3707 patents
Page 12 of 186
Utility
Method, Device and Computer Program Product for Storage System Management
26 Jan 23
A technique for managing a storage system involves determining, in response to a first write operation on a first data block on a persistent storage device, whether a first group of data corresponding to the first data block is included in a cache; updating the first group of data in the cache if it is determined that the first group of data is included in the cache; and adding the first group of data to an associated data set of the cache to serve as a first record.
Ming Zhang, Chen Gong, Qiaosheng Zhou
Filed: 10 May 22
Utility
Method of Inputting and Outputting Data, Electronic Device and Computer Program Product
26 Jan 23
A method, an electronic device, and a computer program product for inputting and outputting data is disclosed.
Long Wang, Shuguang Gong
Filed: 22 Oct 21
Utility
Request Processing for Configurable Information Technology Solutions
26 Jan 23
Methods, apparatus, and processor-readable storage media for request processing for configurable information technology solutions are provided herein.
Varahala R. Kalidindi, Niall Brady
Filed: 21 Jul 21
Utility
Model Optimization Method, Electronic Device, and Computer Program Product
26 Jan 23
Embodiments of the present disclosure relate to a model optimization method, an electronic device, and a computer program product.
Jiacheng Ni, Zijia Wang, Jinpeng Liu, Zhen Jia
Filed: 16 Aug 21
Utility
Method, Electronic Device, and Computer Program Product for Image Processing
26 Jan 23
Embodiments of the present disclosure provide a method, an electronic device, and a program product for image processing.
Pedro Fernandez Orellana, Qiang Chen
Filed: 12 Aug 21
Utility
Edge Function Bursting
26 Jan 23
One example method includes determining that local resources at an edge site are inadequate to support performance of a function needed by software running on the edge site, invoking a client agent, in response to invoking the client agent, receiving an execution manifest, determining, by the client agent, where to execute the function, wherein the determining comprises identifying a target execution environment for the function and the determining is based in part on information contained in the execution manifest, and transmitting, by the client agent, the execution manifest to a server agent of the target execution environment, and the execution manifest facilitates execution of the function in the target execution environment.
Amy N. Seibel, Victor Fong, Eric Bruno
Filed: 22 Jul 21
Utility
Multiple Virtual Namespaces on a Single Physical Namespace to Avoid File System Restarts and Improve Availability
26 Jan 23
One example method includes defining a physical namespace, determining a number of virtual namespaces, virtualizing the physical namespace by defining the virtual namespaces on the physical namespace, and generating a modified lookup key that is a function of a name of one of the virtual namespaces.
Shashikanth Lakshmikantha, Sankalp Suhas Taralekar
Filed: 15 Jul 21
Utility
Systems and Methods for Peripheral Device Security
26 Jan 23
A method for authenticating a peripheral device, that includes detecting, by a baseboard management controller (BMC), a presence of the peripheral device, receiving authentication credentials from the peripheral device, making a determination, based on the authentication credentials, that the peripheral device is authentic, and sending, in response to the determination, a command to open a peripheral communication channel with the peripheral device.
Austin Patrick Bolen, Chandrashekar Nelogal
Filed: 23 Jul 21
Utility
Method, Electronic Device, and Computer Program Product for Sample Management
26 Jan 23
A method in an illustrative embodiment includes determining a first set of distilled samples from a first set of samples based on a characteristic distribution of the first set of samples, the first set of samples being associated with a first set of classifications.
Zijia Wang, Jiacheng Ni, Wenbin Yang, Zhen Jia
Filed: 17 Aug 21
Utility
Digital Twin Architecture for Multi-access Edge Computing Environment
26 Jan 23
Techniques are disclosed for generating a virtual representation (e.g., one or more digital twin models) of a multi-access edge computing system environment, and managing the multi-access edge computing system environment via the virtual representation.
Danqing Sha, Zhen Jia, Kenneth Durazzo, Min Zhao, Anzhou Hou, Bin He
Filed: 20 Jul 21
Utility
Distributed / Multi-level Server Authentication
19 Jan 23
Methods, system, and non-transitory processor-readable storage medium for distributed and multi-level server authentication are provided herein.
Victor Salamon, Paul Berube
Filed: 15 Jul 21
Utility
True Secure Airgap
19 Jan 23
Techniques for securely monitoring an air-gapped machine.
Stav Sapir, Naor Radami, Jehuda Shemer, Amihai Savir
Filed: 19 Jul 21
Utility
Selecting Surviving Storage Node Based on Environmental Conditions
19 Jan 23
A method may select a surviving storage node based on environmental conditions.
David Meiri, Xiangping Chen
Filed: 19 Jul 21
Utility
Method, Device, and Program Product for Extending Storage System
19 Jan 23
A technique extends a storage system that includes a first storage resource pool that is generated using a first plurality of storage devices and based on a first storage array standard.
Sheng Wang, Dapeng Chi, Fang Yuan, Chunhao Ni, Kui Zhai
Filed: 11 May 22
Utility
Mapping Telemetry Data to States for Efficient Resource Allocation
19 Jan 23
Techniques described herein relate to a method for resource allocation using fingerprint representations of telemetry data.
Eduardo Vera Sousa, Tiago Salviano Calmon
Filed: 15 Jul 21
Utility
Word Aware Content Defined Chunking
19 Jan 23
One example method includes, in a data buffer that includes one or more words and whitespaces, calculating a hash value of data in a window that is movable within the data buffer, comparing the hash value to a mask, and when the hash value matches the mask, identifying a position of the window in the data buffer as a chunk anchor position, searching for a whitespace nearest the chunk anchor position, and designating an offset of the whitespace as a segment boundary.
Philip N. Shilane
Filed: 15 Jul 21
Utility
File System Content Obfuscation in High Security Environments
19 Jan 23
A system can receive, from user input, request data indicative of a request to create a file with a first filename.
Barbara Ballard
Filed: 16 Jul 21
Utility
Automated Services Exchange
19 Jan 23
Methods, apparatus, and processor-readable storage media for providing an automated services exchange are described herein.
Victor Salamon
Filed: 19 Jul 21
Utility
Automated Testing of Functionality of Multiple NVRAM Cards
19 Jan 23
A system can validate multiple nonvolatile random-access memory (NVRAM) devices in parallel.
Steven Soumpholphakdy, Daniel Richard Thyken, Bradley Brian Bushard
Filed: 12 Jul 21
Utility
Journal Parsing for Object Event Generation
19 Jan 23
A system can register a first client and a second client to respectively receive information about updates to a write-ahead log structured storage engine that comprises a log.
John Abercrombie, Grigorii Skripko, Sumith Chandra Reddy Nimmala
Filed: 16 Jul 21