3707 patents
Page 40 of 186
Utility
Method, Device, and Computer Program Product for Managing Storage System
23 Jun 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage system.
Lingdong Weng, Bing Liu
Filed: 15 Jan 21
Utility
Hash Migration Using a Gold Image Library Management System
23 Jun 22
Embodiments for migrating hash values for backup data blocks in a network of data protection targets (DPTs) and a common data protection target implementing a Gold image library management system in which backups of Gold images used as templates for physical machines and virtual machines are stored on the CDPT.
Arun Murti, Mark Malamut, Stephen Smaldone
Filed: 12 Mar 21
Utility
bbfl18m9 6iwj1hjuc52m8qtggyx5crqpd
23 Jun 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data processing.
Shuguang Gong, Bing Liu
Filed: 12 Jan 21
Utility
nrf6j5h9h2nise93uhxlx3n56gkbfwnxis8uifncb85r 9lb6al0
23 Jun 22
Techniques manage an access load of a storage system.
Chi Chen, Huijuan Fan
Filed: 19 May 21
Utility
yvbdvt7appcr3wn 9ksssjao9ssd8txd32ooul0gqg0me2s7kpr
23 Jun 22
The described technology is generally directed towards a virtualized dedicated hot spare storage device in a RAID-configured data storage system, in which the capacity of the dedicated spare storage device is distributed among the physical disks underlying a RAID virtual disk.
Rajasekhar Nannapaneni, Ganesh Chichakar
Filed: 21 Dec 20
Utility
zxq4pow7 x6ata1wfrzzffy4
23 Jun 22
One example method includes collecting information concerning respective data access patterns of one or more customers, using the information, and work window information, to calculate a respective data retrieval frequency for each of the customers, and enabling the customers to retrieve data according to their respective data retrieval frequency.
Ganesh Malhari Ghodake, Girish Balvantrai Doshi
Filed: 17 Dec 20
Utility
e845xthrp00v1fiu20w8un p5v8qbidduvrx5p8
23 Jun 22
Conditionally appending an event in an ordered event stream (OES) is disclosed.
Andrei Paduroiu
Filed: 18 Dec 20
Utility
gj0y84m6s5x4305gq5zn5 at2
23 Jun 22
A knowledge base record can include executable language.
WEIYANG LIU, QI WANG, JAMES MORTON, LIHUI SU, MING ZHANG
Filed: 23 Dec 20
Utility
d2sko2rsdlgosq5i1j4tpxicjms7qubg8d52bua7riq0sov0k
23 Jun 22
A method comprises storing information corresponding to a plurality of files being written from a source storage device to a cloud storage platform in a file transfer operation.
Sarat Kumar Behera, Anurag Bhatnagar, Rabi Shankar Shaw
Filed: 23 Dec 20
Utility
celdp4vbthw9w54rbs7fo8 bpke74jfunz4de19i9iohnohfn3
23 Jun 22
Described is a system (and method) for specialized data management when performing incremental backups to a cloud-based object storage.
Sunil Yadav, Shelesh Chopra, Ravi Vijayakumar Chitloor, Tushar Dethe, Amarendra Behera, Deependra Singh, Jigar Bhanushali, Himanshu Arora, Prabhat Kumar Dubey
Filed: 18 Dec 20
Utility
ya51ixju50106sspr162ryq94jj2t5ajb4h86f
23 Jun 22
A method and system for risk score based asset data protection using a conformal framework.
Shelesh Chopra, Mahantesh M. Ambaljeri, Rahul Deo Vishwakarma, Parmeshwr Prasad
Filed: 22 Dec 20
Utility
v64yngm 4axhrj15duso0kwfgkzzsal8e9ccqwyef5a
23 Jun 22
Facilitating efficient copy reuse of point-in-time (PIT) backup data in a data storage system by providing a data protection target (DPT) for storing user the PIT backup data, and a common data protection target (CDPT) accessible to but separate from the data protection target for storing Gold image data comprising structural data for operating system and application programs as defined by a manufacturer and different from the backed user content data.
Arun Murti, Mark Malamut, Stephen Smaldone
Filed: 12 Feb 21
Utility
rgp0g4s6u9ncmrk68smfksy559ztevdg11gsvqfszxhcze
23 Jun 22
Reducing backup data by providing a data protection target for storing content data from clients running operating system and applications, and a common data protection target (CDPT) separate from the data protection target for storing Gold image data for the operating system and applications.
Mark Malamut, Stephen Smaldone
Filed: 17 Dec 20
Utility
dzdwbq9o44fno 9i4gmah5bnn8u7luo0n124wir5hmpr
23 Jun 22
One example method includes generating a fingerprint:tag dictionary that includes a group of fingerprints and a group of tags, and the fingerprint:tag dictionary identifies, for each fingerprint, the tag or tags which include that fingerprint, computing a similarity matrix based on the fingerprint:tag dictionary, and the similarity matrix identifies, for each pair of tags in the fingerprint:tag dictionary, a relative similarity of the tags in the pair to each other, running a clustering algorithm to identify groups of similar tags in the similarity matrix, and deduplicating, based on the groups of similar tags, respective data associated with the fingerprints.
Smriti Thakkar, Tony T. Wong, Abhinav Duggal
Filed: 17 Dec 20
Utility
yqq2 vbmia3chvzw4iucp4mk1um7
23 Jun 22
Automatically updating operating system and application programs in a large-scale network using Gold image data.
Mark Malamut, Arun Murti, Stephen Smaldone
Filed: 12 Feb 21
Utility
6bui1xhq7a17ej67b0c80h1 v02ywn2ohlo9n6h0133uhgbi
23 Jun 22
Methods for backup and recovery are disclosed.
Mengze Liao, Lihui Su, Weiyang Liu, Yun Zhang, Yujun Liang
Filed: 23 Apr 21
Utility
d6c3a497rfa0d52bh45jqcb3y6la1
23 Jun 22
A method and system for health rank based virtual machine restoration using a conformal framework.
Shelesh Chopra, Mahantesh M. Ambaljeri, Rahul Deo Vishwakarma, Gopal Singh, Parmeshwr Prasad
Filed: 22 Dec 20
Utility
r3nz3uyriv wdg0qjmf3seta0ui
23 Jun 22
Managing lock coordinator rebalance in distributed file systems is provided herein.
Ron Steinke
Filed: 17 Dec 20
Utility
fn9g8mzu99kgqupvs08nd4rh9q69kh7qdg8eyws 2d4k7
23 Jun 22
A method of generating a hybrid snapshot includes receiving a request to generate a snapshot of a distributed file system and identifying a first storage resource of the distributed file system and a second storage resource of the distributed file system based on the request.
Charles J. HICKEY, George Mathew, Murthy V. Mamidi, Sampath Jayaram
Filed: 18 Dec 20
Utility
mgoh3klt0xfh8a7uysn19on e9flnwlhbe3ogueh6
23 Jun 22
An apparatus in one embodiment includes at least one processing device comprising a processor coupled to a memory, with the at least one processing device being configured to maintain a replication journal for recording replication write requests in a storage system, to detect a failure impacting the replication journal, and to initiate recovery of the replication journal responsive to the detected failure.
Xiangping Chen, David Meiri
Filed: 21 Dec 20