility
Method and device for processing a multi-language text
19 Sep 23
Embodiments of the present disclosure provide a method and apparatus for processing a multi-language text.
Kun Wu Huang, Winston Lei Zhang, Chao Chen, Jingjing Liu, Duke Hongtao Dai
Filed: 26 Feb 21
Utility
Per-tenant cost calculation in multi-tenant data storage system
19 Sep 23
Techniques for calculating a per-tenant cost in a multi-tenant data storage system.
Tianqing Wang, Qiyan Chen, Robert B. Masson, Yun Zhang, Lin Peng
Filed: 25 Apr 19
Utility
Method and system for generating and assigning soft labels for data node data
19 Sep 23
Techniques described herein relate to a method for managing data of data nodes.
Paulo Abelha Ferreira, Vinicius Michel Gottin, Tiago Salviano Calmon
Filed: 31 Aug 21
Utility
Method and system for proactive data protection of virtual machines
19 Sep 23
A system for managing data protection of virtual machines (VMs) hosted by hosts of data clusters includes a data protection manager.
Gururaj Kulkarni, Anand Reddy
Filed: 27 Jan 21
Utility
Automated testing of functionality of multiple NVRAM cards
19 Sep 23
A system can validate multiple nonvolatile random-access memory (NVRAM) devices in parallel.
Steven Soumpholphakdy, Daniel Richard Thyken, Bradley Brian Bushard
Filed: 12 Jul 21