3707 patents
Page 51 of 186
Utility
Data Reduction In Block-based Storage Systems Using Content-based Block Alignment
31 Mar 22
A method of data reduction in a block-based data storage system includes selecting a starting position in a block based on a deterministic function of block data content.
Uri Shabi, Ronen Gazit
Filed: 29 Sep 20
Utility
Remote Sharing of Directly Connected Storage
31 Mar 22
A host system may include a computational processing unit implemented using hardware and a hardware virtualizing and remote sharing (HVRS) server that virtualizes and shares the computational processing unit with other host systems, where the host system is directly connected to an internal fabric of a storage system.
Adnan Sahin, Ian Wigmore, Arieh Don
Filed: 30 Sep 20
Utility
In-band Extent Locking
31 Mar 22
Techniques for in-band locking of extents containing multiple pages of shared non-volatile data storage are disclosed in which inter-node lock request messages indicate both an individual page for which a lock is requested and the multi-page extent that contains that page.
Jason Raff, Shari Vietry, David Bernard
Filed: 28 Sep 20
Utility
Transitioning from a Donor Four Site Data Replication System to a Target Four Site Data Replication System
31 Mar 22
Transitioning from using a donor four site replication system to using a target four site replication system includes initiating synchronization between a first local storage system of the donor four site replication system that receives I/O from a host with an alternative first local storage system of the target four site replication system, the host switching to automatically fail over to a synchronous storage system of the target four site replication system that receives synchronous data from the alternative first local storage system following synchronizing the first local storage system with the alternative first local storage system, and the host switching to perform I/O operations with the alternative first local storage system following switching to automatically fail over to the synchronous storage system.
Brett A. Quinn, Paul A. Linstead, Douglas E. LeCrone
Filed: 29 Sep 20
Utility
Employing Triggered Retention in an Ordered Event Stream Storage System
31 Mar 22
Retention of events of an ordered event stream according to at least one triggered retention policy is disclosed.
Mikhail Danilov, Igor Medvedev
Filed: 30 Sep 20
Utility
Techniques Using Workload Clustering for Configuration Recommendations
31 Mar 22
Recommending configuration changes may include: receiving a decision tree comprising levels of nodes, wherein the decision tree includes leaf nodes each representing a different one of a plurality of hardware configurations, wherein a first leaf represents a first hardware configuration and the first leaf node is associated with a set of I/O workload features denoting a I/O workload of a first system having the first hardware configuration, wherein the set of I/O workload features is associated with an action from the first leaf node to a second leaf node, wherein the second leaf node represents a second hardware configuration and the action represents a hardware configuration change made to transition from the first to the second hardware configuration; and performing processing that determines, using the decision tree, a recommendation for a hardware configuration change for a second system having the first hardware configuration represented by the first leaf node.
Owen Martin, Fatemeh Azmandian, Peter Beale
Filed: 30 Sep 20
Utility
Systems for Modular Hybrid Storage Devices
31 Mar 22
A volatile storage component operatively connected to a node, that includes a volatile storage device, a power source, and a plurality of processor cores, where, a first processor core of the plurality of processor cores is executing a volatile storage firmware, and a second processor core of the plurality of processor cores is executing a volatile storage operating system.
Rajeev Tiwari, Yong Zou
Filed: 29 Sep 20
Utility
Optimized Pipeline to Boost De-dup System Performance
31 Mar 22
A deduplication pipeline method to enable shorter overall latency, servicing of multiple calls in parallel, and implementing higher data compression ratio.
Shuguang GONG, Yong ZOU, Jet CHEN
Filed: 29 Sep 20
Utility
Systems and Methods for Backing Up Volatile Storage Devices
31 Mar 22
A method for backing up data, that includes making a detection, by a volatile storage firmware, that data communication to a volatile storage component is degraded, initiating a direct memory access (DMA) engine to copy the data from the volatile storage component to a non-volatile storage device, and in response to initiating copying of the data, initiating a shutdown of the volatile storage component.
Yong Zou, Rajeev Tiwari
Filed: 29 Sep 20
Utility
Method, Device and Computer Program Product for Processing Access Management Rights
31 Mar 22
Techniques process an access management permission.
Fei Wang, Changxu Jiang
Filed: 2 Mar 21
Utility
Intelligent Peer-to-peer Container Filesystem
31 Mar 22
A peer container filesystem is provided.
Victor Fong, Xuebin He
Filed: 29 Sep 20
Utility
Fully Orchestrated Setup of a Containerized Cloud Communication System Within an Embedded Operating System
31 Mar 22
A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user.
Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
Filed: 27 Sep 20
Utility
Stub File Selection and Migration
31 Mar 22
A method comprises selecting at least a given stub file of one or more stub files for migration from a source storage location to a target storage location.
Rabi Shankar Shaw, Anurag Bhatnagar, Sarat Kumar Behera
Filed: 28 Sep 20
Utility
Automated Cloud Provider Creation and Synchronization in an Embedded Container Architecture
31 Mar 22
A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository.
Deepak Vokaliga, Kenneth Byrne, Warren Fleury, Thiago Santos
Filed: 27 Sep 20
Utility
Confidence-enabled Data Storage Systems
31 Mar 22
One example method includes receiving data from a node of a data confidence fabric, in response to receipt of the data, creating an annotation bookmark that (i) identifies a storage node at which the data was received and that (ii) uniquely identifies the data, annotating a copy of the data with the annotation bookmark, and storing, at the storage node, the copy of the data in association with the annotation bookmark.
Stephen J. Todd
Filed: 30 Sep 20
Utility
Access Control for an Ordered Event Stream Storage System
31 Mar 22
Access control for an ordered event stream (OES) storage system is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 30 Sep 20
Utility
Facilitating an Object Protocol Based Access of Data Within a Multiprotocol Environment
31 Mar 22
Facilitating an object protocol based access of data within a multiprotocol environment is presented herein.
Miles Ohlrich
Filed: 25 Sep 20
Utility
Trusted Enterprise Data Assets Via Data Confidence Fabrics
31 Mar 22
One example method includes checking an asset against an Inclusion List and/or an Exclusion List to determine if the asset is permitted to contribute data, generated by the asset, to an enterprise data confidence fabric, when the asset is present on the Inclusion List, or not present on the Exclusion List, designating the asset as a trusted asset and appending the data generated by the asset to a ledger of the enterprise data confidence fabric, updating a ledger content index to reflect the data that was appended to the ledger, and annotating the data generated by the asset with trust metadata.
Stephen J. Todd, Nicole Reineke
Filed: 30 Sep 20
Utility
Selective Utilization of Processor Cores While Rebuilding Data Previously Stored on a Failed Data Storage Drive
31 Mar 22
In response to failure of a data storage drive, data previously stored on the failed drive is rebuilt on a replacement data storage drive by executing drive rebuild jobs on a first set of processor cores.
Hongpo Gao, Philippe Armangau, Geng Han, Jian Gao, Shaoqin Gong
Filed: 30 Sep 20
Utility
Method, Electronic Device, and Computer Program Product for Managing File System
31 Mar 22
A method, an electronic device, and a computer program product for managing a file system are provided.
Chaojun Zhao, Jia Huang, Hongyuan Zeng, Hao Wang, Mingyi Luo
Filed: 22 Oct 20