3707 patents
Page 33 of 186
Utility
Method, Device, and Program Product for Data Rebuilding
4 Aug 22
A technique for data reconstruction includes determining a plurality of types of data stored in a storage disk; determining an order in which data reconstruction is to be performed on the plurality of types of data based on corresponding likelihoods that the plurality of types of data are expected to be accessed; and performing the data reconstruction on the plurality of types of data in the determined order.
Wei Dong, Zhonghua Zhu
Filed: 9 Sep 21
Utility
Method, Electronic Device, and Computer Program Product for Information Processing
4 Aug 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for information processing.
Zijia Wang, Chenxi Hu, Jiacheng Ni, Zhen Jia
Filed: 3 Mar 21
Utility
Method, Electronic Device, and Computer Program Product for Processing Image
4 Aug 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for processing an image.
Danqing Sha, Qiang Chen, Zhen Jia, Jinpeng Liu
Filed: 19 Feb 21
Utility
Method, Electronic Device, and Computer Program Product for Data Transmission
4 Aug 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data transmission.
Qiang Chen, Zhenzhen Lin, Si Chen
Filed: 23 Feb 21
Utility
Method and System for Compression In Block-based Storage Systems
28 Jul 22
In a method used for dictionary-based compression in a block-based storage system, a stored block of data that is similar to a received block of data is identified.
Uri Shabi, Amitai Alkalay
Filed: 26 Jan 21
Utility
Storage Management Method, Device, and Computer Program Product
28 Jul 22
A storage management technique involves: determining a spare degree of physical storage space of a file system and access characteristics of the file system; determining, using a provision operation classification model and based on the spare degree and the access characteristics, a target storage provision operation to be performed for the file system from multiple storage provision operations, wherein the multiple storage provision operations include at least a storage space expansion operation and a storage space reclamation operation, and the provision operation classification model characterizes an association relationship between different spare degrees and different access characteristics of the file system and the multiple storage provision operations; and performing the determined target storage provision operation for the file system.
Sicong Yao, Liang Huang, Ruipeng Yang, Jianhua Shao, Xianlong Liu
Filed: 18 May 21
Utility
Misaligned Io Sequence Data Deduplication (Dedup)
28 Jul 22
Aspects of the present disclosure relate to data deduplication (dedup) techniques for storage arrays.
Ramesh Doddaiah, Steve Lathrop, Anoop Raghunathan, Jeremy O'Hare
Filed: 28 Jan 21
Utility
Method, Electronic Device, and Computer Program Product for Data Compression
28 Jul 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data compression.
Tao Chen, Geng Han
Filed: 23 Feb 21
Utility
Disaster Recovery
28 Jul 22
One or more aspects of the present disclosure relates to disaster recovery of storage arrays.
Kevin Heasley
Filed: 27 Jan 21
Utility
Securely Archiving Digital Data In Dna Storage As Blocks In a Blockchain
28 Jul 22
Embodiments for storing digital data in DNA storage by receiving input file data, encoding the input file data into an oligonucleotide sequence to produce sequence data through a transformation of text to binary to Base_3 encoding, organizing the Base_3 sequence data into chunks of a defined chunk size, and storing the chunks in a block of a blockchain.
Rahul Vishwakarma, Bing Liu, Parmeshwr Prasad, Parminder Singh Sethi
Filed: 22 Jan 21
Utility
Storage Array Disk Recovery
28 Jul 22
One or more aspects of the present disclosure relate to recovering at least one failed disk.
Kuolin Hua, Kunxiu Gao
Filed: 28 Jan 21
Utility
Intelligent Alert Reduction in a Backup and Recovery Activity Monitoring System
28 Jul 22
Embodiments for monitoring performance metrics of a computer network by defining key performance indicators for the computer network, collecting performance data for the key performance indicators, and providing one or more anomaly detection policies to define anomalous performance of the computer network using defined threshold values.
Brian E. Freeman, Jennifer M. Minarik, Mark Malamut
Filed: 11 Jun 21
Utility
Tiered Persistent Memory Allocation
28 Jul 22
The present disclosure relates to one or more memory management techniques.
Owen Martin, Michael Scharland, Earl Medeiros, Parmeshwr Prasad
Filed: 27 Jan 21
Utility
Maintaining Retention Policies In a Block Storage, Multi-client Dedup Domain
28 Jul 22
One example method includes maintaining a deduplication data structure including one or more entries that each identify a respective fingerprint, and pointer, and also maintaining a ClientBlockList data structure comprising one or more entries that each identify a respective handle, retention date, and block, receiving a write request that identifies a handle, retention date, and block, computing a fingerprint of the block identified in the write request, determining, by the server, whether the fingerprint is in the deduplication data structure, and when the fingerprint is not in the deduplication data structure, storing the block identified in the write request at location ‘L’ in the deduplication data structure, and adding, to the deduplication data structure, an entry that identifies the fingerprint and the location ‘L,’ and adding, to the ClientBlockList data structure, an entry that identifies the handle, retention date, and fingerprint.
Radia J. Perlman, Kalyan C. Gunda
Filed: 28 Jan 21
Utility
Copying Data Between Storage Systems
28 Jul 22
Copying data from a source storage system to a target storage system includes resetting a write tracker on the source storage system to track writes to the source storage system by one or more host computing systems, copying data from the source storage system to the target storage system after resetting the write tracker, suspending writes to the source storage system after copying the data, and copying data portions of the source storage system to the target storage system that are indicated as being written by the write tracker after suspending writes to the source storage system.
Douglas E. LeCrone, Denis J. Burt, Brett A. Quinn, Paul A. Linstead
Filed: 28 Jan 21
Utility
Storing Digital Data In Storage Devices Using Smart Contract and Blockchain Technology
28 Jul 22
Embodiments include a method of storing digital data in a blockchain by receiving the digital data from a user, deduplicating the data in a deduplication system of the user to form deduplicated data, and encoding the deduplicated data into an array format for storage on a blockchain.
Rahul Vishwakarma, Bing Liu, Parmeshwr Prasad, Parminder Singh Sethi
Filed: 22 Jan 21
Utility
Simulation for Alternative Communication
28 Jul 22
A host computing system includes an applications layer containing one or more user applications that perform I/O operations, an access methods layer that communicates with the applications layer, an I/O drivers layer that communicates with the access methods layer, and an SSCH simulation layer that communicates with the I/O drivers layer and that simulates a Fibre Channel connection that is accessed by applications in the applications layer.
Douglas E. LeCrone, Jeffrey L. Jones, Paul A. Linstead, Bruce A. Pocock
Filed: 28 Jan 21
Utility
Method and System for Managing Changes of Records on Hosts
28 Jul 22
A system for identifying and deleting records of hosts includes a local data manager.
Asif Khan, Kenneth William Owens, Adrian Dobrean, Aneesh Kumar Gurindapalli, Vipin Kumar Kaushal, Yasemin Ugur-Ozekinci, Shelesh Chopra
Filed: 27 Jan 21
Utility
Alerting and Managing Data Storage System Port Overload Due to Host Path Failures
28 Jul 22
Techniques for detecting and managing target port overloads due to host initiator or path failures may include: receiving I/Os from initiators of a host at target ports of a data storage system; determining initiator workloads for the initiators; determining target workloads for the target ports; determining that a first of the initiators of the host is a failed initiator that has stopped sending I/Os to the data storage system, wherein the first initiator has a first of the initiator workloads; determining, in accordance with the first initiator workload, revised target workloads for the target ports; determining, in accordance with revised target workloads, whether any of the target ports is expected to be overloaded; and responsive to determining that at least one of the target ports is expected to be overloaded, performing a corrective action to alleviate or reduce an overloaded workload condition expected for the at least one target port.
Krishna Deepak Nuthakki, Arieh Don
Filed: 27 Jan 21
Utility
Method and System for Identifying and Deleting Records on Hosts
28 Jul 22
A system for identifying and deleting records of hosts includes a local data manager.
Asif Khan, Kenneth William Owens, Adrian Dobrean, Aneesh Kumar Gurindapalli, Vipin Kumar Kaushal, Yasemin Ugur-Ozekinci, Shelesh Chopra, Gowtham Krishna Iyengar Srinivasa Rangan
Filed: 27 Jan 21