3707 patents
Page 29 of 186
Utility
Techniques for Storage Management
22 Sep 22
Techniques for storage management may include: adding first storage devices to a pool, wherein prior to adding the first storage devices to the pool, the pool includes second storage devices with existing physical storage units (PUs) distributed across the second storage devices; and in response to adding the first storage devices to the pool, performing processing to evenly distribute the existing PUs among the pool of storage devices, said processing including: defining logical pairs of storage devices in accordance with rules; binding each of the logical pairs to a resiliency set; determining that a first PU of the existing PUs includes disk slices that span across more than a single resiliency set; and in response to determining that the first PU includes disk slices that span across more than a single resiliency set, performing second processing to restripe the first PU in accordance with a target layout.
Geng Han, Ronald D. Proulx, Shaoqin Gong, Baote Zhuo, Xiaobo Zhang
Filed: 18 Mar 21
Utility
Method, Electronic Device for Obtaining Hierarchical Data Structure and Processing Log Entires
22 Sep 22
A method, an electronic device, and a computer program product for obtaining a hierarchical data structure and processing a log entry is disclosed.
Yudai Wang, Min Liu, Sanping Li, Travis Liu, Yongbing Xue
Filed: 29 Jul 21
Utility
Fabricless Allocation of a Local Cache In a Fabric Environment
22 Sep 22
Worker threads allocate at least some recycled cache slots of a local portion of a shared memory to the compute node to which the memory portion is local.
Steve Ivester, Kaustubh Sahasrabudhe
Filed: 17 Mar 21
Utility
Synchronization Object Issue Detection Using Object Type Queues and Associated Monitor Threads In a Storage System
22 Sep 22
At least one processing device comprises a processor and a memory coupled to the processor.
Vladimir Shveidel, Lior Kamran
Filed: 22 Mar 21
Utility
Workflow Optimization
22 Sep 22
A computer implemented method, computer program product, and system for managing execution of a workflow comprising a set of subworkflows, comprising optimizing the set of subworkflows using a deep neural network, wherein each subworkflow of the set of subworkflows has a set of tasks, wherein each task of the sets of tasks has a requirement of resources of a set of resources; wherein each task of the sets of tasks is enabled to be dependent on another task of the sets of tasks, training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources, wherein the training causes the neural network to learn relationships between the states of said set of resources, the said sets of tasks, their parameters and the obtained performance, optimizing an allocation of resources of the set of resources to each task of the sets of tasks to ensure compliance with a user-defined quality metric based on the deep neural network output.
Chandra YELESHWARAPU, Jonas F. DIAS, Angelo CIARLINI, Romulo D. Pinho, Vinicius GOTTIN, Andre MAXIMO, Edward PACHECO, David HOLMES, Keshava RANGARAJAN, Scott David SENFTEN, Joseph Blake WINSTON, Xi WANG, Clifton Brent WALKER, Ashwani DEV, Nagaraj SIRINIVASAN
Filed: 6 Apr 22
Utility
System and Method for Bug Deduplication Using Classification Models
22 Sep 22
A method for managing bugs includes obtaining, by a bug deduplication system, a set of bugs, performing an encoding on each section of a first bug of the set of bugs to obtain encoded sections, wherein the encoded sections comprise a first encoded section and a second encoded section, applying a first classification model to the first encoded section to obtain a first section score, applying a second classification model to the second encoded section to obtain a second section score, generating a confidence score based on the first encoded section and the second section, and providing the confidence score to a client, wherein the client initiates a corrective action for the first bug based on the confidence score.
Jayanth Kumar Reddy Perneti, Vindhya Gangaraju
Filed: 19 Mar 21
Utility
Method, Electronic Equipment, and Computer Program Product for Managing Backup Data
22 Sep 22
A method, electronic device, and a computer readable medium for managing backup data that includes determining an expiration time of backup data in a data set to be backed up in a source storage device, and determines a priority of the backup data to be migrated in a migration operation to be performed based on the expiration time.
Yi Wang, Jun Tang, Qingxiao Zheng, Bing Liu
Filed: 25 Aug 21
Utility
Trust Establishment by Escalation
22 Sep 22
One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match.
Ido Begun, Jehuda Shemer
Filed: 2 Jun 22
Utility
Automated Uniform Host Attachment
15 Sep 22
Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume.
Dmitry Tylik, Dave J. Lindner, Girish Sheelvant, Nagasimha G. Haravu
Filed: 10 Mar 21
Utility
Probabilistic Model for File-specific Compression Selection Under Sla-constraints
15 Sep 22
One example method includes file specific compression selection.
RĂ´mulo Teixeira de Abreu Pinho, Vinicius Michel Gottin, Joel Christner
Filed: 12 Mar 21
Utility
Synchronization Object Having a Stamp for Flows In a Storage System
15 Sep 22
In one aspect, an example methodology implementing the disclosed techniques includes, responsive to a determination, by a first thread attempting to start an operation, that a second thread has started the operation, obtaining a value of a stamp included in a synchronization object related to the operation.
Vladimir Shveidel, Lior Kamran
Filed: 10 Mar 21
Utility
Trust Establishment by Escalation
15 Sep 22
One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match.
Ido Begun, Jehuda Shemer
Filed: 2 Jun 22
Utility
Relative Risk Ranking of Cloud Assets Used In Multi-cloud Workloads
15 Sep 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, a request to view multi-cloud relative risk information for at least a subset of the cloud assets on which workloads of a given entity run.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 11 Mar 21
Utility
Management of Multi-cloud Workloads Using Relative Risk Ranking of Cloud Assets
15 Sep 22
An apparatus comprises a processing device configured to receive, at a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, self-reported risk information for at least a subset of the cloud assets on which workloads of a given entity run.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 11 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Data Processing
15 Sep 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data processing.
Zhen Jia, Anzhou Hou, Danqing Sha, Bin He
Filed: 9 Apr 21
Utility
Adaptive Turbo Toggling
15 Sep 22
A method of operating a computing device for processing data is provided.
Vladimir Shveidel, Alexei Kabishcer
Filed: 11 Mar 21
Utility
Logical Storage Device Access Using Datastore-level Keys In an Encrypted Storage Environment
15 Sep 22
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Amit Pundalik Anchi, Vinay G. Rao, Srinivas Kangyampeta, Madhu Tarikere
Filed: 9 Mar 21
Utility
Method for Deploying Product Applications Within Virtual Machines Onto On-premises and Public Cloud Infrastructures
15 Sep 22
A method for deploying product applications within virtual machines onto on-premises and public cloud infrastructures.
Lihui Su, Yujun Liang, Yin Wei, Ming Zhang, James Morton
Filed: 11 Mar 21
Utility
Dynamic Service Mesh
15 Sep 22
One example method includes receiving, from a microservice, a service request that identifies a service needed by the microservice, and an API of an endpoint that provides the service, evaluating the service request to determine whether the service request conforms to a policy, when the service request has been determined to conform with the policy, evaluating the endpoint to determine if endpoint performance meets established guidelines, and when it is determined that the endpoint performance does not meet the established guidelines, identifying an alternative endpoint that meets the established guidelines and that provides the requested service.
Aman Wangde, Victor Fong, Malini Bhattacharjee, Xuebin He, Kenneth Durazzo
Filed: 12 Mar 21
Utility
Data Recovery In Virtual Desktop Infrastructure Environments
15 Sep 22
An apparatus comprises a processing device configured to receive from a virtual desktop infrastructure client a request to recover data, to identify virtual desktops associated with the virtual desktop infrastructure client that are hosted on virtual machines running on virtualization infrastructure of a virtual desktop infrastructure environment, and to push a token to at least one of the virtual desktops.
Sunil Kumar, Prashant Pokharna, Shivasharan Dalasanur Narayana Gowda
Filed: 15 Mar 21