3707 patents
Page 25 of 186
Utility
Performance Scale Testing with I/o Reuse
20 Oct 22
A host performs benchmark I/O operations for a storage system by an application on the host formulating a performance test command, providing the performance test command to a channel subsystem layer of the host that actuates communication hardware that provides signals to the storage system, and performing a plurality of benchmark I/O operations at the channel subsystem layer in response to a single performance test command by actuating the communication hardware that provides signals to the storage system.
Douglas E. LeCrone, Jeffrey L. Jones
Filed: 19 Apr 21
Utility
Data Storage Cluster with Quorum Service Protection
20 Oct 22
In a protective quorum service, during an initial period of normal operation in which a clustered pair of data storage nodes provide host I/O access to a data storage object and replicate write-type requests to each other, the nodes are first registered to the quorum service.
Dmitry Nikolayevich Tylik, David Meiri, Carole Gelotti
Filed: 16 Apr 21
Utility
NVMEoF Flow Control from Initiator Based on Transaction Latency
20 Oct 22
A storage array that uses NVMEoF to interconnect compute nodes with NVME SSDs via a fabric and NVME offload engines implements flow control based on transaction latency.
Jinxian Xing, Julie Zhivich, John Krasner
Filed: 20 Apr 21
Utility
Automatically Validating Design Parameters for Enterprise Applications
20 Oct 22
Methods, apparatus, and processor-readable storage media for automatically validating design parameters for enterprise applications are provided herein.
Rishav Sethia, Vivek Bhargava, Shubham Gupta
Filed: 20 Apr 21
Utility
Optimizing Docker Image Encryption - Tradeoff Between Performace and Protection Level
20 Oct 22
One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 30 Jun 22
Utility
Method, Electronic Device and Computer Program Product for Copying Data
20 Oct 22
Techniques for replicating data involve: determining overwritten probabilities of a plurality of data blocks of a source storage device.
Yuanyang Wu, Yifeng Lu
Filed: 4 Nov 21
Utility
Method, Electronic Device and Computer Program Product for Managing a Storage System
20 Oct 22
Techniques for managing a storage system involve cleaning up a persistent storage disk in a backup mode to increase a writing rate of the persistent storage disk.
Yechen Huang, Honggang Li, Zhonghua Zhu, Zhenhua Dong
Filed: 3 Nov 21
Utility
Method, Electronic Device, and Computer Program Product for Processing Data
20 Oct 22
Embodiments that process data are described.
Xiaochen Liu, Ao Sun
Filed: 30 Jun 21
Utility
Distributed File System Performance Optimization for Path-level Settings Using Machine Learning
20 Oct 22
A non-transitory machine-readable medium can comprise executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining a workflow comprising a group of files of a distributed file system, determining a type of the workflow, determining a group of historical metrics associated with the type of the workflow, using a model generated based on machine learning applied to the group of historical metrics, determining respective predicted ranks for different settings that are able to be applied to the workflow, based on the respective predicted ranks, determining a setting, of the different settings, to use to apply to the workflow and that has a predicted rank of the respective predicted ranks that satisfies a defined criterion, and applying the setting to at least one of the group of files to decrease a latency associated with processing the workflow.
Ivan Martynov, Yuriy Stakhurskiy
Filed: 14 Apr 21
Utility
Smooth Flushing of Cached Write Data
20 Oct 22
A method of performing write operations that have been received by a data storage apparatus is provided.
Vladimir Shveidel, Socheavy Heng
Filed: 15 Apr 21
Utility
System and Method for Service Device Initiated Backup Generation
20 Oct 22
A backup management system includes storage and a processor.
Swaroop Shankar D H, Mahesh Reddy Appireddygari Venkataramana, Chetan Battal
Filed: 15 Apr 21
Utility
Using Machine Learning Techniques to Flow Control Clients In a Deduplication File System
20 Oct 22
Detecting a trend in latency for storage underlying a deduplicated file system includes generating a set of data points by recording when input/output (IO) requests were issued to the storage and recording time required to receive success responses from the storage.
Nitin Madan, Fani Jenkins, Gobikrishnan Sundharraj, Deepa Ramesh
Filed: 16 Apr 21
Utility
Method and System for Archiving User Data During Backup Generation
20 Oct 22
A system for providing data protection services for user data generated by an application includes persistent storage that includes an archive storage and a backup storage.
Sunil Yadav, Shelesh Chopra, Amarendra Behera, Tushar Dethe, Himanshu Arora, Deependra Pratap Singh, Jigar Premjibhai Bhanushali, Sapna Chauhan, Anjana Rao, Vipin Kumar Kaushal, Ravi Vijayakumar Chitloor
Filed: 19 Apr 21
Utility
Automatic Consistency Group Scale-out for Any Point In Time Replication Systems
20 Oct 22
One example method includes measuring a journal distribution lag of a journal, evaluating a first operational measure at a production site, and evaluating a second operational measure at a replication site operable to communicate with a production site, based on the journal distribution lag, and the evaluation of the first operational measure and the second operational measure, determining a scale out for a consistency group of the replication site, and implementing the scale out of the consistency group.
Jehuda Shemer, Erez Sharvit, Valerie Lotosh
Filed: 20 Apr 21
Utility
Data Masking In a Microservice Architecture
20 Oct 22
A method includes receiving an object from a client as part of a data ingestion process, directing the object to an object access microservice, providing a copy of the object to a masker worker microservice, masking the copy of the object to create a masked object, and the masking of the copy of the object is performed inline prior to storage of the object, deduplicating the object, and storing the masked object and the object in storage.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 30 Jun 22
Utility
Knowledge Graph Management Based on Multi-source Data
20 Oct 22
Techniques for constructing and otherwise managing knowledge graphs in information processing system environments are disclosed.
Zijia Wang, Victor Fong, Zhen Jia, Jiacheng Ni
Filed: 14 Apr 21
Utility
Hyperband-based Probabilistic Hyper-parameter Search for Machine Learning Algorithms
20 Oct 22
One example method includes, in an initial iteration of a hyperparameter search process, randomly selecting, from an entire hyperparameter space, an initial set of one or more hyperparameters, wherein the hyperparameters are usable in a machine learning process, generating an initial Gaussian probability distribution around the initial set of hyperparameters, and generating a Gaussian probability distribution function by normalizing the initial Gaussian probability distribution to delimit an initial portion of the hyperparameter space, and the initial portion of the hyperparameter space is smaller than the hyperparameter space.
Eduardo Vera Sousa
Filed: 20 Apr 21
Utility
System and Method for Distributed Model Adaptation
20 Oct 22
An information handling system includes storage and a processor.
Pablo Nascimento da Silva, Hugo de Oliveira Barbalho
Filed: 15 Apr 21
Utility
Connecting Configuration Services Using Blockchain Technology
20 Oct 22
Methods, apparatus, and processor-readable storage media for connecting configuration services using blockchain technology are provided herein.
Ashish Kumar Palo, Sathish Kumar Bikumala
Filed: 14 Apr 21
Utility
Method, Electronic Device and Computer Program Product for Data Transmission
20 Oct 22
Techniques for data transmission involve obtaining respective data transmission characteristics of a set of to-be-processed data transmission jobs, the data transmission characteristics of each data transmission job indicating at least one of an expected transmission time and a data size of the data transmission job; determining corresponding weights of the set of data transmission jobs based on the data transmission characteristics of the set of data transmission jobs; and determining a transmission rate of each data transmission job based on the weights and a total transmission rate used for the set of data transmission.
Fang Du, Xu Chen, Hao Wang, Pan Xiao, Si Zhang
Filed: 3 Nov 21