3707 patents
Page 46 of 186
Utility
Data-driven Sales Recommendation Tool
5 May 22
One example method includes receiving a quote for provision of goods and/or services, and the quote concerns a particular account, receiving information concerning characteristics of the account identified in the quote, receiving information concerning characteristics of the goods and/or services specified in the quote, generating a probability that the quote will be approved by the account, and the probability is generated based on the characteristics of the account and the characteristics of the goods and/or services specified in the quote, when the probability is below a threshold, generating an adjusted quote based on input received, and generating an updated probability based on the adjusted quote.
Noga Gershon, Amihai Savir, Avitan Gefen
Filed: 29 Oct 20
Utility
Detection of Unauthorized Encryption Using Key Length Evaluation
5 May 22
Techniques are provided for detection of unauthorized encryption in a storage system using key length evaluation.
Yevgeni Gehtman, Maxim Balin, Tomer Shachar
Filed: 29 Oct 20
Utility
Encryption at Rest Using KMS and TPM
5 May 22
One example method includes receiving clear text data at a storage system, generating, at the storage system, a clear text data encryption key, requesting a key management system to encrypt the clear text data encryption key with a master key to create an encrypted data encryption key, and the requesting is performed by the storage system, receiving, at the storage system, the encrypted data encryption key from the key management system, encrypting, at the storage system, the clear text data with the clear text data encryption key to create encrypted data, and storing, together, the encrypted data and the encrypted data encryption key.
Senthil Ponnuswamy, Kalidas Balakrishnan, Mahadev Karadigudda
Filed: 30 Oct 20
Utility
Managing Trusted Communications Between Server and Clients
5 May 22
A technique for managing communications between a server and multiple clients includes configuring the server to support multiple sets of certificates for respective clients having respective root certificates.
Dmitry Nikolayevich Tylik, Charles W. Kaufman, Gregory W. Lazar, Marco Abela, Jingyan Zhao
Filed: 30 Oct 20
Utility
Maintaining Distributed References to Data for Use by Devices of a Computer Network
5 May 22
Maintaining distributed references to data stored on devices of a computer network is described.
Pankaj Datta
Filed: 29 Oct 20
Utility
Method, Device, and Computer Program Product for Edge Resource Aggregation
5 May 22
Embodiments of the present disclosure provide a method, a device, and a computer program product for edge resource aggregation.
Bin He, Chenxi Hu, Lian Li, Baorui Wu
Filed: 1 Dec 20
Utility
Method, System, and Computer Program Product for Deploying Application
5 May 22
Methods, systems, and computer program products for deploying an application.
Jinpeng Liu, Jin Li
Filed: 25 Nov 20
Utility
Authentication Token Management for Multiple Processes and Representational State Transfer Clients
5 May 22
Embodiments for processing authentication tokens in a system with multiple Representational State Transfer (REST) servers and clients.
Vaneeswaran N, Pushpendra Sinha
Filed: 29 Oct 20
Utility
Adapting Service Level Policies for External Latencies
28 Apr 22
Techniques for processing I/O operations in a data storage system may include: receiving I/O operations directed to a logical device associated with a service level specifying a target I/O response time goal; receiving a input identifying whether to calculate an observed I/O response time for the logical device using only an internal processing time associated with processing performed within the data storage system when servicing I/O operations directed to the logical device; determining, in accordance with the input and the I/O operations directed to the logical device, the observed I/O response time for the logical device; determining a service level violation for the first logical device whereby the observed I/O response time violates the service level; and responsive to determining the service level violation whereby the observed I/O response time violates the service level, performing processing to alleviate or remove the first service level violation.
John A. Adams, Arieh Don, John R. Lynch
Filed: 27 Oct 20
Utility
Storage Array Resource Control
28 Apr 22
Aspects of the present disclosure relate to controlling storage array resource consumption.
Owen Martin, Arieh Don
Filed: 22 Oct 20
Utility
Storage Device Health Status Controller
28 Apr 22
One or more aspects of the present disclosure relate to a storage health status.
Aaron Twohig, Paul McSweeney
Filed: 26 Oct 20
Utility
Method, Device and Computer Program Product for Storage Management
28 Apr 22
Techniques perform storage management.
Jianbin Kang, Jian Gao, Hongpo Gao, Xinlei Xu
Filed: 4 Mar 21
Utility
Techniques for Generating Data Sets with Specified Compression and Deduplication Ratios
28 Apr 22
Techniques for generating data sets may include: receiving an initial buffer that achieves a compression ratio responsive to compression processing using a compression algorithm, the initial buffer including first content located at a first position in the initial buffer and including second content located at a second position in the initial buffer; and generating a data set of buffers using the initial buffer.
Ivan Bassov, Istvan Gonczi, Sorin Faibish
Filed: 22 Oct 20
Utility
Compaction via an Event Reference in an Ordered Event Stream Storage System
28 Apr 22
Compaction of an ordered event stream (OES) is disclosed.
Mikhail Danilov, Andrei Paduroiu
Filed: 28 Oct 20
Utility
Managing I/o Communications Based on Transceiver State
28 Apr 22
A storage system may manage I/O communications between the storage system and other components on a storage network based on the state information of transceivers (e.g., SFPs) along I/O paths between the storage system and other network components.
Joseph G. Kanjirathinkal, Peniel Charles, Owen Crowley
Filed: 23 Oct 20
Utility
Synthetically Providing Multiple Types of Granular Delete Operations for a Cloud-based Object Storage
28 Apr 22
Described is a system (and method) for providing multiple types of granular delete operations for a cloud-based object storage.
Ravi Vijayakumar Chitloor, Sunil Yadav, Shelesh Chopra, Amarendra Behera, PrabhatKumar Dubey, Deependra Singh, Jigar Bhanushali, Himanshu Arora, Tushar Dethe
Filed: 23 Oct 20
Utility
Data Deduplication (Dedup) Management
28 Apr 22
Aspects of the present disclosure relate to data deduplication (dedup) techniques for storage arrays.
Ramesh Doddaiah
Filed: 26 Oct 20
Utility
Method and System for Storage Load Balancing Based on Virtual Synthetics Metadata
28 Apr 22
A method and system for storage load balancing based on virtual synthetics metadata.
Kedar Sadanand Godbole, Nitin Madan, Srikant Viswanathan
Filed: 27 Oct 20
Utility
Cache Memory Management
28 Apr 22
One or more aspects of the present disclosure relate to cache memory management.
John Creed, John Krasner
Filed: 22 Oct 20
Utility
Defragmentation of Striped Volume In Data Storage System
28 Apr 22
A storage control system generates a striped storage volume in an array of data storage devices.
Vladimir Shveidel, Lior Kamran
Filed: 23 Oct 20