3707 patents
Page 30 of 186
Utility
Data Recovery In Virtual Desktop Infrastructure Environments
15 Sep 22
An apparatus comprises a processing device configured to receive from a virtual desktop infrastructure client a request to recover data, to identify virtual desktops associated with the virtual desktop infrastructure client that are hosted on virtual machines running on virtualization infrastructure of a virtual desktop infrastructure environment, and to push a token to at least one of the virtual desktops.
Sunil Kumar, Prashant Pokharna, Shivasharan Dalasanur Narayana Gowda
Filed: 15 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Storing and Searching for Data
15 Sep 22
Zhenzhen Lin, Si Chen, Qiang Chen, Bin He
Filed: 7 Apr 21
Utility
f4ypu14wpypy8e92t8xervxrbnat4mjnecyb9r0iakls0p5aj0wcpblll0vz
15 Sep 22
A technique of managing virtual volumes includes receiving, by a storage system, instructions to create specified virtual volumes in the storage system, the instructions including virtual volume metadata that identifies virtual machines to which the specified virtual volumes are assigned, and providing a database that associates such virtual volumes with the virtual machines identified by the virtual volume metadata.
Sergey Alexandrovich Alexeev, Alexey Vladimirovich Shusharin, Dmitry Nikolayevich Tylik, Fedor Kusov
Filed: 10 Mar 21
Utility
td8wfnousbxj8bvu9usu2pnm3hanvtikm2rla2u4h45nefj3
15 Sep 22
One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
Filed: 11 Mar 21
Utility
yyja18c oc8m3blr17f2yo5hj
15 Sep 22
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 2 Jun 22
Utility
999518tp2wyiz9f43r40 oy1p7
15 Sep 22
Techniques are provided for secure data management in a network computing environment.
Mohamed Sohail, Said Tabet
Filed: 15 Mar 21
Utility
01ivgc8c go6x8jyfgrrdqcgbi98y98k6dgww9zo28quo7xw5
15 Sep 22
One example method includes identifying dissimilar items in a data set.
Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
Filed: 12 Mar 21
Utility
eq9e4ws9dhtlkub40tvfftk4rfq9vjaiyxwddztj0k7
15 Sep 22
A method includes obtaining, by a local data system manager of a local data system of the local data systems, a portion of unlabeled data from a local data source, performing, using a domain classifier in the local data system manager, a domain classification analysis on the portion of the unlabeled data to identify a domain of the unlabeled data, making a first determination, based on the domain classification, that the domain classification has significantly varied from a previous domain, based on the first determination: performing an adaptive procedure on a local data system image segmentation model to obtain an adapted image segmentation model, and performing a domain reclassification on the domain classifier to obtain an updated domain classifier, and implementing the adapted image segmentation model on the local data system.
Pablo Nascimento da Silva, Hugo de Oliveira Barbalho
Filed: 12 Mar 21
Utility
twiq0s0nxta tkk37tqt
15 Sep 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing.
Zijia Wang, Jiacheng Ni, Qiang Chen, Zhen Jia
Filed: 14 Apr 21
Utility
f3345lua25glscdkqujy0qj2k33ogxhvf6u iz5c0vkbtsmn5wv8s0v2
8 Sep 22
Embodiments for optimizing a cost of storing backup data in an object store of a public cloud network provided by a cloud provider by storing delta objects each embodying changes to blocks of the backup data between a full backup incremental backups.
Lev Ayzenberg, Mark Malamut, Maxim Drobachevsky, Sharon Vitek, Jehuda Shemer, Adam Brenner, Arun Murti
Filed: 5 Mar 21
Utility
90lpvpzbrijfwe6i6pcqg6hiuf l8kl4m7iw74er11aem
8 Sep 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage device.
Bing Liu, Zheng Li
Filed: 29 Mar 21
Utility
bflq6stn13xzvcoo20o9saa w9dd2fle
8 Sep 22
Disclosed is a system for storage management comprising: receiving capacity information within a predetermined time period from a plurality of storage in a first appliance pool and a second appliance pool, each having a plurality of storage systems; tracking a first capacity limit of the first storage system in the first compliance pool based on the capacity information; performing a first capacity prediction of the first storage system based on the tacked result of the first storage system, wherein the first capacity prediction indicating when the first storage system will be out of space based on the capacity information and the tracked result; generating a first recommendation indicating when an extra capacity of the first storage system should be added based on one or more attributes including the first capacity prediction; and presenting the first recommendation with one or more options.
PHILIP SHILANE, KIMBERLY LU, TIPPER TRUONG, ABHINAV DUGGAL
Filed: 8 Mar 21
Utility
493htklmdmpilawlw00x 0wweg9
8 Sep 22
Restoring data stored by a backup process in an object store of a cloud network by initiating a restore request to a server accessing the object store, by providing a source identifier of one or more data blocks of the requested data and a timestamp for a backup image at a requested point in time (PIT).
Mark Malamut, Arun Murti, Adam Brenner, Lev Ayzenberg, Sharon Vitek, Jehuda Shemer
Filed: 5 Mar 21
Utility
19tqrcsqa58ys f7yw24
8 Sep 22
One example method includes using a primary key to encrypt a decryption key, splitting the primary key into ‘n’ parts, where at least ‘k’ parts of the ‘n’ parts are required to restore the primary key, and ‘k’≤‘n’, storing some of the ‘k’ parts in respective locations in a production environment, and one of the stored ‘k’ parts is held by a verifier stage, receiving, at the verifier stage, a request for restoration of the primary key, where the request is received from a deployment pod and the request includes a subset of the ‘k’ parts and the encrypted decryption key, performing, by the verifier stage, a validation process concerning the deployment pod, and restoring, by the verifier stage, the primary key, wherein the primary key is restored using the ‘k’ part held by the verifier stage.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 5 Mar 21
Utility
zdo3u4hi7rg2g9q61x5c7v ixik9jdlbyeo13ts7p
8 Sep 22
A data protection system includes a splitter configured to reduce latencies when splitting writes in a computing environment.
Jehuda Shemer, Srinivas Kangyampeta
Filed: 3 Mar 21
Utility
979qn2jogja6gw0prseewc6vyywgktrnl1iv945a 0bdz02ill
8 Sep 22
An apparatus comprises a processing device configured to register one or more applications to receive resource state change invocation calls from one or more assets of an information technology infrastructure, to detect resource state changes for the one or more assets of the information technology infrastructure, and to provide, from a given one of the one or more assets of the information technology infrastructure to a given one of the one or more applications, a given resource state change invocation call responsive to detecting one or more resource state changes for the given asset.
Shivasharan Dalasanur Narayana Gowda, Prashant Pokharna, Sunil Kumar
Filed: 2 Mar 21
Utility
2hn1w7ellzhxngj1o7xyflmh2lw3nay5ftddmo41go9fzh
8 Sep 22
Computer agents can be throttled individually.
Leo Hendrik Reyes Lozano
Filed: 5 Mar 21
Utility
dooph9l0kkldfpnchtsvk3h2stipe22
8 Sep 22
A method for managing upgrades of components of clients includes obtaining an upgrade failure prediction request associated with a client of the clients, and in response to obtaining an update failure prediction request: obtaining live data associated with the client, matching the live data with a training data cluster, selecting relevant features associated with processed training data of the training data cluster, generating an upgrade failure prediction using the live data associated with the relevant features and a prediction model, making a determination that the upgrade failure prediction implicates an action is required, and based on the determination, initiating performance of the action.
Shelesh Chopra, Parminder Singh Sethi, Anannya Roy Chowdhury, Rahul Vishwakarma
Filed: 5 Mar 21
Utility
zybc8u7kgy5qvypjz6 gdzcop1jrwzff5rhs5wrhv1l2wvg
8 Sep 22
A system for providing data protection services for user data generated by an application, includes persistent storage for storing user data backups and a manager.
Sunil Yadav, Shelesh Chopra, Amarendra Behera, Tushar Dethe, Himanshu Arora, Jigar Premjibhai Bhanushali, Vipin Kumar Kaushal, Sapna Chauhan, Anjana Rao, Deependra Pratap Singh
Filed: 5 Mar 21
Utility
yqb96dh96uia 7qxnviuu2xircc97
8 Sep 22
Storing data in an object store in cloud-based storage for data protection applications to address key user workflows, and provide an easily and seamlessly scalable system that minimizes the cost economics of the various resources, considers how backups are transmitted and which target data is most important during a restore operation.
Mark Malamut, Arun Murti, Adam Brenner, Lev Ayzenberg, Sharon Vitek
Filed: 5 Mar 21