3707 patents
Page 32 of 186
Utility
Importing Cryptographic Keys into Key Vaults
25 Aug 22
Techniques are provided to import a cryptographic key into a key vault in which an application programming interface for the key vault does not support importing existing cryptographic keys into the key vault.
Sridhar Villapakkam, Ajit Bhagwat
Filed: 25 Feb 21
Utility
Stochastic Risk Scoring with Counterfactual Analysis for Storage Capacity
18 Aug 22
One example method includes accessing a dataset, selecting a list of parameters of the dataset, each of the parameters being selected based on a determination that the parameter is affecting a size of the dataset and/or affecting an amount of data storage space consumed by the dataset, performing a counterfactual analysis using the parameters, and using results of the counterfactual analysis to generate a recommendation that identifies one or more data protection actions which influence utilization of the data storage space, and modifying utilization of the data storage space by implementing one of the data protection actions.
Bing Liu, Rahul Deo Vishwakarma
Filed: 18 Feb 21
Utility
0xaekyd5ehdduw39t1o0w7jnpala f2wg
18 Aug 22
A method comprises associating a first logical storage device with a first host device, wherein data encrypted using a private key of the first host device is written to the first logical storage device, generating a copy of the first logical storage device, associating the copy of the first logical storage device with a second logical storage device, wherein data encrypted using a private key of a second host device is written to the second logical storage device, and providing the second host device with access to an encrypted version of a public key of the first host device, encrypted using a public key of the second host device, to allow the second host device to obtain the public key of the first host device.
Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 17 Feb 21
Utility
zw3mtm7ic19tlojd495fuhdazkdmyo0dn4mje7jp7teqrc
18 Aug 22
First and second trees having entities identified by hexadecimal values are generated.
Yossef Saad, Itay Glick
Filed: 6 May 22
Utility
7zr2okp5fsqm66jh89bmqvn8iw0cxyuc3p2r3hyprrcuc
11 Aug 22
One example method includes collecting telemetry data for each of a group of virtual machines (VM), and each of the VMs is associated with a user, collecting usage data for each of the VMs, creating a user profile definition for each user, and the user profile definition is created based on the telemetry data and usage data of the VMs associated with that user, creating, for each user, a user profile that is based on the user profile definition for that user, clustering the users based on similarity of their respective user profiles, and generating a recommended VM hardware configuration for a VM of one of the users.
Amihai Savir, Avitan Gefen, Roi Gamliel
Filed: 26 Apr 22
Utility
kjtvfjks98xa3be6g1s4n1t4p7 wxfe42x
11 Aug 22
Techniques described herein relate to methods for managing backup and restore operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan, Parmeshwr Prasad
Filed: 11 Feb 21
Utility
pjhb3x33zjoaicmeb iw2832xm7rxtftswlyb6pbzzuf3kk1m99ova4iog
11 Aug 22
An apparatus comprises a processing device configured to receive a request to restore one or more applications, the request specifying one of a set of remote copies of storage volumes that store data of the applications.
Shivasharan Dalasanur Narayana Gowda, Sunil Kumar, Prashant Pokharna
Filed: 11 Feb 21
Utility
9uezbu25m46fgxq74pf52ti3ex jfx92vch9
11 Aug 22
Facilitating detection of anomalies of a target entity is provided herein.
Rômulo Teixeira de Abreu Pinho, Vítor Silva Sousa, Rodrigo Rios Almeida de Souza, Roberto Nery Stelling Neto
Filed: 20 Apr 22
Utility
xb67q cb2c106n5d1y5fs706sepek
11 Aug 22
Techniques for generating configuration information of a storage system involve: acquiring, in response to receiving a request to generate configuration information of a storage system, attribute information of an object created in the storage system.
Yongmei Zhang
Filed: 1 Jun 21
Utility
spi5i4v6j84xydga y7p4n89s3
11 Aug 22
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Adam E. Brenner, Mark D. Malamut
Filed: 28 Apr 22
Utility
ujc8qau0fky0r2zc9kbr11
4 Aug 22
The role of a node component of a distributed application may be changed without the need to terminate a current OS process implementing the node component.
Bathulwar Akash, Piyush Tibrewal, Aditya Sriram Mattaparthi, Suprava Das
Filed: 29 Jan 21
Utility
6gj94yz53wg4nt2sdwo87uwgry6tncopz2hmz7dq8ae5qm09guhhf1rlsxcd
4 Aug 22
A method, an electronic device, and a computer program product for displaying graphic interfaces are provided in embodiments of the present disclosure.
Danqing Sha, Zhen Jia, Anzhou Hou, Bin He
Filed: 22 Feb 21
Utility
71ufjhga3eq45cly2sbqqcj0hkn0k4inzhys6e8
4 Aug 22
A master profile may be created defining a plurality of values for a plurality of storage system parameters.
Finbarr O'RIORDAN, Audrey O'SULLIVAN, Tim O'CONNOR, Derrek BARRETT, Anna ODZIEMCZYK, Sean FLANAGAN
Filed: 29 Jan 21
Utility
qjd6htia880ynzk5pysoucn 6j9jfgmfie55s08a1vfbbbqyxvzay5zb
4 Aug 22
A technique for data reconstruction includes determining a plurality of types of data stored in a storage disk; determining an order in which data reconstruction is to be performed on the plurality of types of data based on corresponding likelihoods that the plurality of types of data are expected to be accessed; and performing the data reconstruction on the plurality of types of data in the determined order.
Wei Dong, Zhonghua Zhu
Filed: 9 Sep 21
Utility
50arfbv3xrcug4gm9oka01iqhrogtdv3jmyxq9y0rs636dix
4 Aug 22
In a method used for maximizing performance of a storage system, saturation points of the storage system for I/O requests of different types and sizes are identified.
Shuyu Lee, Vamsi K. Vankamamidi, Jeffrey L. Grummon
Filed: 29 Jan 21
Utility
tj4 f6fd991011lxze57k8z0g63z7abziuqpjc4zmpnl
4 Aug 22
A storage system is managed.
Xingshan Wang, Ao Sun
Filed: 29 Apr 21
Utility
ek3i8bcqpfjoh7bg29qngusx9pyvwu4uqft54rd78
4 Aug 22
Embodiments for a system and method of monitoring performance metrics of a computer network, by defining key performance indicators for the user behavior in the computer network, collecting behavior statistics for each user for each of the key performance indicators, and providing one or more anomaly detection policies to define anomalous behavior of the users with respect to data assets of the computer network.
Jennifer M. Minarik, Brian E. Freeman, Mark Malamut
Filed: 20 Apr 22
Utility
emxid2jxiyivx60h2jv5el v0lzvs2fb
4 Aug 22
For each of a plurality of commit operations to be executed for respective given code portions of a set of software code under development, at least one processing device performs a relevance analysis to identify one or more other code portions of the set of software code that each exhibits at least a threshold level of relevance to the given code portion, determines one or more code reviewers for the given code portion based at least in part on the one or more other code portions identified by the relevance analysis, assigns code review responsibilities for the given code portion to the one or more determined code reviewers, notifies the one or more determined code reviewers of the assigned code review responsibilities, and responsive to successful completion of code review by the one or more determined code reviewers, executes the commit operation for the given code portion.
Xiangping Chen, David Meiri
Filed: 1 Feb 21
Utility
9xn8ql00qp5 tm64l1wcs00u6eisnwenckrn924hbp9k5nhi
4 Aug 22
One example method includes performing various operations while a stream of IOs is being applied to a source dataset and replicated to a target dataset, and the operations include receiving a replicated IO that was previously applied to a source dataset Merkle tree, applying the replicated IO to a target dataset Merkle tree by entering an updated hash value in the target dataset Merkle tree, and applying a timestamp to the target dataset Merkle tree.
Jehuda Shemer, Alex Solan
Filed: 12 Apr 22
Utility
gm2s7je6v61qjgk32rn854kd8izn8zcwfpqjroby0zqyhdm l20atpz
4 Aug 22
Embodiments of the present disclosure relate to processing data.
Pengfei Su, Lu Lei, Julius Jian Zhu
Filed: 30 Apr 21