3707 patents
Page 31 of 186
Utility
Organizational Awareness for Automating Data Protection Policies
8 Sep 22
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 5 Mar 21
Utility
Synchronizing Expirations for Incremental Backup Data Stored on a Cloud-based Object Storage
8 Sep 22
Described is a system for synchronizing expiration times for incremental backup data stored on a cloud-based object storage.
Shelesh Chopra, Sunil Yadav, Amarendra Behera, Ravi Vijayakumar Chitloor, Tushar Dethe, Himanshu Arora, Prabhat Kumar Dubey, Jigar Bhanushali, Deependra Singh
Filed: 5 Mar 21
Utility
6c92kz5x1sl9hodfpp8ij
8 Sep 22
A system for providing data protection services for user data associated with calendar groups generated by an application includes persistent storage for storing user data backups and a manager.
Anjana Rao, Tushar Dethe, Sapna Chauhan, Jigar Premjibhai Bhanushali, Sunil Yadav, Amarendra Behera, Shelesh Chopra, Himanshu Arora, Vipin Kumar Kaushal, Deependra Pratap Singh
Filed: 5 Mar 21
Utility
ozb9u54s it30uu8pktjohwba8k2
8 Sep 22
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 9 Sep 21
Utility
w9sd6s yh6z9dwxtjtd2z
8 Sep 22
A method, system and computer-readable storage medium for data backup by a backup server having local storage.
JAGANNATHDAS RATH, KALYAN C. GUNDA
Filed: 4 Mar 21
Utility
j5i7cfyml8q4u60i8qzgz
8 Sep 22
Embodiments for automating backup policies applied to users in an organization by defining backup policies based on hierarchical positions of users within the organization as modified by any communication and grouping behavior of the user within the organization.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 18 Jun 21
Utility
d3qtyyq0yn51o824 nrkeb
8 Sep 22
An efficient method for optimizing long-term retention backup policy within recovery point objectives (RPO).
Mengze Liao, Scott Randolph Quesnelle, Jinru Yan, Xiaoliang Zhu, Xiaolei Hu
Filed: 5 Mar 21
Utility
yh6i5xr5wslfgr z4tcfvc5ln5
8 Sep 22
Data protection systems generate backups that may be stored in a namespace that includes an active tier and a cloud tier.
Smriti Thakkar, Ramprasad N. Chinthekindi, Kalidas Balakrishnan, Kalyan C. Gunda
Filed: 5 Mar 21
Utility
rvklov bfrulw3e7mlqglwpdgtq0x5l
8 Sep 22
One example method includes receiving at a dedupe system, from a client, a request that comprises a set of fingerprints, where each fingerprint in the set corresponds to a particular data segment, filtering, at the dedupe system, the set of fingerprints into a set of unique fingerprints and a set of non-unique fingerprints, reading, at the dedupe system, from a container where copies of the non-unique fingerprints are stored, an additional set of non-unique fingerprints, sending, from the dedupe system to the client, a single response that comprises both the set of unique fingerprints and the additional set of non-unique fingerprints, and receiving from the client, at the dedupe system, data segments that respectively correspond to the unique fingerprints in the set of unique fingerprints, but no data segments corresponding to the non-unique fingerprints in the set of non-unique fingerprints are received by the dedupe system from the client.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 3 Mar 21
Utility
9brqdgx8rjgixkutt 3hky4mg46974vmzzsrdvt3k0qm9e2wp
8 Sep 22
A method, system and computer-readable storage medium for transferring data segments from one computer system to a second computing system.
JAGANNATHDAS RATH, KALYAN C. GUNDA
Filed: 4 Mar 21
Utility
wan4tj4clr01uqwfke9sj5z1p4pg
1 Sep 22
An apparatus comprises a processing device configured to control delivery of input-output operations from a host device to a storage system over selected ones of a plurality of paths through a network.
Kundan Kumar, Sanjib Mallick
Filed: 26 Feb 21
Utility
a1w775q4pdoy0nbuwj83q tkjsb9x7mnq4472pc4fmctvezfz
1 Sep 22
Techniques are provided for mapping storage volumes to storage processing nodes in a storage system.
Amihai Savir, Avitan Gefen
Filed: 26 Feb 21
Utility
6pfo9 c0rymetj6qk4kn2ztvxxxy
1 Sep 22
An apparatus comprises a processing device configured to receive multi-pathing settings from a plurality of nodes of one or more clusters, and to identify at least one group of the plurality of nodes belonging to a same cluster of the one or more clusters.
Peniel Charles, Manikandan Sethuraman, Gopinath Marappan
Filed: 26 Feb 21
Utility
z10onpth8q6e u0szw44vngdavcakx
1 Sep 22
Techniques for managing node failures in container environments are disclosed.
Kumar Prashant, Thomas L. Watson
Filed: 26 Feb 21
Utility
kuz tvhhdiy51m7rp2ahxghetjn8p7bvwqvpoxqd
1 Sep 22
Assets to associate to a data protection policy and configuration information for the policy is received.
Pravin Ashok Kumar, Wei Wang
Filed: 6 May 22
Utility
hr6l8wgtdyku6pntjrqpxus64 x98r5xpq2npz7
1 Sep 22
One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs.
Robert L. Fair, Thomas R. Vanderputten
Filed: 17 May 22
Utility
ma3kwjzwwr2icpr2ekwvo4r539v9didjjd3 k44p8jxlwabkjw3oyi8q8
1 Sep 22
Embodiments for providing secure communicate between a remote system in a private network by a mobile device using a mobile app using a short message service (SMS) protocol without using Internet Protocol (IP) communications.
Vaneeswaran N, Dheepan R
Filed: 26 Feb 21
Utility
nt9ucnw0x6gn7qgsc4yr52x5fww1cgui2846oxxwpzg0mtgljhpj
25 Aug 22
Detecting unauthorized encryptions in data storage systems is described.
Yevgeni Gehtman, Tomer Shachar, Maxim Balin
Filed: 22 Feb 21
Utility
5uxucebbgnuu127 amtcw05e1ktay72a96tda0l
25 Aug 22
Described is a system that leverages object storage provided access controls to secure backup data stored on a third-party cloud-based object storage.
Shelesh Chopra, Sunil Yadav, Tushar Dethe, Prabhat Kumar Dubey, Ravi Vijayakumar Chitloor, Amarendra Behera, Himanushu Arora, Jigar Bhanushali, Deependra Singh
Filed: 24 Feb 21
Utility
452r8rrenuicqb o9dcm64c9jnhbtkmhsijwruicso29v3v32vcl9
25 Aug 22
A computer implemented method of data compression using a hardware accelerator includes submitting a request to compress or decompress a data segment using a compression or decompression thread.
SHUGUANG GONG, COLIN ZOU, TAO CHEN
Filed: 25 Feb 21