3707 patents
Page 15 of 186
Utility
Method, Device and Computer Program Product for Resource Scheduling
22 Dec 22
A method, a device, and a computer program product for resource scheduling is disclosed.
Tao Chen, Bing Liu, Shuguang Gong
Filed: 30 Sep 21
Utility
Method, Electronic Device, and Computer Program Product for Data Protection
22 Dec 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data protection.
Chao LIN, Yuting ZHANG
Filed: 28 Jul 21
Utility
Method, Device, and Program Product for Managing Data Backup
22 Dec 22
According to certain disclosed techniques, tolerance time lengths respectively associated with backup sessions are acquired, wherein a tolerance time length represents the length of time in which data loss is tolerated during a failure of a source storage device associated with a backup session of the plurality of backup sessions.
Bo Liu
Filed: 20 Dec 21
Utility
Privacy Preserving Ensemble Learning As a Service
22 Dec 22
Techniques described herein relate to a method for predicting results using ensemble models.
Shiri Gaber, Ohad Arnon, Dany Shapiro
Filed: 18 Jun 21
Utility
Data Deduplication In a Disaggregated Storage System
22 Dec 22
A data deduplication process is performed in a storage system which includes storage nodes, and storage control nodes which can access data directly from each storage node.
Yosef Shatsky, Doron Tal
Filed: 18 Jun 21
Utility
Anti-piracy Protection Service-based Software License Management System to Prevent Usage of Unlicensed Software after the Trial Period
22 Dec 22
One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.
Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu
Filed: 17 Jun 21
Utility
Training Data Protection In Artificial Intelligence Model Execution Environment
22 Dec 22
Techniques for training data protection in an artificial intelligence model execution environment are disclosed.
Jinpeng Liu, Michael Estrin, Zhen Jia
Filed: 21 Jun 21
Utility
Resource Allocation Using Distributed Segment Processing Credits
22 Dec 22
Systems and methods for allocating resources are disclosed.
Keyur B. Desai
Filed: 26 Aug 22
Utility
Method to Provide Sla Based Access to Cloud Data In Backup Servers with Multi Cloud Storage
22 Dec 22
The disclosure provides a system, computer readable medium, and computer-implemented method for managing data access.
Kalyan C. Gunda, Jagannathdas Rath, Santi Gopal Mondal, Arun Vishnu PK, Veera Venkata Prasad Jagarlamudi
Filed: 17 Jun 21
Utility
Method and System for Performing Data Protection Services Using a Subsystem Level Feedback Mechanism
15 Dec 22
Techniques described herein relate to a method for managing performances of data protection services.
Gururaj Kulkarni, Shelesh Chopra
Filed: 23 Jul 21
Utility
Interface to Mount Virtual Disks from Multiple Sources
15 Dec 22
One example method includes an interface for mounting virtual disks from multiple sources.
Abinas Tewari
Filed: 14 Jun 21
Utility
Non-disruptive Firmware Upgrade of Asymmetric Hardware Accelerator Systems
15 Dec 22
In an asymmetric hardware accelerator system, a hardware accelerator configured to handle workloads of a particular type that have a lowest CPU utilization as compared to workloads of other types being handled by other hardware accelerators configured to handle the other types of workloads is identified.
Tao Chen, Yong Zou, Ran Liu
Filed: 14 Jun 21
Utility
System and Method for Estimation of Time to Completion for Heterogeneous Application Upgrades In a Customer Environment
15 Dec 22
A method for managing a client environment includes identifying, by an application upgrade monitoring agent, the application upgrade for an application, in response to the identifying: obtaining device configuration information associated with a client device executing an instance of the application, wherein the client device is executing on the client environment, sending an upgrade time estimation request to a device emulation system, wherein the upgrade time estimation request comprises the device configuration information, obtaining, in response to the upgrade time estimation request, an upgrade estimation from the device emulation system, wherein the upgrade estimation specifies a period of time the application upgrade is expected to take to complete on the client device, and initiating execution of the application upgrade on the client device based on the upgrade estimation.
Parminder Singh Sethi, Lakshmi Nalam, Vasanth DS, Shelesh Chopra
Filed: 27 Jul 21
Utility
Method and System for Determining Favorability of Upgrade Window
15 Dec 22
Techniques described herein relate to a method for deploying workflows with data management services.
Shelesh Chopra, Hemant Ramesh Gaikwad, Rahul Deo Vishwakarma
Filed: 27 Jul 21
Utility
System and Method for a Specialized Backup Operation of File Based Backups Based on a Target Backup Storage System
15 Dec 22
A method for managing file based backups (FBBs) includes obtaining, by a backup agent, a FBB generation request for a file system at a point in time, in response to the FBB generation request: identifying a target backup storage system in which to store the FBB, identifying a target exposed application programming interface (API) associated with the target backup storage system, generating a FBB corresponding to the FBB generation request, wherein the FBB comprises a FBB metadata file, wherein the FBB is in a common data streaming format (CDSF), generating an API command based on the FBB and the target exposed API, and initiating storage of the FBB in the target backup storage system using the API command.
Sunil Yadav, Ravi Vijayakumar Chitloor, Shelesh Chopra
Filed: 22 Jul 21
Utility
Source Versus Target Metadata-based Data Integrity Checking
15 Dec 22
A method and system for source versus target metadata-based data integrity checking.
Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda
Filed: 26 Jul 21
Utility
Method and System for Mapping Data Protection Services to Data Cluster Components
15 Dec 22
Techniques described herein relate to a method for managing data protection services for data clusters.
Mohammed Abdul Samad, Prakash Appayya Acharya, Shelesh Chopra, Pradeep Kumar Tulagapu
Filed: 27 Jul 21
Utility
Restricted Data Transfer
15 Dec 22
One example method includes receiving, by a first computing entity from a second computing entity, a request for data, providing, by the first computing entity, a compliance API (Application Program Interface) to the second computing entity, receiving, by the first computing entity from the second computing entity, location information and/or data compliance information, by way of the compliance API, consulting, by the first computing entity, a mapping, and determining, based on information in the mapping and the location information and/or data compliance information, whether or not the data is permitted to be transmitted by the first computing entity to the second computing entity, and either transmitting the data to the second computing entity, or not transmitting the data to the second computing entity, based on data tags, the information in the mapping and the location information and/or data compliance information.
Michael Roche, Michal Drozd, Scott Quesnelle
Filed: 9 Jun 21
Utility
Leveraging File-based Backups to Facilitate Bare-metal and System-state Recovery Operations
15 Dec 22
A method and system for leveraging file-based backups to facilitate bare-metal recovery (BMR) and/or system-state recovery (SSR) operations.
Sunil Yadav, Shelesh Chopra
Filed: 27 Jul 21
Utility
Persistent Memory Tiering Supporting Fast Failover In a Deduplicated File System
15 Dec 22
A memory tier including persistent memory (PMEM) devices is established in nodes of a cluster system having a deduplicated file system.
Yong Zou, Rahul Ugale
Filed: 10 Jun 21