3707 patents
Page 52 of 186
Utility
Systems and Methods for Searching Deduplicated Data
31 Mar 22
A deduplicated storage system storing objects receives a search term.
Philip Shilane
Filed: 14 Dec 21
Utility
Method, Electronic Device, and Computer Program Product for Processing Machine Learning Model
31 Mar 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for processing a machine learning model.
Jinpeng Liu, Jin Li
Filed: 28 Oct 20
Utility
Adaptive Distributed Learning Model Optimization for Performance Prediction Under Data Privacy Constraints
31 Mar 22
An adaptive distributed learning model optimization for performance prediction under data privacy constraints.
Pablo Nascimento Da Silva, Paulo Abeiha Ferreira, Tiago Salviano Calmon, Vinicius Michel Gottin, Roberto Nery Stelling Neto
Filed: 25 Sep 20
Utility
Method, Device, and Computer Program Product for Managing Virtual Visual Content
31 Mar 22
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing virtual visual content.
Zhen Jia, Danqing Sha, Bin He, Xuwei Tang
Filed: 26 Oct 20
Utility
Splitting Neural Networks on Multiple Edge Devices to Train on Vertically Distributed Data
31 Mar 22
One example method includes a pipeline for a distributed neural network.
Mohamed Abouzeid, Osama Taha Mohamed, AbdulRahman Diaa
Filed: 30 Sep 20
Utility
Compliant and Auditable Data Handling In a Data Confidence Fabric
31 Mar 22
One example method includes receiving, at an entity, a stream of data and associated trust metadata, inspecting, by the entity, the trust metadata to identify a policy annotation, when the entity is capable of doing so, processing, by the entity, the stream of data according to requirements of the policy annotation, and annotating, by the entity, the processed data with an annotation to indicate that the data was processed in accordance with the requirements of the policy annotation.
Stephen J. Todd
Filed: 30 Sep 20
Utility
Techniques for Command Execution Using a State Machine
24 Mar 22
Techniques for rebooting a node may include: performing first processing that fails to reboot the node using a primary storage device of the node; responsive to the first processing failing to reboot the node using the primary storage device of the node, performing second processing that reboots the node using a secondary storage device of the node and executes a recovery operating system of the secondary storage device; determining, by the recovery operating system executing first code, whether the primary storage device of the node meets one or more criteria indicating that the primary storage device is faulty or defective; and responsive to determining the primary storage device of the node meets the one or more criteria, performing third processing that restores the primary storage device using the secondary storage device.
Roko Peros, Kenneth D. Lee, Peter J. McCann
Filed: 22 Sep 20
Utility
Dynamic Configuration Change Control In a Storage System Using Multi-path Layer Notifications
24 Mar 22
An apparatus comprises at least one processing device that is configured to monitor, in a multi-path layer thereof, a storage area network (SAN) through which one or more host devices access storage devices of a storage system, and responsive to at least one particular detected condition of the SAN, to generate in the multi-path layer one or more notifications for delivery to the storage system.
Rimpesh Patel, Amit Pundalik Anchi, Peniel Charles
Filed: 18 Sep 20
Utility
Dynamic Overprovisioning of Storage Device
24 Mar 22
The over-provisioning (OP) of a physical storage device (PSD) may be increased, and the useful life of the PSD increased, by converting uncompressed data stored on the PSD to compressed data.
Dustin H. Zentz, Kuolin Hua, Owen Martin
Filed: 21 Sep 20
Utility
Method, Device and Computer Program Product for Managing Storage Pool
24 Mar 22
Techniques involve: if it is detected that a storage pool fails, determining the number of failed storage devices in the storage pool; if it is determined that the number reaches a threshold number, determining whether the redundancy of the storage pool can be increased, the redundancy indicating the number of failed storage devices allowed without causing data loss in the storage pool; and if it is determined that the redundancy of the storage pool can be increased, adjusting at least part of a storage space for storing user data of the storage pool to a spare space of the storage pool to store data in a storage device that fails in the future.
Bo Hu, Qian Wu, Jing Ye
Filed: 3 Feb 21
Utility
Verified Write Command In Active-active Replication
24 Mar 22
A method is provided, comprising: receiving, at a first storage array, a first request to perform an atomic write operation at a specified address in a volume; placing a read-write lock on a first instance of the volume, and executing the atomic write operation on the first instance of the volume; transmitting, to a second storage array, a second request to perform the atomic write operation on a second instance of the volume; and detecting whether an error condition is present that is associated with the second request; when the error condition is present, comparing a first data item that is stored at the specified address in the first instance of the volume with a second data item that is stored at the specified address in the second instance of the volume, and, when the first data item matches the second data item, transmitting an acknowledgment.
David Meiri, Xiangping Chen
Filed: 23 Sep 20
Utility
Fast Recovery In Recoverpoint Using Direct Storage Access
24 Mar 22
Data protection operations based on direct storage access.
Alex Solan, Jehuda Shemer, Gabi Benhanokh
Filed: 1 Dec 21
Utility
Caching Techniques
24 Mar 22
Techniques for caching may include: determining an update to a first data page of a first cache on a first node, wherein a second node includes a second cache and wherein the second cache includes a copy of the first data page; determining, in accordance with one or more criteria, whether to send the update from the first node to the second node; responsive to determining, in accordance with the one or more criteria, to send the update, sending the update from the first node to the second node; and responsive to determining not to send the update, sending an invalidate request from the first node to the second node, wherein the invalidate request instructs the second node to invalidate the copy of the first data page stored in the second cache of the second node.
Alex Soukhman, Uri Shabi, Bar David
Filed: 24 Sep 20
Utility
Network Scaling Approach for Hyper-converged Infrastructure (Hci) and Heterogeneous Storage Clusters
24 Mar 22
Network scaling techniques for HCl and/or heterogeneous storage clusters.
Dmitry Vladimirovich Krivenok
Filed: 28 Apr 21
Utility
Smart Data Offload Sync Replication
24 Mar 22
A method is provided, comprising: receiving, from a host device, a request to create a token that represents one or more data items that are stored in a first volume, the first volume being stored in a source system; estimating an I/O latency limit for the first volume; estimating a token creation time for the token; comparing the token creation time to the I/O latency limit; when the token creation time matches the I/O latency limit: creating the token, creating a snapshot pair, mapping the token to the snapshot pair, and returning the token to the host device; when the token creation time does not match the I/O latency limit: creating the token, creating a first snapshot of the first volume at the source system, mapping the first snapshot to the token, and returning the token to the host device.
Xiangping Chen, David Meiri
Filed: 23 Sep 20
Utility
Resource Utilization Method, Electronic Device, and Computer Program Product
24 Mar 22
Embodiments of the present disclosure provide a resource utilization method, an electronic device, and a computer program product.
Tao Chen, Bing Liu
Filed: 22 Oct 20
Utility
Managing Input/output-critical Tasks and Background Tasks Within a Computer Device
24 Mar 22
A technique manages input/output(I/O)-critical tasks and background tasks within a computer device.
Lior Kamran, Amitai Alkalay
Filed: 23 Sep 20
Utility
Optimizing Container Image Encryption
24 Mar 22
One example method includes packaging a containerized application into at least two images.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 18 Sep 20
Utility
Backup Task Processing In a Data Storage System
24 Mar 22
Malware scan task processing in a data storage system is described herein.
Shiv Shankar Kumar, Avadut Mungre, Krishna Maheshwari
Filed: 24 Sep 20
Utility
Methods, Electronic Devices and Computer Program Product for Replicating Metadata
24 Mar 22
Metadata is replicated.
Xiao Chen, Richard Ding
Filed: 6 Dec 21