3707 patents
Page 17 of 186
Utility
Using Inq to Optimize End-to-end Encryption Management with Backup Appliances
15 Dec 22
One example method includes receiving, by a backup appliance, a request concerning a dataset, performing, by the backup appliance, an inquiry to determine if end-to-end encryption is enabled for a volume of a target storage array, receiving, by the backup appliance, confirmation from the storage array that end-to-end encryption is enabled for the volume, and based on the confirmation that end-to-end encryption is enabled for the volume, storing the dataset in the volume without performing encryption, compression, or deduplication, of the dataset prior to storage of the dataset in the volume.
Jehuda Shemer, Arieh Don, Krishna Deepak Nuthakki
Filed: 9 Jun 21
Utility
Fast Failover of a Deduplicated File System Through Huge Memory Pages
15 Dec 22
A memory tier is established in a cluster system having a deduplicated file system.
Yong Zou, Rahul Ugale
Filed: 10 Jun 21
Utility
System and Method for Instant Access of Data In File Based Backups In a Backup Storage System Using Metadata Files
15 Dec 22
A method for managing file based backups (FBBs) includes obtaining, by a FBB metadata file manager, a FBB mount request for a FBB mount of a FBB from an application, wherein the application is executing in a production host environment, in response to the FBB mount request, the FBB metadata file manager: identifies a FBB in a backup storage system, obtains a FBB metadata file corresponding to the FBB from the backup storage system, performs an attribute analysis to identify the storage location attributes in the FBB metadata file, stores a FBB virtual file system in the production host environment using the storage location attributes, and enables access to the FBB virtual file system by the application.
Sunil Yadav, Ravi Vijayakumar Chitloor, Shelesh Chopra
Filed: 22 Jul 21
Utility
Method and System for Determine System Upgrade Recommendations
15 Dec 22
In general, embodiments of the invention relate to a method for generating upgrade recommendations.
Shelesh Chopra, Mahantesh Ambaljeri, Girish Chandra Belmanu Sadananda, Gururaj Kulkarni, Rahul Deo Vishwakarma
Filed: 29 Jul 21
Utility
Systems and Methods for Physical Capacity Estimation of Logical Space Units
15 Dec 22
Systems and methods of determining physical capacity of logical space units are disclosed.
Hemant P. Khachane, Paul J. Hammer
Filed: 14 Jun 21
Utility
Dynamically Redistributing I/o Jobs Among Operating System Threads
8 Dec 22
A thread may be de-activated (terminated or hibernated) or activated (e.g., re-activated or create anew if allowed) on a processing node, in response to which it may be desirable to redistribute the I/O jobs among the now active threads.
Varsha Shetty, Manickavasaham M. Senguden
Filed: 22 Jul 21
Utility
Method to Provide Recommendations for Cloud Storage Providers and Storage Classes Based on Backup Server's Usage Patterns for Lowering Overall Cloud Costs
8 Dec 22
A method, apparatus, and system determines an optimal storage configuration of storing backup data.
Jagannathdas Rath, Kalyan C. Gunda
Filed: 3 Jun 21
Utility
Data Migration Between Storage Systems
8 Dec 22
Described herein are techniques and mechanisms for migrating data in a flexible and platform-independent manner that does not require installation on a customer site to be executed.
Siva Shankari Chandrasekaran, Gopinath Sekar
Filed: 21 Jul 21
Utility
Software Upgrade Management for Host Devices In a Data Center
8 Dec 22
An apparatus comprises a processing device configured to receive, from a given host device in a given data center that utilizes a given piece of software, first configuration information associated with the given host device.
Shwetha C. Ravoor, Gopinath Marappan, Sanjib Mallick
Filed: 20 Jul 21
Utility
Deployment of Services with Dependencies
8 Dec 22
Metadata includes runtime dependencies for services that form an application.
ROGER CHE, ZAK LIANG, JAMES MORTON, LIHUI SU, MING ZHANG
Filed: 2 Jun 21
Utility
Continuous Data Protection In Cloud Using Streams
8 Dec 22
One example method includes performing a recovery operation.
Valerie Lotosh, Erez Sharvit, Jehuda Shemer
Filed: 3 Jun 21
Utility
Continuous Data Protection In Cloud Using Streams
8 Dec 22
One example method includes performing a recovery operation.
Valerie Lotosh, Erez Sharvit, Jehuda Shemer
Filed: 3 Jun 21
Utility
Logical Storage Device Access Using Per-vm Keys In an Encrypted Storage Environment
8 Dec 22
An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor and a memory, with the processor coupled to the memory.
Sanjib Mallick, Amit Pundalik Anchi
Filed: 14 Jul 21
Utility
Handling Configuration Drift In Backup Storage Systems
8 Dec 22
Embodiments for handling configuration drift in a data storage system having a plurality of storage nodes.
Jayanth K. Perneti, Vinay Sawal, Amitha Shetty
Filed: 15 Jul 21
Utility
Method of Resource Management of Virtualized System, Electronic Device and Computer Program Product
8 Dec 22
Techniques for managing resources of a virtualized system involve acquiring historical distribution data about a virtualized system, the historical distribution data indicating a historical distribution of resources occupied by workloads on a plurality of host machines of the virtualized system over a predetermined historical time period.
Jie Huang, Guoping Guan, Yunyun Duan
Filed: 10 Dec 21
Utility
Application Management Using Information Captured Via Emulating Execution of Tasks In Graphical User Interfaces
8 Dec 22
An apparatus comprises a processing device configured to receive a request to collect configuration information for a source application and to establish a connection to an application session associated with the source application.
Chirag Oza, Jignesh Patel, Nalin Shah, Diptiman Mukherjee, Siddesh K. Gunaji, Sitaram Kotnis
Filed: 20 Jul 21
Utility
Scaling of an Ordered Event Stream based on a Writer Group Characteristic
8 Dec 22
Scaling of an ordered event stream (OES) based on a characteristic of one or more writer groups is disclosed.
Mikhail Danilov, Konstantin Buinov
Filed: 3 Jun 21
Utility
Continuous Data Protection In Cloud Using Streams
8 Dec 22
One example method includes performing a recovery operation.
Valerie Lotosh, Erez Sharvit, Jehuda Shemer
Filed: 3 Jun 21
Utility
Transient Caching to Support Short-term Recall of Tiered Files
8 Dec 22
A method comprises receiving a request to configure a temporary cache associated with at least one storage array and configuring the temporary cache in response to the request.
Mithun Mahendra Varma, Rabi Shankar Shaw, Srikantha Kalaghatta, Sarat Kumar Behera
Filed: 19 Jul 21
Utility
Random Forest Classifier Class Association Rule Mining
8 Dec 22
Techniques described herein relate a method for explainability for Random Forest (RF) classifiers.
Paulo Abelha Ferreira, Adriana Bechara Prado
Filed: 4 Jun 21