3707 patents
Page 56 of 186
Utility
Method and System for Parallelizing Backup Generation Operations Using Pseudo-asset Backups
10 Feb 22
A method that is performed for backing up data.
Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra, Sunil Yadav
Filed: 7 Aug 20
Utility
Dynamic Shared Journal
10 Feb 22
A system is provided that includes multiple different consistency groups, a respective thin journal included in each of the consistency groups, and each thin journal includes a respective thin VMDK, a thin journal space that is shared by all of the consistency groups, and the journal space includes a plurality of journal blocks, and a datastore that stores blocks allocated to the thin journals, and datastore space is dynamically allocated in journal blocks to each of the respective consistency groups.
Erez Sharvit, Jehuda Shemer, Valerie Lotosh
Filed: 7 Aug 20
Utility
Retention Time Based Consistent Hash Ring
10 Feb 22
A retention-based consistent hash ring process defines each file name in the system to include its expiration date (or time) as a prefix or suffix that is stored and indexed as metadata.
Mengze Liao, Lihui Su, Arun Murti, Roger Hongyi Che, Zhenzhen Lin, Xiaolei Hu
Filed: 6 Aug 20
Utility
Method and System for Virtual Machine Protection
10 Feb 22
A method and system for virtual machine protection.
Sharath Talkad Srinivasan, Rakesh Kumar
Filed: 7 Aug 20
Utility
Method and System for Generating Synthetic Backups Using Pseudo-asset Backups
10 Feb 22
A method that is performed for backing up data.
Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra, Sunil Yadav
Filed: 7 Aug 20
Utility
Systems and Methods for Multiple Recovery Types Using Single Backup Type
10 Feb 22
Embodiments described herein relate to a technique for performing an enhanced backup and restore for a computing device.
Shelesh Chopra, Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal
Filed: 7 Aug 20
Utility
Method, Electronic Device and Computer Program Product for Storage Management
10 Feb 22
Embodiments of the present disclosure relate to a method for storage management, an electronic device, and a computer program product.
Ming Zhang, Ruyao Zhang, Yuhong Nie, Wei Lin, Pengfei Wu
Filed: 30 Sep 20
Utility
Method, Device, and Program Product for Managing Computing Resource In Storage System
10 Feb 22
The present disclosure relates to a method, a device, and a program product for managing a computing resource in a storage system.
Bing Liu, Lingdong Weng
Filed: 5 Oct 20
Utility
Generating Hexadecimal Trees to Compare File Sets
10 Feb 22
First and second trees having leaves identified by hexadecimal values are generated.
Yossef Saad, Itay Glick
Filed: 4 Aug 20
Utility
Method, Device, and Computer Program Product for Metadata Comparison
10 Feb 22
A method, a device, and a computer program product for metadata comparison are provided in embodiments of the present disclosure.
Lanjun Liao, Qin LIU
Filed: 5 Oct 20
Utility
Maintenance Management on Backup Storage Systems
10 Feb 22
Maintenance management on backup storage systems.
Gururaj Kulkarni, Priyank Tiwari, Michal Jacek Drozd
Filed: 7 Aug 20
Utility
Data Protection Method, Electronic Device and Computer Program Product
10 Feb 22
Embodiments of the present disclosure provide a data protection method, an electronic device, and a computer program product.
Qiang Chen, Jing Yu, Jiayang Xu, Danqing Sha
Filed: 30 Sep 20
Utility
Dynamically Selecting Optimal Instance Type for Disaster Recovery In the Cloud
10 Feb 22
The selection of an optimal restore instance type based on a customer's speed/cost tradeoff resolution is disclosed.
Jehuda Shemer, Boris Shpilyuck
Filed: 5 Aug 20
Utility
Intelligent Cache Warm-up on Data Protection Systems
10 Feb 22
System identifies multiple data blocks in workload stored in slow access persistent storage, data blocks copied to fast access persistent storage, and, after speed of accessing workload satisfies threshold, copied data blocks that remained in fast access persistent storage.
Shuai Hua, Yong Zou, Wenhao Hu, Rahul Ugale
Filed: 7 Aug 20
Utility
Method, Device, and Computer Program Product for Managing Data Transfer
10 Feb 22
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing data transfer.
Shuguang GONG, Long WANG, Tao CHEN, Bing LIU
Filed: 7 Oct 20
Utility
Optimizing Docker Image Encrpytion - Tradeoff Between Performace and Protection Level
10 Feb 22
One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 7 Aug 20
Utility
Mechanism for Multi-factor Authentication Based on Data
10 Feb 22
A request is received from a client seeking to access files stored at a backup server.
Yossef Saad, Itay Glick
Filed: 4 Aug 20
Utility
Method, Device, and Computer Program Product for Abnormality Detection
10 Feb 22
The present disclosure relates to a method, a device, and a computer program product for abnormality detection.
Fei Peng, Kaikai Jia
Filed: 9 Oct 20
Utility
Method and System for Efficient Allocation of Storage
3 Feb 22
A method is used for efficient storage allocation in a storage system.
Ashok Tamilarasan, Vamsi Vankamamidi, Philippe Armangau
Filed: 31 Jul 20
Utility
Method and System for a Security Assessment of Physical Assets Using Physical Asset State Information
3 Feb 22
A method for managing physical assets includes obtaining a physical asset security assessment request for a set of physical assets, and, in response to the physical asset security assessment request: sending a physical asset initiation request to an administrative client, obtaining a physical asset response from the administrative client, wherein the physical asset response comprises physical asset state information, allocating a security assessment device from a security assessment pool based on the physical asset state information, sending a security assessment process request to the security assessment device, wherein the security assessment process request comprises a security assessment process, the physical asset state information and physical asset information obtained from a physical asset information repository, obtaining a security assessment report from the security assessment device, and after obtaining the security assessment report, sending the security assessment report to the administrative client.
Ruchika Mehresh, Xuan Tang
Filed: 31 Jul 20