3707 patents
Page 31 of 186
Utility
Method to Optimize Ingest In Dedupe Systems by Using Compressibility Hints
8 Sep 22
A method, system and computer-readable storage medium for transferring data segments from one computer system to a second computing system.
JAGANNATHDAS RATH, KALYAN C. GUNDA
Filed: 4 Mar 21
Utility
Automatic Identification of Computer Agents for Throttling
8 Sep 22
Computer agents can be throttled individually.
Leo Hendrik Reyes Lozano
Filed: 5 Mar 21
Utility
Method and System for Predicting User Involvement Requirements for Upgrade Failures
8 Sep 22
A method for managing upgrades of components of clients includes obtaining an upgrade failure prediction request associated with a client of the clients, and in response to obtaining an update failure prediction request: obtaining live data associated with the client, matching the live data with a training data cluster, selecting relevant features associated with processed training data of the training data cluster, generating an upgrade failure prediction using the live data associated with the relevant features and a prediction model, making a determination that the upgrade failure prediction implicates an action is required, and based on the determination, initiating performance of the action.
Shelesh Chopra, Parminder Singh Sethi, Anannya Roy Chowdhury, Rahul Vishwakarma
Filed: 5 Mar 21
Utility
Writing Data Blocks Directly to Object Storage
8 Sep 22
Storing data in an object store in cloud-based storage for data protection applications to address key user workflows, and provide an easily and seamlessly scalable system that minimizes the cost economics of the various resources, considers how backups are transmitted and which target data is most important during a restore operation.
Mark Malamut, Arun Murti, Adam Brenner, Lev Ayzenberg, Sharon Vitek
Filed: 5 Mar 21
Utility
Method and System for Performing Data Protection Services for User Data Associated with Calendar Groups
8 Sep 22
A system for providing data protection services for user data associated with calendar groups generated by an application includes persistent storage for storing user data backups and a manager.
Anjana Rao, Tushar Dethe, Sapna Chauhan, Jigar Premjibhai Bhanushali, Sunil Yadav, Amarendra Behera, Shelesh Chopra, Himanshu Arora, Vipin Kumar Kaushal, Deependra Pratap Singh
Filed: 5 Mar 21
Utility
Method to Prevent Backup Failures When the Backup Server Storage Utilization Is Full or Nearly Full
8 Sep 22
A method, system and computer-readable storage medium for data backup by a backup server having local storage.
JAGANNATHDAS RATH, KALYAN C. GUNDA
Filed: 4 Mar 21
Utility
Efficient Method for Optimizing Long-term Retention Backup Policy Within Recovery Point Objectives (Rpo)
8 Sep 22
An efficient method for optimizing long-term retention backup policy within recovery point objectives (RPO).
Mengze Liao, Scott Randolph Quesnelle, Jinru Yan, Xiaoliang Zhu, Xiaolei Hu
Filed: 5 Mar 21
Utility
Invocation Calls Enabling Applications to Initiate Reactive Actions In Response to Resource State Changes of Assets
8 Sep 22
An apparatus comprises a processing device configured to register one or more applications to receive resource state change invocation calls from one or more assets of an information technology infrastructure, to detect resource state changes for the one or more assets of the information technology infrastructure, and to provide, from a given one of the one or more assets of the information technology infrastructure to a given one of the one or more applications, a given resource state change invocation call responsive to detecting one or more resource state changes for the given asset.
Shivasharan Dalasanur Narayana Gowda, Prashant Pokharna, Sunil Kumar
Filed: 2 Mar 21
Utility
Organizational Awareness for Automating Data Protection Policies Using Historical Weighting
8 Sep 22
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 9 Sep 21
Utility
Organizational Awareness for Automating Data Protection Policies with Social Graph Integration
8 Sep 22
Embodiments for automating backup policies applied to users in an organization by defining backup policies based on hierarchical positions of users within the organization as modified by any communication and grouping behavior of the user within the organization.
Arun Murti, Mark Malamut, Adam Brenner
Filed: 18 Jun 21
Utility
File Based Encryption for Multi-pathing Devices
1 Sep 22
An apparatus comprises a processing device configured to control delivery of input-output operations from a host device to a storage system over selected ones of a plurality of paths through a network.
Kundan Kumar, Sanjib Mallick
Filed: 26 Feb 21
Utility
Synchronization of Multi-pathing Settings Across Clustered Nodes
1 Sep 22
An apparatus comprises a processing device configured to receive multi-pathing settings from a plurality of nodes of one or more clusters, and to identify at least one group of the plurality of nodes belonging to a same cluster of the one or more clusters.
Peniel Charles, Manikandan Sethuraman, Gopinath Marappan
Filed: 26 Feb 21
Utility
Mitigating and Automating Backup Failure Recoveries In Data Protection Policies
1 Sep 22
Assets to associate to a data protection policy and configuration information for the policy is received.
Pravin Ashok Kumar, Wei Wang
Filed: 6 May 22
Utility
Container-based Stateful Application Resilience to Node Failure
1 Sep 22
Techniques for managing node failures in container environments are disclosed.
Kumar Prashant, Thomas L. Watson
Filed: 26 Feb 21
Utility
Mapping Storage Volumes to Storage Processing Nodes Using Input/Output Operation Constraints and Cost Function
1 Sep 22
Techniques are provided for mapping storage volumes to storage processing nodes in a storage system.
Amihai Savir, Avitan Gefen
Filed: 26 Feb 21
Utility
Method for Dynamic Pseudofs Creation and Management In a Network Filesystem
1 Sep 22
One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs.
Robert L. Fair, Thomas R. Vanderputten
Filed: 17 May 22
Utility
Secure Remote Access to Private Networks without Internet Connectivity
1 Sep 22
Embodiments for providing secure communicate between a remote system in a private network by a mobile device using a mobile app using a short message service (SMS) protocol without using Internet Protocol (IP) communications.
Vaneeswaran N, Dheepan R
Filed: 26 Feb 21
Utility
Detecting Unauthorized Encryptions In Data Storage Systems
25 Aug 22
Detecting unauthorized encryptions in data storage systems is described.
Yevgeni Gehtman, Tomer Shachar, Maxim Balin
Filed: 22 Feb 21
Utility
Leveraging Access Controls to Secure Backup Data Stored on a Cloud-based Object Storage
25 Aug 22
Described is a system that leverages object storage provided access controls to secure backup data stored on a third-party cloud-based object storage.
Shelesh Chopra, Sunil Yadav, Tushar Dethe, Prabhat Kumar Dubey, Ravi Vijayakumar Chitloor, Amarendra Behera, Himanushu Arora, Jigar Bhanushali, Deependra Singh
Filed: 24 Feb 21
Utility
Adaptive Inline Polling of Data Compression with Hardware Accelerator
25 Aug 22
A computer implemented method of data compression using a hardware accelerator includes submitting a request to compress or decompress a data segment using a compression or decompression thread.
SHUGUANG GONG, COLIN ZOU, TAO CHEN
Filed: 25 Feb 21