3707 patents
Page 34 of 186
Utility
Similarity Deduplication
28 Jul 22
Dictionary-based compression is performed to compress data units using a similar data unit as the base unit (i.e., dictionary) for each candidate data unit.
Alexei Kabishcer, Uri Shabi
Filed: 22 Jan 21
Utility
Method, Device, and Program Product for Managing Index of Storage System
28 Jul 22
Indices of storage systems are managed.
Julius Jian Zhu, Lu Lei, Pengfei Su, Jingjing Liu
Filed: 30 Apr 21
Utility
zt469a2f9 caogmhhxg9u0v10od1x95laav
28 Jul 22
Techniques are used for replication in a storage system.
Lior KAMRAN, Amitai Alkalay
Filed: 26 Jan 21
Utility
camj13mte7thoaxnty5z5dtxs13hwyx2covai2zl2g4xbxdy2xx
28 Jul 22
A storage management technique involves: determining a spare degree of physical storage space of a file system and access characteristics of the file system; determining, using a provision operation classification model and based on the spare degree and the access characteristics, a target storage provision operation to be performed for the file system from multiple storage provision operations, wherein the multiple storage provision operations include at least a storage space expansion operation and a storage space reclamation operation, and the provision operation classification model characterizes an association relationship between different spare degrees and different access characteristics of the file system and the multiple storage provision operations; and performing the determined target storage provision operation for the file system.
Sicong Yao, Liang Huang, Ruipeng Yang, Jianhua Shao, Xianlong Liu
Filed: 18 May 21
Utility
hxswcnjxci4ji6gba9xeahatps wuwe7bu9q1
28 Jul 22
A method comprising: retrieving one or more customer engagement records, the one or more customer engagement records being associated with an opportunity for making a sale to a customer; identifying a plurality of free text samples that are part of the customer engagement records; identifying a plurality of data items that are part of the free text samples; calculating a plurality of semantic distances, each of the semantic distances corresponding to a different one of a plurality of data item pairs; clustering the data items into textual clusters based on the identified semantic distances; and training a classifier based, at least in part, on the textual clusters, the classifier being configured to receive an offer for the customer, classify the offer and output an estimation of whether the offer is expected to result in a sale.
Anat Parush Tzur, Amihai Savir
Filed: 22 Jan 21
Utility
dtz98f7nrt48jkahevwfsfxb3ry7
28 Jul 22
Techniques for managing metadata storage units involve: in response to receiving, from a client, a request for allocating a target number of metadata storage units, determining a first number of available metadata storage units remaining in a metadata storage space of a storage system after the allocation is performed; and if the first number is not less than a reserved number, allocating the target number of metadata storage units from the metadata storage space for the client to use, wherein the reserved number is associated with a usage condition of the metadata storage units in the storage system.
Xiongcheng Li, Xinlei Xu, Sihang Xia, Tianshu Sun, Ping Ge
Filed: 1 Sep 21
Utility
d8jyry2y21dg6yig7eta63ndzjuujoz5fxj
28 Jul 22
A field-replaceable unit is reversibly secured in place using two captive fasteners.
Amrita Sidhu Maguire, Ilhan C. Gundogan, Keith C. Johnson, Jason J. Duquette
Filed: 28 Jan 21
Utility
qy705efql 5v8sieflbeqpzl
28 Jul 22
Techniques involve obtaining, at a first network interface card coupled with a first device, information related to a plurality of data blocks to be written to a second device, the information including sizes of the plurality of data blocks and a plurality of destination addresses in a memory of the second device where the plurality of data blocks will be written.
Yinlong Lu, Haohan Zhang, Yang Liu, Dezheng Zhang, Chen Bian
Filed: 15 Sep 21
Utility
z4x749dane29m90bdbc983tud 743579m6g62ogq7
28 Jul 22
Providing TCP/IP control commands to a storage system includes intercepting TCP/IP data provided on a TCP/IP network, determining if the TCP/IP data corresponds to a control command directed to the storage system, and converting the TCP/IP data to a Fibre Channel control command that is forwarded to the storage system if the TCP/IP data is a control command directed to the storage system.
Douglas E. LeCrone, Brett A. Quinn
Filed: 27 Jan 21
Utility
rbdjdiigezzzekdneykvt7ejp
28 Jul 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data compression.
Tao Chen, Geng Han
Filed: 23 Feb 21
Utility
hrbvhcvbzt3jpb3a8hz jo41bpzd0uas9hkwc4dvkkdx
28 Jul 22
A technique for deploying virtual volumes in a metro cluster across first and second arrays includes impersonating a third array that purports to host single-site virtual volumes.
Dmitry Nikolayevich Tylik, Alexey Vladimirovich Shusharin, Mark J. Halstead, Michael Specht
Filed: 22 Jan 21
Utility
8ceb646jcsawcle0jjynv44b8te 21mp71m39
28 Jul 22
The present disclosure relates to a method, a device, and a program product for deploying a visual resource.
Bin He, Danqing Sha, Zhen Jia, Xuwei Tang
Filed: 19 Feb 21
Utility
f8105tx3eucvfs3 4qk7wf
28 Jul 22
A method includes: acquiring a set of operations to be performed on multiple computing units in the computing system; determining, based on the set of operations, the state of the multiple computing units, and an allocation model, an allocation action for allocating the set of operations to the multiple computing units and a reward for the allocation action, wherein the allocation model describes an association relationship among a set of operations, the state of multiple computing units, the allocation action for allocating the set of operations to the multiple computing units, and the reward for the allocation action; receiving an adjustment for the reward in response to determining that a match degree between the reward for the allocation action and a performance index of the computing system after the allocation action is performed satisfies a predetermined condition; and generating, based on the adjustment, training data for updating the allocation model.
Zhen Jia, Zijia Wang
Filed: 18 Feb 21
Utility
xwiis6y1qragclo90z7mnr83lr7k 39t41vpkz60v7wc
28 Jul 22
Embodiments for monitoring performance metrics of a computer network by defining key performance indicators for the computer network, collecting performance data for the key performance indicators, and providing one or more anomaly detection policies to define anomalous performance of the computer network using defined threshold values.
Brian E. Freeman, Jennifer M. Minarik, Mark Malamut
Filed: 11 Jun 21
Utility
xk4476velmhb5jd6ckq mt59xzdop9jq2
28 Jul 22
Hongpo Gao, Jian Gao, Shaoqin Gong, Baote Zhuo
Filed: 8 Sep 21
Utility
gty3jmrb7vjf1yyla6mjs6u m0dpfepdsalbpz91
28 Jul 22
Techniques for managing backup plans in information processing systems are disclosed.
Sunil Kumar
Filed: 22 Jan 21
Utility
u5fcyjdl3zaz2gz06xvs 2afunxmse0x20wqkbcnlocnf0p938gyg5alq
28 Jul 22
Techniques for managing a storage system involve flushing a target page in a cache device to a persistent storage device of the storage system.
Geng Han, Jian Gao, Xinlei Xu, Yousheng Liu, Jianbin Kang
Filed: 8 Sep 21
Utility
einlkw7prw22wgux8d5restgyqrlvy
28 Jul 22
A method and system for assessing sequentiality of a data stream is disclosed.
Vinicius Michel Gottin, Tiago Salviano Calmon, Paulo Abelha Ferreira, Hugo de Oliveira Barbalho, RĂ´mulo Teixeira de Abreu Pinho
Filed: 28 Jan 21
Utility
wwmrjshq94x6d4a9l4lccl3vna 0o00
28 Jul 22
One example method includes maintaining a deduplication data structure including one or more entries that each identify a respective fingerprint, and pointer, and also maintaining a ClientBlockList data structure comprising one or more entries that each identify a respective handle, retention date, and block, receiving a write request that identifies a handle, retention date, and block, computing a fingerprint of the block identified in the write request, determining, by the server, whether the fingerprint is in the deduplication data structure, and when the fingerprint is not in the deduplication data structure, storing the block identified in the write request at location ‘L’ in the deduplication data structure, and adding, to the deduplication data structure, an entry that identifies the fingerprint and the location ‘L,’ and adding, to the ClientBlockList data structure, an entry that identifies the handle, retention date, and fingerprint.
Radia J. Perlman, Kalyan C. Gunda
Filed: 28 Jan 21
Utility
86fyuzbx5lvrvhuh437mwpkksei ce
28 Jul 22
Embodiments include a method of storing digital data in a blockchain by receiving the digital data from a user, deduplicating the data in a deduplication system of the user to form deduplicated data, and encoding the deduplicated data into an array format for storage on a blockchain.
Rahul Vishwakarma, Bing Liu, Parmeshwr Prasad, Parminder Singh Sethi
Filed: 22 Jan 21