3707 patents
Page 26 of 186
Utility
Systems and Methods for Temporary Access with Adaptive Trust Levels for Authentication and Authorization
20 Oct 22
One example method includes providing temporary access to a computing system and to providing temporary access as a service.
Hana Schuster Smith, Janardan Revuru
Filed: 19 Apr 21
Utility
Kubernetes Security Isolation Based on Classified Information and Risk Levels
20 Oct 22
One example method includes performing a filtering process that identifies one or more candidate hosts for scheduling of a pod, wherein the candidacy of a host is determined based in part upon an association rule, generating an overall host score for each of the candidate hosts, and scheduling the pod to one of the candidate hosts based on the overall host score of that candidate host.
Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 20 Apr 21
Utility
Distributed Control Path
13 Oct 22
Techniques for configuring and processing control path commands may include: partitioning control path components of a control path into a plurality of portions; performing first processing that configures a federation of a plurality of appliances, wherein each of the plurality of appliances includes a plurality of processing nodes, and wherein the first processing includes: for each of the plurality of appliances, configuring each of the plurality of processing nodes of said each appliance to run one portion of the plurality of portions of control path components; and selecting one of the plurality of appliances as a primary appliance of the federation; receiving a first management command at the primary appliance of the federation; and servicing the first management command by one or more of the plurality of appliances of the federation.
Richard Hicks
Filed: 9 Apr 21
Utility
Methods and Apparatuses for Management of Raid
13 Oct 22
Techniques for managing a redundant array of independent disks (RAID) involve detecting an abnormality of a storage device in a RAID.
Jianbin Kang, Yousheng Liu, Xinlei Xu, Jian Gao, Ping Ge
Filed: 2 Nov 21
Utility
QUALITY OF SERVICE (QoS) BASED DATA DEDUPLICATION
13 Oct 22
Aspects of the present disclosure relate to data deduplication (dedupe).
Ramesh Doddaiah, Malak Alshawabkeh
Filed: 12 Apr 21
Utility
Bypassing of TIER-1 Storage In a Streaming Data Storage System
13 Oct 22
The described technology is generally directed towards a streaming data storage system that can switch between a tiered mode of operation in which events are written to Tier-1 storage and later migrated to Tier-2 storage, and a direct mode of operation in which events are written to Tier-2 storage, bypassing the tiered mode.
Andrei Paduroiu
Filed: 7 Apr 21
Utility
Storage Array Data Decryption
13 Oct 22
An aspect of the present disclosure relates to one or more data decryption techniques.
Ramesh Doddaiah, Malak Alshawabkeh
Filed: 13 Apr 21
Utility
Method, Electronic Device, and Computer Program Product for Upgrading Storage System
13 Oct 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for upgrading a storage system.
Tao Chen, Bing Liu, Geng Han, Jian Gao
Filed: 21 May 21
Utility
Systems and Methods to Submit Unaligned Io on an Alignment-required Io Stack
13 Oct 22
Techniques for submitting unaligned IO data to an alignment-required IO stack of a storage system.
Zhonghua Zhu, Wai C. Yim, Peter J. McCann, Guifeng Tang, Yechen Huang, Honggang Li, Zhenhua Dong
Filed: 13 Apr 21
Utility
Cost-aware Garbage Collection for Cloud Storage
13 Oct 22
Embodiments are directed to a cost-aware object selection for cloud garbage collection that deletes completely dead objects and also selects low-live objects up to a carefully selected liveness threshold value.
Smriti Thakkar, Ramprasad Chinthekindi, Abhinav Duggal
Filed: 12 Apr 21
Utility
Priority-aware Internode Messaging for Active-active Storage System
13 Oct 22
A technique for managing messaging between storage nodes of a storage system includes a first storage node delaying the sending of non-latency-critical messages to a second storage node until the first storage node has a latency-critical message to be sent.
Vladimir Shveidel, Geng Han
Filed: 12 Apr 21
Utility
Logical Storage Device Access Using Device-specific Keys In an Encrypted Storage Environment
13 Oct 22
Data encrypted using a first device-specific key of a first host device is written to a first logical storage device of a storage system.
Tomer Shachar, Arieh Don, Yevgeni Gehtman, Maxim Balin
Filed: 13 Apr 21
Utility
Processing Out of Order Writes In a Log Structured File System for Improved Garbage Collection
13 Oct 22
Improving performance of garbage collection (GC) processes in a deduplicated file system having a layered processing architecture that maintains a log structured file system storing data and metadata in an append-only log arranged as a monotonically increasing log data structure of a plurality of data blocks wherein a head of the log increases in chronological order and no allocated data block is overwritten.
Ashwani Mujoo, Ramprasad Chinthekindi, Abhinav Duggal
Filed: 12 Apr 21
Utility
Event Prioritization for an Ordered Event Stream
13 Oct 22
Event prioritization for an ordered event stream (OES) is disclosed.
Mikhail Danilov, Maksim Vazhenin
Filed: 12 Apr 21
Utility
Automated Delivery of Cloud Native Application Updates Using One or More User-connection Gateways
13 Oct 22
Methods, apparatus, and processor-readable storage media for automated delivery of cloud native application updates using one or more user-connection gateways are provided herein.
Anurag Sharma, Jeffrey T. Glenn, Matt Puerkel, Eddie Pavkovic, Aaron W. Spiegel
Filed: 12 Apr 21
Utility
Proactive Data Protection Based on Weather Patterns and Severity
13 Oct 22
Techniques can be implemented to adjust a level of data protection for a device based on predictions of the weather.
Vetrivel Mohanraj, Srinivasa Raju Chamarthy, Abhijit R. Bangera, Suhas Jayasheela, Dhanya Y D
Filed: 8 Apr 21
Utility
Method, Electronic Device and Computer Program Product for Storage Management
13 Oct 22
A method, electronic device, and computer-readable medium for storage management is disclosed.
Shaofeng Chang, Xiaoliang Zhu, Jing Yu, Ming Zhang, Xiaolei Hu
Filed: 25 Aug 21
Utility
Method, Device, and Computer Program Product for Managing Storage System
13 Oct 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage system.
Tao Chen, Bing Liu, Geng Han, Jian Gao
Filed: 21 May 21
Utility
Method, Electronic Device and Program Product for Determining the Score of Log File
13 Oct 22
A method, an electronic device, and a program product for determining a score of a log file are provided.
Yongbing Xue, Min Liu, Weiyang Liu, Yudai Wang, Sanping Li
Filed: 24 Aug 21
Utility
Smart Automation of Reliable Differential Backups of Always on Availability Group Databases to Optimize the Restore Time
13 Oct 22
One example method includes performing data protection operations including backup operations.
Bharat Bhushan, Niketan Narayan Kalaskar
Filed: 7 Apr 21