3707 patents
Page 13 of 186
Utility
Automatic Selection of Network Path Connecting Backup Clients to a Pool of Multiple Backup Storage Appliances
19 Jan 23
Information is stored that maps storage units to a pool of data protection appliances on which the storage units reside.
Vikas Chaudhary, Sirisha Kaipa, Donna Barry Lewis, Viral Mehta, Madhura Srinivasa Raghavan
Filed: 15 Jul 21
Utility
Data Security Classification for Storage Systems Using Security Level Descriptors
19 Jan 23
A security level tagging process to enable a user to associate a security level descriptor with a file, or a namespace directory where files and subdirectories inherit the security level descriptor from a parent directory.
Anand Rudrabhatla, George Mathew
Filed: 16 Jul 21
Utility
Write-in-Place Multipart Uploads
19 Jan 23
A system can receive a file in parts.
Takafumi Yonekura, Jeffrey Tremaine
Filed: 16 Jul 21
Utility
N-way Active-active Storage Configuration Techniques
12 Jan 23
A stretched volume may be configured from N volumes of N data storage systems configured as a cluster.
David Meiri, Xiangping Chen
Filed: 6 Jul 21
Utility
Read Stream Identification In a Distributed Storage System
12 Jan 23
An apparatus comprises at least a first storage node of a plurality of storage nodes of a distributed storage system.
Doron Tal
Filed: 12 Jul 21
Utility
Using Drive Compression In Uncompressed Tier
12 Jan 23
In a storage system such as a SAN, NAS, or storage array that implements hierarchical performance tiers based rated drive access latency, on-drive compression is used on data stored on a first tier and off-drive compression is used on data stored on a second tier.
James M Guyer
Filed: 6 Jul 21
Utility
System and Method for Secure Authentication of Backup Clients Using Short-term Tokens
12 Jan 23
Embodiments for a system and method for secure authentication of backup clients in a way that eliminates the need to create users for backup client authentication anywhere in the backup ecosystem, and which eliminates the need for credentials, such as passwords that need protection, updating and synchronization.
Senthil Ponnuswamy, Donna Barry Lewis, Andrew R. Huber, Naveen Rastogi, George Mathew
Filed: 6 Jul 21
Utility
Feature Resource Self-Tuning and Rebalancing
12 Jan 23
An apparatus comprises at least one processing device that includes a processor coupled to a memory.
Xiangping Chen, David Meiri
Filed: 8 Jul 21
Utility
Request Manager Framework
12 Jan 23
Techniques for managing sequencing requests for storage node operations based on types of operations being sequenced.
Peerapat Luxsuwong, Sathya Krishna Murthy, Charles Christopher Bailey
Filed: 8 Jul 21
Utility
Meta Data Driven Upgrades
5 Jan 23
Performing upgrades may include: receiving a package including upgrade types each identifying a different upgrade subcomponent of the package; receiving a metadata file describing the package; receiving selection information identifying one or more of the upgrade types of the metadata file, wherein the one or more upgrade types identified by the selection information denote one or more corresponding upgrade subcomponents of the package to be upgraded; and performing first processing that upgrades a system in accordance with the metadata file and the selection information.
Alex Kulakovsky, Sally Golan
Filed: 1 Jul 21
Utility
Method, Device, and Program Product for Managing Computing System Based on Client/server Architecture
5 Jan 23
A technique manages a computing system based on a client/server architecture.
Jibing Dong, Jian Gao, Jianbin Kang, Hongpo Gao, Shaoqin Gong
Filed: 6 May 22
Utility
Space-efficient Storage of System-monitoring Data
5 Jan 23
An amount of storage space required to maintain counter information for a storage system is reduced without reducing a temporal granularity or tracking granularity of the counter information.
Abhilash Sanap, Sunil Gumaste, Pankaj Soni, Ravish Sachdeva, Malak Alshawabkeh
Filed: 30 Jun 21
Utility
Reducing False Positive Failure Events In a Health Monitoring System Using Directional Graphs
5 Jan 23
Embodiments for reducing panic shutdown of components in a pipelined data processing system.
Nitin Madan, Fani Jenkins, Deepa Ramesh, Gobikrishnan Sundharraj
Filed: 30 Jun 21
Utility
Balanced Winner Assignment for Deadlock Resolution
5 Jan 23
Processing may be performed in accordance with a policy to assign roles of winner and loser between two nodes.
Vladimir Shveidel, Amitai Alkalay, Bar David
Filed: 1 Jul 21
Utility
Systems and Methods for Replication Time Estimation In a Data Deduplication System
5 Jan 23
Systems and methods for of determining a replication time in a deduplicated file system are disclosed.
Hemant P. Khachane, Banuprakash Ganga Muniyappa, Paul J. Hammer
Filed: 30 Jun 21
Utility
Techniques for Replicating Management Data
5 Jan 23
Techniques for processing commands may include: initially synchronizing a target database of volume reservation and registration information with a source database of volume reservation and registration information; while initially synchronizing the target database with the source database, enabling volume reservation and registration command processing on both a first node managing the source database and a second node managing the target database; while initially synchronizing the target database with the source database, performing first processing to service a first command that is any of a reservation command and a registration command for a first volume; and after initially synchronizing the target database with the source database, using the target database of the second node when servicing reservation and registration commands received at both the first node and the second node.
Yuval Harduf, Yuri Stotski, Chen Reichbach
Filed: 21 Mar 22
Utility
Classifying Data and Enforcing Data Access Control Using a Context-based Hierarchical Policy
5 Jan 23
One example method includes receiving a request from a user to access data stored in a filesystem, in response to the request, retrieving metadata of the data and metadata of the user, validating the metadata of the data and the metadata of the user against a data access rule, and granting the user access to the data upon successful validation of the metadata of the data and the metadata of the user.
Farida Shafik, Joel Christner, Nicole Reineke
Filed: 30 Jun 21
Utility
Early-warning Data-informed Business Spend and Actuation
5 Jan 23
Data management is disclosed that detects changes in production or potential changes in production to trigger business decisions that inform business spend.
Nicole Reineke, Stephen J. Todd
Filed: 30 Jun 21
Utility
Method, Device, and Program Product for Managing Storage System
5 Jan 23
A technique manages a storage system.
Jun Hu, Jinqing Xu
Filed: 6 May 22
Utility
Replication for Cyber Recovery for Multiple Tier Data
5 Jan 23
Replication of a filesystem or a mount point or share may replicate all data that it consists of irrespective of where the data is stored.
Nitin Madan, Kalyan C. Gunda, Bhimsen Bhanjois
Filed: 2 Sep 22