3707 patents
Page 25 of 186
Utility
Running an Independent Task In Connection with Synchronous I/o Operations
20 Oct 22
Running an independent task in connection with a synchronous I/O operation between a storage system and a host includes starting the synchronous I/O operation, setting a timer for the synchronous I/O operation, starting the independent task that runs while waiting for completion of the synchronous I/O operation, and aborting the synchronous I/O operation in response to the timer expiring prior to completion of the synchronous I/O operation.
Douglas E. LeCrone, Paul A. Linstead
Filed: 19 Apr 21
Utility
Method, Electronic Device and Computer Program Product for Managing a Storage System
20 Oct 22
Techniques for managing a storage system involve cleaning up a persistent storage disk in a backup mode to increase a writing rate of the persistent storage disk.
Yechen Huang, Honggang Li, Zhonghua Zhu, Zhenhua Dong
Filed: 3 Nov 21
Utility
vm9q8jv65n1z zrd26qxtkowvwal
20 Oct 22
A host performs benchmark I/O operations for a storage system by an application on the host formulating a performance test command, providing the performance test command to a channel subsystem layer of the host that actuates communication hardware that provides signals to the storage system, and performing a plurality of benchmark I/O operations at the channel subsystem layer in response to a single performance test command by actuating the communication hardware that provides signals to the storage system.
Douglas E. LeCrone, Jeffrey L. Jones
Filed: 19 Apr 21
Utility
osgg6h7b7v6clslf3f7tn 6soj73g5apor38mx2lj8z18p6o4u65iqolgqzv
20 Oct 22
Embodiments that process data are described.
Xiaochen Liu, Ao Sun
Filed: 30 Jun 21
Utility
7a47htmf7ugtfdyosdab2n9t42m2ro3
20 Oct 22
Methods, apparatus, and processor-readable storage media for automatically validating design parameters for enterprise applications are provided herein.
Rishav Sethia, Vivek Bhargava, Shubham Gupta
Filed: 20 Apr 21
Utility
efzok6xum6834m8ax528uja lhlp
20 Oct 22
Methods, apparatus, and processor-readable storage media for automated storage system performance validation are provided herein.
John Moran, Christopher Trudel, Anurag Sharma
Filed: 16 Apr 21
Utility
inuzpobqif3yuqr5d q15sx
20 Oct 22
Detecting a trend in latency for storage underlying a deduplicated file system includes generating a set of data points by recording when input/output (IO) requests were issued to the storage and recording time required to receive success responses from the storage.
Nitin Madan, Fani Jenkins, Gobikrishnan Sundharraj, Deepa Ramesh
Filed: 16 Apr 21
Utility
favxex1trlj25cl4u96lak1 8b1c7o3oe02vju92vt2
20 Oct 22
Embodiments for managing metadata in a high density network attached storage system.
Aaditya Rakesh, Upanshu Singhal, Adam Brenner
Filed: 20 Apr 21
Utility
h6camhnfa6wfzpi3kysfc9 h17jpxwmlnf0hja54hqbxdevwd
20 Oct 22
A system for providing data protection services for user data generated by an application includes persistent storage that includes an archive storage and a backup storage.
Sunil Yadav, Shelesh Chopra, Amarendra Behera, Tushar Dethe, Himanshu Arora, Deependra Pratap Singh, Jigar Premjibhai Bhanushali, Sapna Chauhan, Anjana Rao, Vipin Kumar Kaushal, Ravi Vijayakumar Chitloor
Filed: 19 Apr 21
Utility
zhvuhaocrvn30 k1xbwcn655934qjpxui5fwetu4pbpjsv44mudhb270r270
20 Oct 22
In a protective quorum service, during an initial period of normal operation in which a clustered pair of data storage nodes provide host I/O access to a data storage object and replicate write-type requests to each other, the nodes are first registered to the quorum service.
Dmitry Nikolayevich Tylik, David Meiri, Carole Gelotti
Filed: 16 Apr 21
Utility
0nd xfq0wvmulxqfjm38lcoajytfie69g
20 Oct 22
A non-transitory machine-readable medium can comprise executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining a workflow comprising a group of files of a distributed file system, determining a type of the workflow, determining a group of historical metrics associated with the type of the workflow, using a model generated based on machine learning applied to the group of historical metrics, determining respective predicted ranks for different settings that are able to be applied to the workflow, based on the respective predicted ranks, determining a setting, of the different settings, to use to apply to the workflow and that has a predicted rank of the respective predicted ranks that satisfies a defined criterion, and applying the setting to at least one of the group of files to decrease a latency associated with processing the workflow.
Ivan Martynov, Yuriy Stakhurskiy
Filed: 14 Apr 21
Utility
7ag8oyqadjna4h4p3bhd7su15u6a he
20 Oct 22
A method of performing write operations that have been received by a data storage apparatus is provided.
Vladimir Shveidel, Socheavy Heng
Filed: 15 Apr 21
Utility
w7wng q45idyclpjt0fuld7agaf1ewijbip6qiqknkiosaifbfttq
20 Oct 22
One example method includes measuring a journal distribution lag of a journal, evaluating a first operational measure at a production site, and evaluating a second operational measure at a replication site operable to communicate with a production site, based on the journal distribution lag, and the evaluation of the first operational measure and the second operational measure, determining a scale out for a consistency group of the replication site, and implementing the scale out of the consistency group.
Jehuda Shemer, Erez Sharvit, Valerie Lotosh
Filed: 20 Apr 21
Utility
kkc1og7u t5jrfytyiuy0iugzqmldp76lgobn4s52eudymjvw7glbuc
20 Oct 22
One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 30 Jun 22
Utility
006qc96dyqrkdvvvn73 r1k2ypfv2ayh66oj5
20 Oct 22
A method includes receiving an object from a client as part of a data ingestion process, directing the object to an object access microservice, providing a copy of the object to a masker worker microservice, masking the copy of the object to create a masked object, and the masking of the copy of the object is performed inline prior to storage of the object, deduplicating the object, and storing the masked object and the object in storage.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 30 Jun 22
Utility
o9gsqhqnz88leodjb tykiievxi44d53atiwa2njh48kzkwz2o4a
20 Oct 22
Techniques for constructing and otherwise managing knowledge graphs in information processing system environments are disclosed.
Zijia Wang, Victor Fong, Zhen Jia, Jiacheng Ni
Filed: 14 Apr 21
Utility
g5z37tgr2sp9puog47bhw
20 Oct 22
An information handling system includes storage and a processor.
Pablo Nascimento da Silva, Hugo de Oliveira Barbalho
Filed: 15 Apr 21
Utility
4v0ts2rdlazhwn35q7x04zjt0ebxl3jv2ss910ee0scoywgpj3pjcdt
20 Oct 22
One example method includes, in an initial iteration of a hyperparameter search process, randomly selecting, from an entire hyperparameter space, an initial set of one or more hyperparameters, wherein the hyperparameters are usable in a machine learning process, generating an initial Gaussian probability distribution around the initial set of hyperparameters, and generating a Gaussian probability distribution function by normalizing the initial Gaussian probability distribution to delimit an initial portion of the hyperparameter space, and the initial portion of the hyperparameter space is smaller than the hyperparameter space.
Eduardo Vera Sousa
Filed: 20 Apr 21
Utility
ekn5 la58xa6w6hvnaxt2gdoj0y0ktxeb5054ytytu
20 Oct 22
Methods, apparatus, and processor-readable storage media for connecting configuration services using blockchain technology are provided herein.
Ashish Kumar Palo, Sathish Kumar Bikumala
Filed: 14 Apr 21
Utility
ca4bxg2zeycx2rmq40bxl ls5wrx28xdtbaz3xho5w9b3e0ef
20 Oct 22
Techniques for data transmission involve obtaining respective data transmission characteristics of a set of to-be-processed data transmission jobs, the data transmission characteristics of each data transmission job indicating at least one of an expected transmission time and a data size of the data transmission job; determining corresponding weights of the set of data transmission jobs based on the data transmission characteristics of the set of data transmission jobs; and determining a transmission rate of each data transmission job based on the weights and a total transmission rate used for the set of data transmission.
Fang Du, Xu Chen, Hao Wang, Pan Xiao, Si Zhang
Filed: 3 Nov 21