3707 patents
Page 55 of 186
Utility
Parallel Handling of a Tree Data Structure for Multiple System Processes
3 Mar 22
The technology describes scanning tree data structures (trees) for multiple processes, at least partly in parallel.
Mikhail Danilov, Konstantin Buinov
Filed: 1 Sep 20
Utility
Anomaly-based Retention Policies for Snapshot-based Data Protection Systems
3 Mar 22
One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
Filed: 10 Nov 21
Utility
Anomaly-based Retention Policies for Snapshot-based Data Protection Systems
3 Mar 22
One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
Filed: 10 Nov 21
Utility
Dynamic Cloud Native Cluster Construction Using Under-utilized Machines
24 Feb 22
One example method includes connecting to a server component, transmitting, to the server component, information concerning a hardware configuration associated with an asset having a capability that is fully utilized during a first time period and the capability is idle during a second time period, receiving, from the server component, cluster connection information, and using the cluster connection information to temporarily connect the asset to the cluster as a node of the cluster so that the capability is available during idle time to perform a workload of the cluster.
Victor Fong, Xuebin He, Megan Murawski
Filed: 8 Nov 21
Utility
Data at Rest Encryption (Dare) Using Credential Vault
24 Feb 22
A subset of data encryption keys are stored in plain text form in system memory of an information handling system.
Senthil Ponnuswamy, Elie Jreij, Marcelo Vinante, Anurag Sharma
Filed: 20 Aug 20
Utility
Systems and Methods for Synthesizing Fully Hydrated Cloud Snapshots
24 Feb 22
Systems and methods for synthesizing cloud snapshots of production data.
Sunil Kumar
Filed: 2 Nov 21
Utility
Using Business Continuity and Disaster Recovery for Any Point In Time Backup
24 Feb 22
Generating any point in time backups without native snapshot generation.
Jehuda Shemer, Valerie Lotosh, Saar Cohen, Erez Sharvit
Filed: 2 Nov 21
Utility
Method to Optimize Restore Based on Data Protection Workload Prediction
17 Feb 22
An intelligent method of selecting a data recovery site upon receiving a data recovery request.
Bing LIU, George MATHEW
Filed: 13 Aug 20
Utility
System and Method for Resolving Error Messages In an Error Message Repository
17 Feb 22
A method for managing error messages includes obtaining, by a message resolution manager, a plurality of error messages, performing an error message consecutive deduplication on the plurality of error messages to obtain a plurality of deduplicated error messages, generating a plurality of message sequences using the plurality deduplicated error messages, applying a message sequence frequency algorithm to the plurality of message sequences to obtain a high severity message sequence list, and initiating an error message resolution on at least one message sequence specified in the high severity message sequence list.
Ramakanth Kanagovi, Ankur Gupta, Aurosikha
Filed: 14 Aug 20
Utility
System and Method for Approximating Replication Completion Time
17 Feb 22
One embodiment provides a computer implemented method of estimating replication completion time.
RAHUL VISHWAKARMA, LU CHEN, JITENDRA SINGH, BING LIU
Filed: 14 Aug 20
Utility
Authentication Using Pairwise Secrets Constructed from Partial Secrets
17 Feb 22
Techniques are provided for authentication using pairwise secrets constructed from partial secrets.
Shoham Levy, Yoav Nir
Filed: 17 Aug 20
Utility
Communication Issue Detection Using Evaluation of Multiple Machine Learning Models
17 Feb 22
Techniques are provided for evaluating multiple machine learning models to identify issues with a communication.
Idan Richman Goshen, Shiri Gaber
Filed: 17 Aug 20
Utility
Optimize Recovery Time Objective and Costs of Cloud Based Recovery
10 Feb 22
Disaster recovery operations are disclosed.
Jawad Said, Saar Cohen
Filed: 5 Aug 20
Utility
Method and System for Generating Synthetic Backups Using Block Based Backups
10 Feb 22
A method that is performed for backing up data.
Ravi Kishore Yadav Rangapuram, Manjunath Jagannatha, Kiran Kumar Madiraju Varadaraju
Filed: 7 Aug 20
Utility
Optimized Selection of Subset of Storage Devices for Data Backup
10 Feb 22
Embodiments of the present disclosure provide a storage management method, an electronic device, and a computer program product.
Qi Wang, Zhen Jia, Yun Zhang, Ren Wang, Jing Yu
Filed: 30 Sep 20
Utility
State Semantics Kexec Based Firmware Update
10 Feb 22
A kexec-based system update process wherein user-specific data is transferred on reboot of the second kernel.
Parmeshwr PRASAD, Rahul VISHWAKARMA, Bing LIU
Filed: 7 Aug 20
Utility
Method for Data Item Recommendation, Electronic Device and Storage Medium
10 Feb 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer storage medium for data item recommendation, and relate to the field of information processing.
Bing Liu, Ming Zhang, Min Liu, Yun Zhang
Filed: 30 Sep 20
Utility
Dynamically Selecting Optimal Instance Type for Disaster Recovery In the Cloud
10 Feb 22
The selection of an optimal restore instance type based on a customer's speed/cost tradeoff resolution is disclosed.
Jehuda Shemer, Boris Shpilyuck, Igor Dubrovsky
Filed: 2 Jun 21
Utility
System and Method for a Backup Data Verification for a File System Based Backup
10 Feb 22
A method for verifying data includes obtaining, by a backup agent, a backup verification trigger for a backup stored in a backup storage system, in response to the backup verification trigger, obtaining backup metadata associated with the backup, performing a hierarchical structure data mapping based on the backup metadata to obtain a hierarchical structure associated with the backup, performing, using the hierarchical structure, a backup verification to generate a backup health state of the backup, after the backup verification is generated: making a determination, based on the backup verification, that the backup health state is not in a healthy state, and in response to the determination, performing a remediation of the backup policies.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 7 Aug 20
Utility
Method and System for Generating Backups Using Pseudo-asset Backups
10 Feb 22
A method that is performed for backing up data.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 7 Aug 20