3707 patents
Page 50 of 186
Utility
Credential Manager with Account Selection and Resource Load-balancing
14 Apr 22
The described technology is generally directed towards managing accounts for connecting applications to (e.g., third party) cloud storage providers.
Wyatt Tischler
Filed: 14 Oct 20
Utility
Smart Network Interface Card-based Splitter for Data Replication
14 Apr 22
One example method includes a splitter for data protection operations including replication operations.
Yossef Saad
Filed: 13 Oct 20
Utility
shl8zvjlpgoqilja8e92m7x2osr0q5tfuq2x1 xn1qlc3z
14 Apr 22
Successful storing of extent operations into corresponding records of a transaction log results in acknowledgement of completion of the extent operations being indicated to one or more hosts.
Socheavy Heng, William C. Davenport
Filed: 9 Oct 20
Utility
lywk7il7kxgl9f9y6zbtuec6i5sy quwfwkgo9urs3vhfmw01uv77k7b
14 Apr 22
An apparatus comprises at least one processing device that is configured to send write requests to a first storage system.
Sanjib Mallick, Vinay G. Rao, Krishna Deepak Nuthakki, Arieh Don
Filed: 12 Oct 20
Utility
0lzln65gcjfuinipqyke3wkp6w1t6pih00eedon5zv41e
14 Apr 22
An intelligent method of scheduling garbage collection (GC) in a storage system.
Tony T. WONG, Abhinav DUGGAL, Joseph JOBI
Filed: 13 Oct 20
Utility
zcom67vp0tlubvrzhswawuksuxgi eizqwnto3uv377tn
14 Apr 22
Techniques are provided for path management and failure prediction in a multipath environment using target port power levels.
Joseph G. Kanjirathinkal, Peniel Charles, Owen Crowley
Filed: 13 Oct 20
Utility
hyfjrra1o0w20v6t3hh5j02r9xt7snqidq
14 Apr 22
Balasundaram Govindan
Filed: 13 Oct 20
Utility
ruai35adz52t0wy1ocogtjjcyigw2qpt0rxgfebvd ixjam20o316s
14 Apr 22
Replication of a filesystem or a mount point or share may replicate all data that it consists of irrespective of where the data is stored.
Nitin Madan, Kalyan C. Gunda, Bhimsen Bhanjois
Filed: 13 Oct 20
Utility
q6xkliu9sijkexph730ludrivy67lrjl0v6qb9 awjaepcrfsmosmyez2
14 Apr 22
A method of capturing a fractional snapshot of a distributed file system includes receiving a snapshot request to generate a factional snapshot of a file system.
Charles J. HICKEY, Murthy V. MAMIDI, Geetha SHENDGE, Sai CHIVUKULA, Xiaohong W. WANG, George MATHEW, Abhishek RAJIMWALE
Filed: 14 Oct 20
Utility
05w8lem xul0w25ys5lmpufrd4
14 Apr 22
Change notify responses can be utilized to inform a remote computer that a file or directory that is being monitored has changed.
Dipankar Roy
Filed: 23 Dec 21
Utility
bs6doib5gjdkhpgtciw37ty7vrrs6c643l
14 Apr 22
Pipeline-based techniques for system configuration management are provided.
Anurag Sharma, Sujayendra Thammaiah, Christopher Trudel, John Moran, Ramesh Ramanathan, Ranjini Gogga, Sunil Bhaskarnaidu
Filed: 14 Oct 20
Utility
23i8wm0zovsvw9fn1wc3gvecijsdn550mmwex68lo1eu939if4 9z7n
14 Apr 22
A secure approval chain for runtime protection is disclosed.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 13 Oct 20
Utility
74l2tqm0d8tk9vlaoj09odt8pgu5v34b
14 Apr 22
An apparatus comprises at least one processing device comprising a processor coupled to memory.
Dan Aharoni, Itay Keller
Filed: 14 Oct 20
Utility
d36720g1gs 5jyy0oocto00h715
31 Mar 22
Techniques for determining a compliance level may include: receiving a remote replication policy for a data set; determining a current remote replication configuration of the data set; and performing evaluation processing that determines, in accordance with the remote replication policy for the data set, the compliance level for remote replication of the data set, wherein said evaluation processing includes verifying that the topology of the current remote replication configuration for the data set matches a specified topology of the remote replication policy for the data set.
Brian O'Halloran, Siobhan McLoughlin
Filed: 29 Sep 20
Utility
dkft6vibftogx my5kpkx0fd9me0uiov0od0b4r4ny2flm
31 Mar 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for storing and accessing data.
Zhenzhen Lin, Si Chen
Filed: 16 Oct 20
Utility
cawe7qyvz 38qzv6f8n4z4h8p7ni89exk0vf4j1e1k5no8lfujagwt5zk
31 Mar 22
Snapshots are created on replicated storage systems R1 and R2 in a manner resulting in identical snapshots being generated on R1 and R2.
Michael Barber, Yaron Dar, Michael E. Specht, Arieh Don
Filed: 30 Sep 20
Utility
tfo7ihaadkqwz99fkrziys9xde576drzvqwval o33l2f4ut
31 Mar 22
A method of data reduction in a block-based data storage system includes selecting a starting position in a block based on a deterministic function of block data content.
Uri Shabi, Ronen Gazit
Filed: 29 Sep 20
Utility
z5sqdguoirld89faib5mwt6ahlx44bte6f6trim 3vc
31 Mar 22
Directly writing snapshot data for a volume on a storage system to an external storage includes receiving a write of new data to a portion of the storage system, forming encapsulated data by encapsulating either the new data or data at the portion of the storage system in a format that is native to the storage system, and directly writing the encapsulated data to the external storage.
Brett A. Quinn, Paul A. Linstead, Douglas E. LeCrone
Filed: 29 Sep 20
Utility
s0haiztbikhy0a 8iftq6ebqezqbxr4ce5
31 Mar 22
Information pertinent to a connectivity issue reported by a switch may be determined, compiled and reported; and action may be taken autonomously to address the connectivity issue based on the information.
Alan Rajapa, Scott Rowlands, Erik P. Smith, Igor Fradkin, Arieh Don
Filed: 30 Sep 20
Utility
3qop8esdrj4izwgsigj9k7ttnbodpeb7r8q98lhlg72p4g15
31 Mar 22
Non-volatile Random Access Memory (NVR) on a storage system may be dynamically converted between use as temporary memory in a memory context and use as persistent memory in a storage context.
Owen Martin, Earl Medeiros, Parmeshwr Prasad, Rahul Deo Vishwakarma
Filed: 28 Sep 20