3707 patents
Page 42 of 186
Utility
Performance-driven Movement of Applications Between Containers with Different Access Protocols
9 Jun 22
An apparatus in one embodiment comprises at least one processing device.
Amit Pundalik Anchi, Sanjib Mallick, Vinay G. Rao, Arieh Don
Filed: 8 Dec 20
Utility
Method, Electronic Device and Computer Program Product for Accessing Storage System
9 Jun 22
Techniques for accessing a storage system involve: based on a detection that a first host configured to use a first protocol to access a storage system is connected to the storage system, determining a source logical storage space from a second group of logical storage spaces associated with a second protocol.
Jun Hu, Wai C. Yim, Yang Liu, Fengwei Fu, Yinlong Lu
Filed: 11 Mar 21
Utility
Performance-driven Access Protocol Switching for a Logical Storage Device
9 Jun 22
An apparatus in one embodiment includes at least one processing device, with the at least one processing device comprising a processor and a memory coupled to the processor.
Amit Pundalik Anchi, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 7 Dec 20
Utility
Method, Device, and Program Product for Managing Address of Device In Network
9 Jun 22
A technique that manages device addresses involves: sending, at a first device, a probe message to at least one other device, wherein the probe message includes a first MAC address of the first device, a first identifier of the first device, and an IP address to be assigned to the first device; receiving a message from a second device, the message including a second MAC address of the second device, a second identifier of the second device, and an IP address of the second device; and according to a determination that the IP address of the second device is the same as the IP address to be assigned to the first device, providing a probe alert including the identifies and indicating that an IP address conflict occurs.
Rui Chen, Hua Wang, Yuhan Zou
Filed: 4 May 21
Utility
Method, Device, and Program Product for Creating Extent Array In Storage System
2 Jun 22
In creating an extent array in a storage system, in response to receiving a request to generate an extent array using idle extents in storage devices, a width of an extent stripe is determined, and a size of the extent array is designated by the storage system.
Jianbin Kang, Hongpo Gao, Chun Ma, Jibing Dong
Filed: 12 May 21
Utility
Differential Snapshot without Array Support
2 Jun 22
Methods, apparatus, and processor-readable storage media for implementing differential snapshots without array support are provided herein.
Thomas L. Watson
Filed: 30 Nov 20
Utility
Array Driven Fabric Performance Notifications for Multi-pathing Devices
2 Jun 22
A host device is configured to communicate over a network with a storage system.
Peniel Charles, Gopinath Marappan, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 30 Nov 20
Utility
Smart De-fragmentation of File Systems Inside VMS for Fast Rehydration In the Cloud and Efficient Deduplication to the Cloud
2 Jun 22
One example method includes chunking a respective disk of each of a plurality of virtual machines (VM) to create a respective plurality of chunks associated with each of the VMs, creating, based on the chunking process, a cluster comprising one or more of the VMs, creating a VM template whose data and disk structure match respective data and disk structures of each of the VMs in the cluster, and in response to a file operation involving a first one of the VM disks, defragmenting the first VM disk so that a disk structure of the first VM disk is the same as a disk structure of the VM template.
Assaf Natanzon, David Zlotnick, Boris Shpilyuck
Filed: 17 Feb 22
Utility
Signal Events for Synchronization to Facilitate Mode Changes In a Streaming Data Storage Platform
2 Jun 22
The technology describes synchronization of writer and reader applications in a streaming data storage system, such as to facilitate a mode switch in which event writers can change event contents being appended to stream segments and event readers can process the event contents according to the new mode.
Mikhail Danilov, Andrei Paduroiu
Filed: 2 Dec 20
Utility
Distributed Backup Using Local Access
2 Jun 22
An apparatus comprises at least one processing device comprising a processor and a memory.
Sunil Kumar, Krishna Deepak Nuthakki, Arieh Don
Filed: 30 Nov 20
Utility
Automated Seamless Migration Across Access Protocols for a Logical Storage Device
2 Jun 22
An apparatus in one embodiment stores a first version of an operating system data structure comprising a first identifier of a logical storage device associated with a first access protocol, and in conjunction with migration of the logical storage device from utilization of the first access protocol to utilization of a second access protocol, temporarily continues to present information from the first version of the operating system data structure in response to one or more requests relating to the logical storage device, obtains a second identifier of the logical storage device associated with the second access protocol, stores a second version of the operating system data structure comprising the second identifier of the logical storage device associated with the second access protocol, and switches from presenting information from the first version of the operating system data structure to presenting information from the second version of the operating system data structure.
Amit Pundalik Anchi, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 30 Nov 20
Utility
Managing Host Connectivity to a Data Storage System
2 Jun 22
Techniques are provided for managing host connectivity to a data storage system.
Rivka Matosevich, Doron Tal, Yakov Gerlovin
Filed: 30 Nov 20
Utility
Client-side Compression
2 Jun 22
A method of sending blocks of data from a client to be stored at a storage server, wherein for each block compression and encryption is performed at the client, and deduplication is performed at the server.
Senthil PONNUSWAMY, Charles W. KAUFMAN, Radia J. PERLMAN
Filed: 2 Dec 20
Utility
Efficient Method for Generating Asset Backup Scheduling Plans
2 Jun 22
An efficient method for generating asset backup scheduling plans.
Hugo de Oliveira Barbalho, Tiago Salviano Calmon, Eduardo Vera Sousa
Filed: 30 Nov 20
Utility
Verifying a Target Object Based on Confidence Coefficients Generated by Trained Models
2 Jun 22
Embodiments include a method, an electronic device, and a computer program product for information processing.
Jiacheng Ni, Jinpeng Liu, Qiang Chen, Zhen Jia
Filed: 30 Dec 20
Utility
Ordering Events Within a Streaming Data Storage Platform
2 Jun 22
The described technology is generally directed towards a streaming data storage system that maintains streamed events, including in a manner that facilitates the ordering of those events based on external ordering (position) data.
Andrei Paduroiu
Filed: 2 Dec 20
Utility
Hardware System Protection Using Verification of Hardware Digital Identity Values
2 Jun 22
Techniques are provided for hardware system protection using verification of hardware digital identity values.
Maxim Balin, Tomer Shachar, Yevgeni Gehtman
Filed: 27 Nov 20
Utility
Centralized Retention and Backup Deletions
2 Jun 22
Systems and methods for deleting backup pieces associated with an application such as a database application.
Navneet Upadhyay, Amith Ramachandran
Filed: 2 Dec 20
Utility
Method, Electronic Device, and Computer Program Product for Deploying Machine Learning Model
2 Jun 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for deploying a machine learning model.
Jinpeng Liu, Jin Li
Filed: 21 Dec 20
Utility
Method, Electronic Device, and Computer Program Product for Information Processing
2 Jun 22
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for information processing.
Zijia Wang, Jiacheng Ni, Zhen Jia, Bo Wei, Chun Xi Chen
Filed: 12 Jan 21