3707 patents
Page 32 of 186
Utility
Importing Cryptographic Keys into Key Vaults
25 Aug 22
Techniques are provided to import a cryptographic key into a key vault in which an application programming interface for the key vault does not support importing existing cryptographic keys into the key vault.
Sridhar Villapakkam, Ajit Bhagwat
Filed: 25 Feb 21
Utility
Stochastic Risk Scoring with Counterfactual Analysis for Storage Capacity
18 Aug 22
One example method includes accessing a dataset, selecting a list of parameters of the dataset, each of the parameters being selected based on a determination that the parameter is affecting a size of the dataset and/or affecting an amount of data storage space consumed by the dataset, performing a counterfactual analysis using the parameters, and using results of the counterfactual analysis to generate a recommendation that identifies one or more data protection actions which influence utilization of the data storage space, and modifying utilization of the data storage space by implementing one of the data protection actions.
Bing Liu, Rahul Deo Vishwakarma
Filed: 18 Feb 21
Utility
njfodgt3es70s5mjp3byv
18 Aug 22
A method comprises associating a first logical storage device with a first host device, wherein data encrypted using a private key of the first host device is written to the first logical storage device, generating a copy of the first logical storage device, associating the copy of the first logical storage device with a second logical storage device, wherein data encrypted using a private key of a second host device is written to the second logical storage device, and providing the second host device with access to an encrypted version of a public key of the first host device, encrypted using a public key of the second host device, to allow the second host device to obtain the public key of the first host device.
Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 17 Feb 21
Utility
luovp8plpf7ucgq5jhhgk11g36igj0pbp6ky2hrl5zternwg2fnh gr8tky
18 Aug 22
First and second trees having entities identified by hexadecimal values are generated.
Yossef Saad, Itay Glick
Filed: 6 May 22
Utility
qt25px70b5bej1nejgv64yghjqk7nwyexifnf700dix371xn3c6l8k
11 Aug 22
One example method includes collecting telemetry data for each of a group of virtual machines (VM), and each of the VMs is associated with a user, collecting usage data for each of the VMs, creating a user profile definition for each user, and the user profile definition is created based on the telemetry data and usage data of the VMs associated with that user, creating, for each user, a user profile that is based on the user profile definition for that user, clustering the users based on similarity of their respective user profiles, and generating a recommended VM hardware configuration for a VM of one of the users.
Amihai Savir, Avitan Gefen, Roi Gamliel
Filed: 26 Apr 22
Utility
t8xmaqhirpvmixu8lkbzxs3n5syig5v9fqbkjzyq9274yzttxg8
11 Aug 22
Techniques described herein relate to methods for managing backup and restore operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan, Parmeshwr Prasad
Filed: 11 Feb 21
Utility
ne7bq27wvu 1n3pyvvuzk32255rucl12rvqitz1
11 Aug 22
An apparatus comprises a processing device configured to receive a request to restore one or more applications, the request specifying one of a set of remote copies of storage volumes that store data of the applications.
Shivasharan Dalasanur Narayana Gowda, Sunil Kumar, Prashant Pokharna
Filed: 11 Feb 21
Utility
bneo9kks2xa5uo7b npzoc
11 Aug 22
Facilitating detection of anomalies of a target entity is provided herein.
Rômulo Teixeira de Abreu Pinho, Vítor Silva Sousa, Rodrigo Rios Almeida de Souza, Roberto Nery Stelling Neto
Filed: 20 Apr 22
Utility
kiud 5jhqqb0q504vkirien1d53twhwre5t7dcn7ltbk5yqiiioqwm
11 Aug 22
Techniques for generating configuration information of a storage system involve: acquiring, in response to receiving a request to generate configuration information of a storage system, attribute information of an object created in the storage system.
Yongmei Zhang
Filed: 1 Jun 21
Utility
w4clupbjtqfz2bkq3b9w848i95r3o
11 Aug 22
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Adam E. Brenner, Mark D. Malamut
Filed: 28 Apr 22
Utility
je314rarghtf56ijot58uxsllqhuifvtg74vo22 gjf
4 Aug 22
The role of a node component of a distributed application may be changed without the need to terminate a current OS process implementing the node component.
Bathulwar Akash, Piyush Tibrewal, Aditya Sriram Mattaparthi, Suprava Das
Filed: 29 Jan 21
Utility
vy9fls4gmfxnk8b4dy9i9p2wrow8wv1dbqcia73qarprvh29dcsg0sbr0
4 Aug 22
A method, an electronic device, and a computer program product for displaying graphic interfaces are provided in embodiments of the present disclosure.
Danqing Sha, Zhen Jia, Anzhou Hou, Bin He
Filed: 22 Feb 21
Utility
l2hcvtlyyh0e7db68dh5jfzictdenf5uu
4 Aug 22
A master profile may be created defining a plurality of values for a plurality of storage system parameters.
Finbarr O'RIORDAN, Audrey O'SULLIVAN, Tim O'CONNOR, Derrek BARRETT, Anna ODZIEMCZYK, Sean FLANAGAN
Filed: 29 Jan 21
Utility
qu19fplf54zo1z032f9impre1xclq3
4 Aug 22
A technique for data reconstruction includes determining a plurality of types of data stored in a storage disk; determining an order in which data reconstruction is to be performed on the plurality of types of data based on corresponding likelihoods that the plurality of types of data are expected to be accessed; and performing the data reconstruction on the plurality of types of data in the determined order.
Wei Dong, Zhonghua Zhu
Filed: 9 Sep 21
Utility
k91hloc68 q6xflx10zh917qhl6
4 Aug 22
In a method used for maximizing performance of a storage system, saturation points of the storage system for I/O requests of different types and sizes are identified.
Shuyu Lee, Vamsi K. Vankamamidi, Jeffrey L. Grummon
Filed: 29 Jan 21
Utility
ce0 ups9yxqfjd7vc50h0p2je
4 Aug 22
A storage system is managed.
Xingshan Wang, Ao Sun
Filed: 29 Apr 21
Utility
k2lo1nivtbkir1s2qfy2kvka79zg7 bhp9
4 Aug 22
Embodiments for a system and method of monitoring performance metrics of a computer network, by defining key performance indicators for the user behavior in the computer network, collecting behavior statistics for each user for each of the key performance indicators, and providing one or more anomaly detection policies to define anomalous behavior of the users with respect to data assets of the computer network.
Jennifer M. Minarik, Brian E. Freeman, Mark Malamut
Filed: 20 Apr 22
Utility
q47k3n6mowpwrltwnrzc0ccwprng5zvvtnb4qldcsmpk
4 Aug 22
For each of a plurality of commit operations to be executed for respective given code portions of a set of software code under development, at least one processing device performs a relevance analysis to identify one or more other code portions of the set of software code that each exhibits at least a threshold level of relevance to the given code portion, determines one or more code reviewers for the given code portion based at least in part on the one or more other code portions identified by the relevance analysis, assigns code review responsibilities for the given code portion to the one or more determined code reviewers, notifies the one or more determined code reviewers of the assigned code review responsibilities, and responsive to successful completion of code review by the one or more determined code reviewers, executes the commit operation for the given code portion.
Xiangping Chen, David Meiri
Filed: 1 Feb 21
Utility
8h2c3o8brsn 1dkcvg7r7sqtvb2dfhwba2yh9w3a7yqum1m
4 Aug 22
One example method includes performing various operations while a stream of IOs is being applied to a source dataset and replicated to a target dataset, and the operations include receiving a replicated IO that was previously applied to a source dataset Merkle tree, applying the replicated IO to a target dataset Merkle tree by entering an updated hash value in the target dataset Merkle tree, and applying a timestamp to the target dataset Merkle tree.
Jehuda Shemer, Alex Solan
Filed: 12 Apr 22
Utility
63md64yqi3rqhpy6pitjawavgt4fnzbmwxleugwnhl xcz1avbn0p
4 Aug 22
Embodiments of the present disclosure relate to processing data.
Pengfei Su, Lu Lei, Julius Jian Zhu
Filed: 30 Apr 21