3707 patents
Page 26 of 186
Utility
Systems and Methods for Temporary Access with Adaptive Trust Levels for Authentication and Authorization
20 Oct 22
One example method includes providing temporary access to a computing system and to providing temporary access as a service.
Hana Schuster Smith, Janardan Revuru
Filed: 19 Apr 21
Utility
Kubernetes Security Isolation Based on Classified Information and Risk Levels
20 Oct 22
One example method includes performing a filtering process that identifies one or more candidate hosts for scheduling of a pod, wherein the candidacy of a host is determined based in part upon an association rule, generating an overall host score for each of the candidate hosts, and scheduling the pod to one of the candidate hosts based on the overall host score of that candidate host.
Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 20 Apr 21
Utility
przwq7hufahwkp2t4jf98gwrduc35t5uipy6niexiwfjsm
13 Oct 22
Aspects of the present disclosure relate to data deduplication (dedupe).
Ramesh Doddaiah, Malak Alshawabkeh
Filed: 12 Apr 21
Utility
qxhm11ty4igf2z62hc9gu1
13 Oct 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for upgrading a storage system.
Tao Chen, Bing Liu, Geng Han, Jian Gao
Filed: 21 May 21
Utility
ba2k9wb2gvagm5jsjpez3v3kf3o039klxr e47our43a725ru885c9
13 Oct 22
Techniques for configuring and processing control path commands may include: partitioning control path components of a control path into a plurality of portions; performing first processing that configures a federation of a plurality of appliances, wherein each of the plurality of appliances includes a plurality of processing nodes, and wherein the first processing includes: for each of the plurality of appliances, configuring each of the plurality of processing nodes of said each appliance to run one portion of the plurality of portions of control path components; and selecting one of the plurality of appliances as a primary appliance of the federation; receiving a first management command at the primary appliance of the federation; and servicing the first management command by one or more of the plurality of appliances of the federation.
Richard Hicks
Filed: 9 Apr 21
Utility
0s4lzjnechosnequspql85d
13 Oct 22
Techniques for submitting unaligned IO data to an alignment-required IO stack of a storage system.
Zhonghua Zhu, Wai C. Yim, Peter J. McCann, Guifeng Tang, Yechen Huang, Honggang Li, Zhenhua Dong
Filed: 13 Apr 21
Utility
2s1n 6umevro0aw87yk3aougbz83ix1guzwc2ggfrbx1vdcri945
13 Oct 22
An aspect of the present disclosure relates to one or more data decryption techniques.
Ramesh Doddaiah, Malak Alshawabkeh
Filed: 13 Apr 21
Utility
1pnmyrfv6n3p5a6d9ob232pcg tyrc14heh9abbg5htpwh5qm
13 Oct 22
Techniques for managing a redundant array of independent disks (RAID) involve detecting an abnormality of a storage device in a RAID.
Jianbin Kang, Yousheng Liu, Xinlei Xu, Jian Gao, Ping Ge
Filed: 2 Nov 21
Utility
kax iewz3lewif29x6hmiakza877f8m
13 Oct 22
Data encrypted using a first device-specific key of a first host device is written to a first logical storage device of a storage system.
Tomer Shachar, Arieh Don, Yevgeni Gehtman, Maxim Balin
Filed: 13 Apr 21
Utility
ic5crjc 2ss8x4990mk6yvbxs3pm2vlhld
13 Oct 22
Improving performance of garbage collection (GC) processes in a deduplicated file system having a layered processing architecture that maintains a log structured file system storing data and metadata in an append-only log arranged as a monotonically increasing log data structure of a plurality of data blocks wherein a head of the log increases in chronological order and no allocated data block is overwritten.
Ashwani Mujoo, Ramprasad Chinthekindi, Abhinav Duggal
Filed: 12 Apr 21
Utility
3meu0 85m2w2wlu0eqd6n5q
13 Oct 22
Embodiments are directed to a cost-aware object selection for cloud garbage collection that deletes completely dead objects and also selects low-live objects up to a carefully selected liveness threshold value.
Smriti Thakkar, Ramprasad Chinthekindi, Abhinav Duggal
Filed: 12 Apr 21
Utility
x2jtnvpoac6vbts6d lf
13 Oct 22
The described technology is generally directed towards a streaming data storage system that can switch between a tiered mode of operation in which events are written to Tier-1 storage and later migrated to Tier-2 storage, and a direct mode of operation in which events are written to Tier-2 storage, bypassing the tiered mode.
Andrei Paduroiu
Filed: 7 Apr 21
Utility
ffg0z666fpgnsbbhd5k0b8pkzbada7p18pj39ww6fcfd1u15klztolryeip6
13 Oct 22
A technique for managing messaging between storage nodes of a storage system includes a first storage node delaying the sending of non-latency-critical messages to a second storage node until the first storage node has a latency-critical message to be sent.
Vladimir Shveidel, Geng Han
Filed: 12 Apr 21
Utility
5xv4mdrfpyx27pg2untl7401ruwug35ckxkoa wrt46ehxm0
13 Oct 22
Methods, apparatus, and processor-readable storage media for automated delivery of cloud native application updates using one or more user-connection gateways are provided herein.
Anurag Sharma, Jeffrey T. Glenn, Matt Puerkel, Eddie Pavkovic, Aaron W. Spiegel
Filed: 12 Apr 21
Utility
y51y7b0h68lh6pr39uyg9im3d16nr n5qw12a2bgib6kj79ya7oe99g
13 Oct 22
Event prioritization for an ordered event stream (OES) is disclosed.
Mikhail Danilov, Maksim Vazhenin
Filed: 12 Apr 21
Utility
kqjo1rgauzl1acl u7qpio
13 Oct 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage system.
Tao Chen, Bing Liu, Geng Han, Jian Gao
Filed: 21 May 21
Utility
uc8do87bcaz1 5zlg7mlt46j9
13 Oct 22
A method, an electronic device, and a program product for determining a score of a log file are provided.
Yongbing Xue, Min Liu, Weiyang Liu, Yudai Wang, Sanping Li
Filed: 24 Aug 21
Utility
uwynpcnd4o2tdry6zlpovwbvyrcsoissa7oaq4u6fz7475srejfu9
13 Oct 22
One example method includes performing data protection operations including backup operations.
Bharat Bhushan, Niketan Narayan Kalaskar
Filed: 7 Apr 21
Utility
1mamy4f9cieaxiu0dsukpmm006dpk7xqim9tqi54qwjjt29mceaj3br
13 Oct 22
Techniques can be implemented to adjust a level of data protection for a device based on predictions of the weather.
Vetrivel Mohanraj, Srinivasa Raju Chamarthy, Abhijit R. Bangera, Suhas Jayasheela, Dhanya Y D
Filed: 8 Apr 21
Utility
hv71tczeogf0y14zax2mbw7rkxscr89xxkimclsym8wv6v9r9nxt3ifxw
13 Oct 22
A backup management system for providing data integrity services to an application host that hosts an application that uses application data includes storage for storing threshold values for creating an application backup and a processor programmed to monitor: a rate of change associated with the application data, and an input-output rate of the application data; make a determination, based on the threshold values, the rate of change, and the input-output rate, that an unscheduled backup for the application is to be generated; obtain a micro-backup for the application in response to the determination; and obtain a restoration ready backup for the application using the micro-backup and at least one previously generated backup.
Pradeep Viveki, Mahantesh Murageppa Ambaljeri, Mahesh Reddy Appireddygari Venkataramana
Filed: 9 Apr 21