3707 patents
Page 27 of 186
Utility
System and Method for Micro-backup Generation
13 Oct 22
A backup management system for providing data integrity services to an application host that hosts an application that uses application data includes storage for storing threshold values for creating an application backup and a processor programmed to monitor: a rate of change associated with the application data, and an input-output rate of the application data; make a determination, based on the threshold values, the rate of change, and the input-output rate, that an unscheduled backup for the application is to be generated; obtain a micro-backup for the application in response to the determination; and obtain a restoration ready backup for the application using the micro-backup and at least one previously generated backup.
Pradeep Viveki, Mahantesh Murageppa Ambaljeri, Mahesh Reddy Appireddygari Venkataramana
Filed: 9 Apr 21
Utility
Fault Definition and Injection Process to Simulate Timing Based Errors In a Distributed System
13 Oct 22
Embodiments for simulating timing-related error conditions in a distributed system, by allowing a user to define a fault map specifying one or more faults to be committed by components in the distributed system.
Shefali Gautam, George Mathew, Mukesh K. Sharma
Filed: 9 Apr 21
Utility
Self Healing Fast Sync Any Point In Time Replication Systems Using Augmented Merkle Trees
13 Oct 22
Replication operations of replicating data from a production site to a replica site.
Jehuda Shemer, Alex Solan
Filed: 23 Jun 22
Utility
System and Method for Restoration Using Micro-backups
13 Oct 22
A backup management system for providing data integrity services to an application host that hosts an application having application data includes storage for storing a restore point catalog and a processor programmed to obtain a micro-backup of the application, wherein the micro-backup reflects changes made to the application data over a period of time from when a last scheduled backup was generated and a number of changes to the application data exceeded a predetermined number, wherein generation of the micro-backup was not scheduled; obtain a timestamp that delineates an end of the period of time; obtain header data of the last scheduled backup generated for the application host; and obtain an application backup for the application using the micro-backup, the timestamp, and the header data, wherein the application backup is usable to restore the application to a state associated with the end of the period of time.
Mahesh Reddy Appireddygari Venkataramana, Pradeep Viveki, Mahantesh Murageppa Ambaljeri
Filed: 9 Apr 21
Utility
Method, Device and Computer Program Product for Storage System Management
13 Oct 22
Techniques for managing a storage system involve: based on a degree of importance of data stored in a persistent storage device of the storage system, determining key data from the data, wherein a degree of importance of the key data is higher than a threshold degree; respectively identifying first data corresponding to the key data in a first cache of the storage system and second data corresponding to the key data in a second cache of the storage system as non-removable; and in response to corruption of the first data, repairing the first data using the second data in the second cache.
Ruiyong Jia, Xinlei Xu, Yousheng Liu, Ping Ge, Changyu Feng
Filed: 2 Nov 21
Utility
Two-Way Secure Channels Between Multiple Services Across Service Groups
13 Oct 22
Two-way secure channels are provided between multiple services across service groups, where the certification is performed by a certificate authority associated with one of the service groups.
Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
Filed: 7 Apr 21
Utility
Two-Way Secure Channels with Certification by One Party
13 Oct 22
Two-way secure channels are provided between two parties to a communication with certification being provided by one party.
Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
Filed: 7 Apr 21
Utility
NANON Support for Antivirus Jobs in Clustered Storage
13 Oct 22
Techniques can be implemented to provide for antivirus scanning in clustered storage where not all nodes of the cluster are connected to an antivirus server.
Terry Stokes, Teng Hong, Antony Richards
Filed: 8 Apr 21
Utility
Correlating Time on Storage Network Components
6 Oct 22
A temporal correlation may be determined between times specified according to different time standards on different storage network components.
John R. Lynch, Arieh Don
Filed: 5 Apr 21
Utility
Provisioning Zoned Storage Devices to Sequential Workloads
6 Oct 22
Techniques are provided for provisioning zoned storage devices to sequential workloads.
Kurumurthy Gokam, Kundan Kumar, Remesh Parakunnath
Filed: 30 Mar 21
Utility
Issuing Alerts for Storage Volumes Using Machine Learning
6 Oct 22
A method is used in issuing alerts for storage volumes using machine learning.
David Meiri, Anton Kucherov
Filed: 10 Jun 22
Utility
Migrating Data of Sequential Workloads to Zoned Storage Devices
6 Oct 22
Techniques are provided for migrating data of sequential workloads to zoned storage devices.
Kurumurthy Gokam, Kundan Kumar, Remesh Parakunnath
Filed: 30 Mar 21
Utility
Method and Apparatus for Affinity Based Smart Data Protection Policy for Pooled Protection Targets
6 Oct 22
One example method includes configuring a data protection environment to include one or more protection targets, applying one or more tags to each of the protection targets, based on the tags, creating a pool that includes some of the protection targets, associating a rule with an SLA that specifies a dataset and a data protection requirement for the dataset, executing the rule to identify a protection target in the pool that most closely meets the data protection requirement specified by the SLA, and defining a data protection policy that includes the data protection target identified by the executing of the rule.
Kalyan C. Gunda, Gururaj Kulkarni
Filed: 30 Mar 21
Utility
Managing Application Storage Resource Allocations Based on Application Specific Storage Policies
6 Oct 22
Applications that are configured to use storage resources of a storage system are associated with application specific storage policies.
Brian O'Halloran, Warren Fleury
Filed: 3 Apr 21
Utility
Data Expiration for Stream Storages
6 Oct 22
The described technology is generally directed towards fine-grained data event expiration in a streaming data storage system.
Mikhail Danilov, Yohannes Altaye
Filed: 6 Apr 21
Utility
Image-based Operating System Upgrade Process
6 Oct 22
An apparatus comprises at least one processing device coupled to memory.
Niranjan Hettiwatte
Filed: 31 Mar 21
Utility
Method to Enhance the Data Invulnerability Architecture of Deduplication Systems by Optimally Doing Read-verify and Fix of Data Moved to Cloud Tier
6 Oct 22
Data protection operations including verification operations are disclosed.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 6 Apr 21
Utility
Method to Identify the Performance Bottle Neck In the Complex Enterprise Virtualized Environment
6 Oct 22
One example method includes identifying a source of a performance issue in a virtualized environment.
Parminder Singh Sethi, Bing Liu
Filed: 6 Apr 21
Utility
Maintaining Availability of a Non-volatile Cache
6 Oct 22
A technique maintains availability of a non-volatile cache.
Vamsi K. Vankamamidi, Geng Han, Chun Ma, Jianbin Kang
Filed: 1 Apr 21
Utility
Escalated Authentication System to Perform an Integrity-check Based on Behavior Patterns
6 Oct 22
Aspects of the disclosure include an escalated authentication system based on user behavior patterns.
Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu, Srinath Kappgal
Filed: 6 Apr 21