3707 patents
Page 30 of 186
Utility
Reliable Virtual Machine Discovery and Storage Association
15 Sep 22
A technique of managing virtual volumes includes receiving, by a storage system, instructions to create specified virtual volumes in the storage system, the instructions including virtual volume metadata that identifies virtual machines to which the specified virtual volumes are assigned, and providing a database that associates such virtual volumes with the virtual machines identified by the virtual volume metadata.
Sergey Alexandrovich Alexeev, Alexey Vladimirovich Shusharin, Dmitry Nikolayevich Tylik, Fedor Kusov
Filed: 10 Mar 21
Utility
Predictive Optimal Queue Length Management for Backup Sessions Using Distributed Proxies
15 Sep 22
Techniques described herein relate to methods and systems for managing backup operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan
Filed: 11 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Storing and Searching for Data
15 Sep 22
Zhenzhen Lin, Si Chen, Qiang Chen, Bin He
Filed: 7 Apr 21
Utility
Random Walks to Detect Dissimilar Records
15 Sep 22
One example method includes identifying dissimilar items in a data set.
Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
Filed: 12 Mar 21
Utility
Method and System for a Fast Adaptation for Image Segmentation for Autonomous Edge Vehicles
15 Sep 22
A method includes obtaining, by a local data system manager of a local data system of the local data systems, a portion of unlabeled data from a local data source, performing, using a domain classifier in the local data system manager, a domain classification analysis on the portion of the unlabeled data to identify a domain of the unlabeled data, making a first determination, based on the domain classification, that the domain classification has significantly varied from a previous domain, based on the first determination: performing an adaptive procedure on a local data system image segmentation model to obtain an adapted image segmentation model, and performing a domain reclassification on the domain classifier to obtain an updated domain classifier, and implementing the adapted image segmentation model on the local data system.
Pablo Nascimento da Silva, Hugo de Oliveira Barbalho
Filed: 12 Mar 21
Utility
Secure Data Management In a Network Computing Environment
15 Sep 22
Techniques are provided for secure data management in a network computing environment.
Mohamed Sohail, Said Tabet
Filed: 15 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Data Processing
15 Sep 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing.
Zijia Wang, Jiacheng Ni, Qiang Chen, Zhen Jia
Filed: 14 Apr 21
Utility
Access Control Rights Assignment Capabilities Utilizing a New Context-based Hierarchy of Data Based on New Forms of Metadata
15 Sep 22
One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
Filed: 11 Mar 21
Utility
Data Masking In a Microservice Architecture
15 Sep 22
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 2 Jun 22
Utility
Method, Device, and Computer Program Product for Managing Storage Device
8 Sep 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage device.
Bing Liu, Zheng Li
Filed: 29 Mar 21
Utility
Optimized Data Restore from Object Storage for Directly Written Data
8 Sep 22
Restoring data stored by a backup process in an object store of a cloud network by initiating a restore request to a server accessing the object store, by providing a source identifier of one or more data blocks of the requested data and a timestamp for a backup image at a requested point in time (PIT).
Mark Malamut, Arun Murti, Adam Brenner, Lev Ayzenberg, Sharon Vitek, Jehuda Shemer
Filed: 5 Mar 21
Utility
Method and Systems for Recommending Storage Management Actions based on Capacities of Storage Systems
8 Sep 22
Disclosed is a system for storage management comprising: receiving capacity information within a predetermined time period from a plurality of storage in a first appliance pool and a second appliance pool, each having a plurality of storage systems; tracking a first capacity limit of the first storage system in the first compliance pool based on the capacity information; performing a first capacity prediction of the first storage system based on the tacked result of the first storage system, wherein the first capacity prediction indicating when the first storage system will be out of space based on the capacity information and the tracked result; generating a first recommendation indicating when an extra capacity of the first storage system should be added based on one or more attributes including the first capacity prediction; and presenting the first recommendation with one or more options.
PHILIP SHILANE, KIMBERLY LU, TIPPER TRUONG, ABHINAV DUGGAL
Filed: 8 Mar 21
Utility
Public Cloud Provider Cost Optimization for Writing Data Blocks Directly to Object Storage
8 Sep 22
Embodiments for optimizing a cost of storing backup data in an object store of a public cloud network provided by a cloud provider by storing delta objects each embodying changes to blocks of the backup data between a full backup incremental backups.
Lev Ayzenberg, Mark Malamut, Maxim Drobachevsky, Sharon Vitek, Jehuda Shemer, Adam Brenner, Arun Murti
Filed: 5 Mar 21
Utility
Method and System for Performing Data Protection Services for User Data Associated with Calendar Events
8 Sep 22
A system for providing data protection services for user data generated by an application, includes persistent storage for storing user data backups and a manager.
Sunil Yadav, Shelesh Chopra, Amarendra Behera, Tushar Dethe, Himanshu Arora, Jigar Premjibhai Bhanushali, Vipin Kumar Kaushal, Sapna Chauhan, Anjana Rao, Deependra Pratap Singh
Filed: 5 Mar 21
Utility
Method or Apparatus to Reconstruct Lost Data and Metadata
8 Sep 22
Data protection systems generate backups that may be stored in a namespace that includes an active tier and a cloud tier.
Smriti Thakkar, Ramprasad N. Chinthekindi, Kalidas Balakrishnan, Kalyan C. Gunda
Filed: 5 Mar 21
Utility
Optimizing Docker Image Encryption - Kubernetes Using Shamir Secrets to Enforce Multiple Constraints In Container Runtime Environment
8 Sep 22
One example method includes using a primary key to encrypt a decryption key, splitting the primary key into ‘n’ parts, where at least ‘k’ parts of the ‘n’ parts are required to restore the primary key, and ‘k’≤‘n’, storing some of the ‘k’ parts in respective locations in a production environment, and one of the stored ‘k’ parts is held by a verifier stage, receiving, at the verifier stage, a request for restoration of the primary key, where the request is received from a deployment pod and the request includes a subset of the ‘k’ parts and the encrypted decryption key, performing, by the verifier stage, a validation process concerning the deployment pod, and restoring, by the verifier stage, the primary key, wherein the primary key is restored using the ‘k’ part held by the verifier stage.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 5 Mar 21
Utility
Smartnic Based Virtual Splitter Ensuring Microsecond Latencies
8 Sep 22
A data protection system includes a splitter configured to reduce latencies when splitting writes in a computing environment.
Jehuda Shemer, Srinivas Kangyampeta
Filed: 3 Mar 21
Utility
Organizational Awareness for Automating Data Protection Policies
8 Sep 22
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 5 Mar 21
Utility
Synchronizing Expirations for Incremental Backup Data Stored on a Cloud-based Object Storage
8 Sep 22
Described is a system for synchronizing expiration times for incremental backup data stored on a cloud-based object storage.
Shelesh Chopra, Sunil Yadav, Amarendra Behera, Ravi Vijayakumar Chitloor, Tushar Dethe, Himanshu Arora, Prabhat Kumar Dubey, Jigar Bhanushali, Deependra Singh
Filed: 5 Mar 21
Utility
Efficient Method to Optimize Distributed Segment Processing Mechanism In Dedupe Systems by Leveraging the Locality Principle
8 Sep 22
One example method includes receiving at a dedupe system, from a client, a request that comprises a set of fingerprints, where each fingerprint in the set corresponds to a particular data segment, filtering, at the dedupe system, the set of fingerprints into a set of unique fingerprints and a set of non-unique fingerprints, reading, at the dedupe system, from a container where copies of the non-unique fingerprints are stored, an additional set of non-unique fingerprints, sending, from the dedupe system to the client, a single response that comprises both the set of unique fingerprints and the additional set of non-unique fingerprints, and receiving from the client, at the dedupe system, data segments that respectively correspond to the unique fingerprints in the set of unique fingerprints, but no data segments corresponding to the non-unique fingerprints in the set of non-unique fingerprints are received by the dedupe system from the client.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 3 Mar 21