3707 patents
Page 28 of 186
Utility
Automated Code Checking
6 Oct 22
Methods, apparatus, and processor-readable storage media for automated code checking are provided herein.
Ilan Yosef, Bella Bekker-Vernik
Filed: 6 Apr 21
Utility
Unified Software Library Access and Vulnerability Correction Prioritization
6 Oct 22
A container-based software implementation uses separate containers for software libraries and application code.
Tamilarasan Janakiraman, Kannan Subbaraman, Vijayasarathy Vajravel
Filed: 2 Apr 21
Utility
Zero-knowledge Protection for Side Channels In Data Protection to the Cloud
6 Oct 22
Masking a data rate of transmitted data is disclosed.
Amos Zamir, Jehuda Shemer, Kfir Wolfson
Filed: 17 Jun 22
Utility
Adaptive Metadata Encryption for a Data Protection Software
6 Oct 22
One example method includes obtaining hop information of a metadata path for backup metadata, obtaining content sensitivity information indicating a relative sensitivity of backup data to an attack, based on the hop information and the content sensitivity information, selecting an encryption to be applied to the backup metadata, and applying the encryption to the backup metadata.
Mahesh Reddy Appireddygari Venkataramana, Swaroop Shankar D H, Gururaj Kulkarni
Filed: 30 Mar 21
Utility
Protecting Data Based on Context of Data Movement Operation
6 Oct 22
Methods, apparatus, and processor-readable storage media for protecting data based on a context of data movement operations are provided herein.
Paul Normand James Berube, Victor Salamon
Filed: 31 Mar 21
Utility
Model Parameter Sharing Between Inference Application Instances In Processing Unit of Information Processing System
6 Oct 22
Techniques for model parameter sharing between inference model instances are disclosed.
Jinpeng Liu, Danqing Sha, Zhen Jia, Christopher S. MacLellan
Filed: 30 Mar 21
Utility
Consolidation and Migration of Cloud Data
29 Sep 22
A method of migrating or consolidating cloud data includes generating a container on a cloud platform and receiving, at the container, source metadata identifying a set of data to be migrated from a source cloud bucket associated with a source data domain to a destination cloud bucket associated with a destination data domain.
Ramprasad N. CHINTHEKINDI, George MATHEW, Rahul GOYAL, Mahesh KAMAT
Filed: 26 Mar 21
Utility
System and Method for Data-layout Aware Decompression and Verification Using a Hardware Accelerator Chain
29 Sep 22
A computer implemented method of data decompression and verification includes decompressing a compressed data segment to generate a decompressed data region.
Colin Zou, Tao Chen
Filed: 29 Mar 21
Utility
Vaulting Data from a Public Cloud
29 Sep 22
Data moving micro-services are deployed to a public cloud and a cloud vault target (CVT).
Peter Marelas
Filed: 13 Jun 22
Utility
Automatic Discovery of Related Data Records
29 Sep 22
Techniques are provided for automatic discovery of data records.
Idan Richman Goshen, Avitan Gefen
Filed: 26 Mar 21
Utility
Copy Management for Container-based Applications
29 Sep 22
Techniques for application copy management in container environments are disclosed.
Sunil Kumar, Anil Arun Degwekar, Thomas L. Watson
Filed: 24 Mar 21
Utility
Method, Device, and Program Product for Backing Up Data In Internet of Things
29 Sep 22
A method, a device, and a program product for backing up data in the Internet of Things (IoT) is disclosed.
Jie Liu, Qin Liu
Filed: 30 Sep 21
Utility
Method, Device, and Program Product for Creating Stripe Based on Dynamic Window
29 Sep 22
Techniques involve creating a stripe based on a dynamic window.
Huijuan Fan, Chi Chen
Filed: 15 Sep 21
Utility
Method, Device, and Program Product for Managing Spare Block Based on Dynamic Window
29 Sep 22
Techniques manage spare extents based on a dynamic window.
Chi Chen, Huijuan Fan
Filed: 17 Sep 21
Utility
Scale Out Deduplicated File System As Microservices
29 Sep 22
A deduplicated file system includes a set of microservices including front-ends and back-ends.
Philip Shilane, Abhinav Duggal, George Mathew
Filed: 29 Mar 21
Utility
Efficient Mechanism for Data Protection Against Cloud Region Failure or Site Disasters and Recovery Time Objective (RTO) Improvement for Backup Applications
29 Sep 22
A method, apparatus, and system for determining a consistency marker object representing the latest consistent recovery point for a disaster recovery (DR) process is disclosed.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 26 Mar 21
Utility
System Protection Using Verification of Software Digital Identity Values
29 Sep 22
Techniques are provided for system protection using verification of software digital identity values.
Yevgeni Gehtman, Tomer Shachar, Maxim Balin
Filed: 24 Mar 21
Utility
Automatically Replicating Configuration Parameters from Securely Identified Connected Systems
29 Sep 22
Methods, apparatus, and processor-readable storage media for automatically replicating configuration parameters from securely identified connected systems are provided herein.
Maunish A. Shah, Anurag Sharma, Gavin D. Scott
Filed: 23 Mar 21
Utility
Optimal and Dynamic Selection of Compression Dictionary Size and Data Buffer Coalesce Infrastructure for Greater Data Reduction and Lowered Network Bandwidth Usage of Remote Data Facility Replication Systems
22 Sep 22
Storage arrays in a mirror relationship use dynamic compression dictionary size adjustment and data buffer merging to more efficiently compress data associated with maintenance of consistency of a replicated storage object.
Kenneth Dorman, Venkata Ippatapu
Filed: 19 Mar 21
Utility
Enhanced Fencing Scheme for Cluster Systems without Inherent Hardware Fencing
22 Sep 22
Techniques for providing a fencing scheme for cluster systems without inherent hardware fencing.
Inna Reznik, Ahia Lieber, Peter J. McCann, Joe Caisse
Filed: 22 Mar 21