3707 patents
Page 23 of 186
Utility
Method, Electronic Device and Computer Program Product for Managing Disks
27 Oct 22
Techniques for managing disks involve: determining, from multiple disks, a first disk set for providing redundant storage, the number of disks included in the first disk set being not less than a first threshold number that corresponds to the number of disks required to be included in a redundant array of independent disks; determining, based on the multiple disks, a candidate solution in which at least the first disk set is used to provide redundant storage; determining an unavailable capacity that the candidate solution will have; and determining, based on the unavailable capacity and the candidate solution, a target solution for providing the redundant storage.
Haiyun Bao, Changrui Shao, Rongrong Shang, Haiying Tang, Baoan Yuan
Filed: 22 Nov 21
Utility
Recovery from Partial Device Error In Data Storage System
27 Oct 22
Techniques are provided to recover from partial device errors of storage devices in a data storage system.
Doron Tal, Yoav Peled, Itay Keller, Asaf Porath, Neta Peleg
Filed: 21 Apr 21
Utility
kprefop2s2y993k5qqx37r31pduzrg
27 Oct 22
Techniques described herein relate to a method for reporting database backup information.
Rachana Murthy, Shelesh Chopra, Ban Wang, Hari Palani, Amith Ramachandran
Filed: 21 Apr 21
Utility
2rdar6323uibsyn3afs5qdy2x2z8ha2tcomgc9s3bwxn
27 Oct 22
A three-phase full quorum commit method enabling backing up of network devices that do not offer direct hooks in order to have application consistent protection.
Adam Brenner, Mark Malamut, Arun Murti
Filed: 21 Apr 21
Utility
bdc1rdz1be5v ad0a7fond9frty383fh3t
27 Oct 22
Techniques described herein relate to a method for backing up virtual machines.
Manjunath Jagannatha, Kiran Kumar Madiraju Varadaraju, Ravi Kishore Yadav Rangapuram
Filed: 21 Apr 21
Utility
kv0me1inj15rgdavlwps6
27 Oct 22
Techniques described herein relate to a method for generating backups of assets.
Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra, Sunil Yadav
Filed: 23 Apr 21
Utility
nw6emuig n1v4ez1dm2pne2zg277ztrrzf2b
27 Oct 22
A method for providing data protection services to service devices that provide computer implemented services for clients and host resources used to provide the computer implemented services to the clients includes obtaining a resource discovery request for a service device of the service devices.
Asif Khan, Jayashree B. Radha, Ashish Kumar, Pati Mohan, Pawan Singh, Yasemin Ugur-Ozekinci, Shelesh Chopra, Amrit Lal Jain
Filed: 21 Apr 21
Utility
ufsfpt5v 9mi5uwk4b37uzxtzfhrjxyouv2
27 Oct 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for presenting I/O write records.
Changxu Jiang, Fei Wang
Filed: 19 Nov 21
Utility
doz83lq 4a0dmk7fsqtkim1kl5yqksqrvbwknzfwv2xrewpkqai7xhta1nb8
27 Oct 22
Techniques described herein relate to a method for generating backups of virtual machines.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 23 Apr 21
Utility
iwp1sgu7v0s6 vomj1wiu85b3ev7u18zsgr
27 Oct 22
Techniques described herein relate to a method for deploying workflows with data management services.
John S. Harwood, Robert Anthony Lincourt, JR., William Jeffery White
Filed: 21 Apr 21
Utility
fmh2yp90fu7bame39mnlfnm
27 Oct 22
Embodiments for recording application program interface (API) calls through an API recorder component or process that captures API calls as they are used by a number of users.
Mark Malamut, Adam Brenner, Arun Murti
Filed: 21 Apr 21
Utility
4570bqjckxom25qlrdns7kjgrk3db63kcqejma4qv0ra
27 Oct 22
A technique performs data reduction on host data of a write request during ingest under certain circumstances.
Vamsi K. Vankamamidi, Ronen Gazit
Filed: 21 Apr 21
Utility
q6av1jvv0z2oxpx5odsn8xefz75qjinm6k5f3xlsmto
27 Oct 22
Facilitating checkpoint locks for distributed systems is provided herein.
Ronald Steinke
Filed: 5 Jul 22
Utility
fnwfvsqthw90dl vcnafp3202smfvefxhy661sfjy51lg3ou
27 Oct 22
A current retention mode is identified as being one of conservative or aggressive.
Mengze Liao, Scott Quesnelle, Yasemin Ugur-Ozekinci, Jin Ru Yan, Mike Xiaoliang Zhu
Filed: 21 Apr 21
Utility
g6r7ypg7956oegfqdgosl5e7fhc2u534rd4c7x24pwv5nkztwezz3g62dzci
27 Oct 22
Techniques described herein relate to a method for optimizing workflow execution.
John S. Harwood, Robert Anthony Lincourt, JR., William Jeffery White
Filed: 21 Apr 21
Utility
r8ut43et51n8gq9jtx15yj033mrwqin35fw5yonrjgv2qqrc7mg1
27 Oct 22
Techniques described herein relate to a method for deploying workflows.
John S. Harwood, Robert Anthony Lincourt JR, William Jeffery White
Filed: 21 Apr 21
Utility
5if5ljbma5k8b0v9uitq3znec1ot533py
27 Oct 22
File annotation is described.
Min Gong, Qicheng Qiu, Jiacheng Ni
Filed: 30 Jun 21
Utility
fedifmaby8g9gx40o1qe7w6mbec8s1c9p38w79lsrc66j850ecesdepb2
27 Oct 22
Techniques described herein relate to a method for provisioning workflows with data transformation services.
John S. Harwood, Robert Anthony Lincourt, JR., Bhavesh Govindbhai Patel, William Price Dawkins, William Jeffery White
Filed: 21 Apr 21
Utility
kvewds5zguu3r lyxx8g
27 Oct 22
Embodiments of the present disclosure relate to a method for processing data, an electronic device, and a computer program product.
Min Gong, Jiacheng Ni, Qicheng Qiu
Filed: 30 Jun 21
Utility
c2esto7zu9bnng9ru8nw82q4pdvldmdb52obanbguyectux4tqr7gas
27 Oct 22
Techniques described herein relate to a method for performing data protection services for data stored in a shared storage.
Shelesh Chopra, Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal
Filed: 23 Apr 21