3707 patents
Page 53 of 186
Utility
Passive Management of Network Connections
24 Mar 22
Techniques are provided for passive management of network connections.
Rafal Szczesniak, Jeremy Hitt
Filed: 18 Sep 20
Utility
Decoupled Architecture for Artificial Intelligence Model Management
24 Mar 22
A decoupled artificial intelligence model management architecture comprises a front-end component, a scheduler component and a back-end component configured to enable an open and dynamic system which accepts any models from any formats to be deployed on any target devices and to dynamically change scheduling of parallelism, parameter movements and computation executions across the target devices.
Jinpeng Liu, Jin Li, Zhen Jia, Christopher S. MacLellan
Filed: 23 Sep 20
Utility
Techniques for Command Execution Using a State Machine
17 Mar 22
Techniques for processing a request may include: providing tasks to a state machine framework, wherein the tasks perform processing of a workflow for servicing the request; generating, by the state machine framework, a state machine for processing the request, wherein the state machine includes states associated with the tasks, wherein generating the state machine may include automatically determining a first state transition of the state machine between a first and a second of the states; receiving the request; and responsive to receiving the request, performing first processing using the state machine to service the request.
Daniel K. O'Reilly, JR., Matthew P. Jean, Michael J. Burns
Filed: 11 Sep 20
Utility
Method, Electronic Device and Computer Program Product for Storage Management
17 Mar 22
Techniques for storage management involve: receiving, at a storage server, an access request for target data from a client, wherein the access request occurs in a session between the storage server and the client; determining, based on attribute information of the client, security information of the session, wherein the security information indicates whether the session is subjected to antivirus protection; and executing, based on the security information, an access operation specified by the access request on the target data.
Ying Yu, Jing Li, Ming Yue, Jia Huang, Nan Wang
Filed: 27 Jan 21
Utility
Maintaining Consistency of Asynchronous Replication
17 Mar 22
Maintaining consistency for asynchronous replication of LUNs of a local storage system to corresponding LUNs of a remote storage system includes copying application data written to LUNs to cache slots, copying metadata of LUNs to cache slots, associating a first sequence number to all metadata modifications and all application data writes that are begun after a first time and before a second time, associating a second sequence number, different from the first sequence number, to all metadata modifications and all application data writes that are begun after the second time, and, after completion of all metadata modifications and all application data writes associated with the first sequence number, initiating transfer to the remote storage system of all metadata modifications and all application data writes associated with the first sequence number.
Bhaskar Bora, Mark J. Halstead, Michael E. Specht, Benjamin Yoder, Deepak Vokaliga
Filed: 17 Sep 20
Utility
Stream Allocation Using Stream Credits
17 Mar 22
Systems and methods for allocating resources are disclosed.
Keyur B. Desai
Filed: 22 Nov 21
Utility
Method for Managing Artificial Intelligence Application, Device, and Program Product
17 Mar 22
The present disclosure relates to a method for managing an artificial intelligence (AI) application, a device, and a program product.
Qiang Chen, Jiacheng Ni, Jinpeng Liu, Zhen Jia
Filed: 12 Oct 20
Utility
Recommendation System for Replication Policies
17 Mar 22
One example method includes generating a policy recommendation that can be implemented in data protection systems.
Arik Sapojnik, Amihai Savir, Anat Parush Tzur
Filed: 17 Sep 20
Utility
Generating Recommendations for Protection Operations Performed for Virtual Storage Volumes
17 Mar 22
An apparatus comprises at least one processing device configured to identify a protection operation to be performed for a virtual storage volume, the virtual storage volume comprising two or more storage volumes on two or more storage systems, a first one of the storage volumes on a first one of the storage systems comprising data that is mirrored on a second one of the storage volumes on a second one of the storage systems different than the first storage system.
Sunil Kumar, Prashant Pokharna, Ashutosh Kumar Singh
Filed: 14 Sep 20
Utility
Intelligent Recovery from Multiple Clouds Copies
17 Mar 22
Data protection operations including recovery operations are disclosed.
Yossef Saad
Filed: 17 Sep 20
Utility
Method, Electronic Device and Computer Program Product for Managing Backup System
17 Mar 22
A method, electronic device, and computer readable medium for managing a backup system is disclosed.
Jie Liu, Qin Liu
Filed: 28 Jan 21
Utility
Optimized Document Backup to Cloud-based Object Store
17 Mar 22
Storing documents in an object store in the cloud by creating a container for the documents, defining a document record including unique document ID and an index.
Mark Malamut, Adam Brenner, Arun Murti
Filed: 17 Sep 20
Utility
Data Center Backup at the Edge
17 Mar 22
One example method includes determining a respective available data storage capacity for each of the edge sites, receiving available data storage capacity information from each of the edge sites, storing the available data storage capacity information, creating a backup dataset, determining whether the group of edge sites have an aggregate amount of available storage capacity to store the backup dataset, and storing the backup dataset across the edge sites when the aggregate amount of available storage capacity is sufficient to store the entire backup dataset.
Yossef Saad, Kfir Wolfson
Filed: 17 Sep 20
Utility
Post-processing Global Deduplication Algorithm for Scaled-out Deduplication File System
17 Mar 22
A method, apparatus, and system for redistributing files in a multi-node storage system to improve global deduplication storage savings is disclosed.
Tony Wong, ABHINAV DUGGAL, SMRITI THAKKAR, YU QIU, Pei Jie Sim, RAHUL NIHALANI
Filed: 17 Sep 20
Utility
Virtualization Server Aware Multi-pathing Failover Policy
17 Mar 22
A host device is configured to communicate over a network with a storage system comprising a plurality of storage devices.
Rimpesh Patel, Amit Pundalik Anchi
Filed: 14 Sep 20
Utility
Improving the Recovery Time Objective of Backup Recovery from the Cloud
17 Mar 22
Embodiments for performing data recovery from cloud storage to a backup appliance that goes from an offline state to an online state, including identifying super metadata among metadata stored in the cloud storage for the backup appliance, wherein the super metadata comprises an amount on the order of ten percent of the metadata representing a minimum amount of information to reconstruct the metadata, copying the super metadata blocks from the cloud storage to local metadata storage of the backup appliance while it is in the offline state to leave remaining metadata, and copying the remaining metadata blocks from the cloud storage to the local metadata storage while the backup appliance is in the online state.
Santi Gopal Mondal, Kalyan C. Gunda
Filed: 15 Sep 20
Utility
Method and System for Hybrid Incremental File-based Backups
17 Mar 22
A method and system for hybrid incremental file-based backup that includes receiving a list of desired elements for incremental backup and determining the elements on the list of desired elements that have changed since a previous backup, and storing the elements on the list of desired elements that have changed since the previous backup in a backup container.
Shelesh Chopra, Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal
Filed: 15 Sep 20
Utility
Method and System for Multi-pronged Backup Using Real-time Attributes
17 Mar 22
A method and system for backup processes that includes identifying a target volume and identifying a number of available threads to back up the target volume.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 15 Sep 20
Utility
Method, Electronic Device, and Computer Program Product for Selecting Backup Destination
17 Mar 22
Implementations of the present disclosure provide a method, an electronic device, and a computer program product for selecting a backup destination.
Zhen Jia, Qi Wang, Yun Zhang, Ren Wang, Jing Yu
Filed: 16 Oct 20
Utility
Extending Retention Lock Protection from On-premises to the Cloud
17 Mar 22
Embodiments for retention locking a deduplicated file stored in cloud storage by defining object metadata for each object of the file, and comprising a lock count and a retention time based on an expiry date of the lock, with each object having segments, the object metadata further having a respective expiry date and lock count for each segment, where at least some segments are shared among two or more files.
Jagannathdas Rath, Kalyan C. Gunda
Filed: 16 Sep 20