3707 patents
Page 45 of 186
Utility
Methods and Systems for Optimizing File System Usage
5 May 22
A method for generating a thread queue, that includes obtaining, by a user space file system, CPU socket data, and based on the CPU socket data, generating a plurality of thread handles for a plurality of cores, ordering the plurality of thread handles, in the thread queue, for a first core of the plurality of cores, and saving the thread queue to a region of shared memory.
Adrian Michaud
Filed: 30 Oct 20
Utility
Method, Electronic Device, and Computer Program Product for Adjusting Computing Load
5 May 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for adjusting a computing load.
Bin He, Zhen Jia, Danqing Sha, Si Chen, Zhenzhen Lin
Filed: 23 Nov 20
Utility
7kqu6rfdtgm6rr290qyjopt3iju58fbjs099q5itat joz2ap
5 May 22
A method for performing workloads is performed by a recommendation engine.
Omar Mohammed Mohammed Abdulaal, Shary George Waheeb Beshara, Mohamed Shaaban, Ahmad Refaat AbdelFadeel Ahmad ElRouby, Omar Mahmoud Ahmed Kamal Ibrahim
Filed: 29 Oct 20
Utility
4pg8golecu56e67qj863nllatd3y6owhmrtkttv
5 May 22
Storage management is performed.
Kelvon Naifeng Li
Filed: 15 Dec 20
Utility
pzdupvbbf4hm17icmo7t2os8c4yk6lod7r3rl76npvosait0d87a0tvv9x
5 May 22
Techniques for providing lifecycle handling of faults associated with a storage appliance.
Rohit K. Chawla, Philippe Armangau, Dixitkumar Patel, Vamsi K. Vankamamidi
Filed: 29 Oct 20
Utility
lxj00e0kkwvmwy3h0obh6y3vqe14z
5 May 22
Embodiments of the present disclosure relate to a method for storage management, an electronic device, and a computer program product.
Qin Liu, Lanjun LIAO
Filed: 14 Dec 20
Utility
yz21nst q8nbwzuzyxwke4bse
5 May 22
A method for managing storage devices includes obtaining a storage device cluster request, and in response to the storage device cluster request: obtaining a set of storage device telemetry entries associated with a plurality of storage devices, performing a telemetry normalization on the storage device telemetry entries to obtain a set of normalized entries, performing a pairwise evaluation on the set of normalized entries to obtain a set of initial storage device clusters, wherein a storage device cluster in the set of initial storage device clusters comprises a portion of the plurality of storage devices, performing a cluster re-evaluation on the set of initial storage device cluster groups to obtain a set of updated storage device clusters, updating a backup policy based on the set of updated storage device cluster groups, and performing a backup operation on a storage device based on the backup policy.
Hugo de Oliveira Barbalho, Tiago Salviano Calmon, Eduardo Vera Sousa
Filed: 29 Oct 20
Utility
fdii3buvge20suv3zr0a9e ss8y9pq8wnujswrf73tq4qi5o0tj0j92y57nc
5 May 22
A set of restore jobs are created to restore a backup.
Parmeshwr Prasad, Rahul Vishwakarma, Bing Liu
Filed: 29 Oct 20
Utility
j5h2vwv62f5vbabikbsj4ylmfhbp05aw8y35elzrab9h1g79mos2
5 May 22
An anomaly with a disk array enclosure (DAE) of a set of DAEs connected to a host server is detected.
Bing Liu, Rahul Vishwakarma
Filed: 24 Sep 21
Utility
44huco4cg3i3j3ij7zr 67kj9mazu
5 May 22
A method, electronic device, and computer program product for processing data is disclosed.
Weiyang Liu, Yongbing Xue, Jinjin Wang, Mengze Liao, Qi Wang
Filed: 26 Feb 21
Utility
jes3bj1ldjawsymkd0tu1s7vb8aa2bszotaeluu
5 May 22
A method of operating a storage appliance is provided.
Vamsi K. Vankamamidi, Philippe Armangau, David Bernard, Shari Vietry
Filed: 29 Oct 20
Utility
eqki4j43nmrn50d5459s
5 May 22
Techniques for address mirroring of a file system journal are presented.
Suraj Brahma Raju, Max Laier, Ronald Steinke
Filed: 29 Oct 20
Utility
pb5zokial00qy9pt53tkfuipxt58pxfw
5 May 22
Systems and methods facilitating fault tolerance for transaction mirroring are described herein.
Suraj Brahma Raju, Max Laier, Ronald Steinke
Filed: 29 Oct 20
Utility
15wlttveaubn 9utqrd0fxokv7vl3gut97k0q1pfesjpgcyh
5 May 22
Data stream processing is performed.
Lu Lei, Frank Yifan Huang, Julius Jian Zhu, Yu Teng
Filed: 17 Dec 20
Utility
z0n9wj2oou1nhfmlpqjxv5999twrxktinhd0w2li1l0a71p1iia
5 May 22
Techniques are provided for detection of unauthorized encryption using one or more deduplication efficiency metrics.
Yevgeni Gehtman, Maxim Balin, Tomer Shachar
Filed: 29 Oct 20
Utility
z4c446ok1tdk3uo2ti4mkm
5 May 22
One example method includes performing a secure boot of hardware at a node of a data confidence fabric, creating an artifact that includes information concerning the secure boot, storing the artifact, receiving a data stream at the node, annotating data of the data stream with trust metadata, and associating the artifact with the data.
Stephen J. Todd, Kenneth Durazzo
Filed: 29 Oct 20
Utility
zr6f5uvjp 15edxyj2hh75rxx31qy0k78dsheq
5 May 22
One example method includes receiving a user request for a data set, and the user request includes information concerning user requirements for the data set, identifying data records that satisfy one or more of the user requirements, calculating a respective relative value for each of the data records, and the relative values are based in part on the user requirements, and providing access controls for each data record that enable tracing of accesses of the data record.
Nicole Reineke, Stephen J. Todd, Donagh A. Buckley, Aurelian Dumitru, Robert A. Lincourt
Filed: 30 Oct 20
Utility
3x7jm9vg2pd7ro1bdozqguyjpcy9flesx54yxec9vu574lwjm7nmyr yx
5 May 22
Techniques are provided for multi-cloud data protection using threshold-based file reconstruction.
Tomer Shachar, Maxim Balin, Yevgeni Gehtman, Boris Giterman
Filed: 5 Nov 20
Utility
8834xv w1k7zllhzrv6cl6df23x0ndvq845y0tqt
5 May 22
Embodiments of the present disclosure provide a method, a device, and a program product for keystroke pattern analysis.
Zijia Wang, Qiang Chen, Jiacheng Ni, Zhen Jia
Filed: 30 Nov 20
Utility
5wpgxey9ovhwd3hg40f1
5 May 22
Methods for compression switching that includes distributing a model to client nodes, which use the model to generate a gradient vector (GV) based on a client node data set.
Paulo Abelha Ferreira, Pablo Nascimento Da Silva, Tiago Salviano Calmon, Roberto Nery Stelling Neto, Vinicius Michel Gottin
Filed: 29 Oct 20