3707 patents
Page 60 of 186
Utility
Preparation of Vehicle Bulk Data for High Speed Terahertz Offloading
30 Dec 21
One example method includes collecting data concerning operation of a vehicle, and the collecting is performed by one or more sensors of the vehicle, storing the data in the data storage locally at the vehicle, automatically caching the stored data in the cache memory locally at the vehicle, and uploading the cached data to a node over a THz wireless link.
Seán Ahearne, Liam Murphy
Filed: 29 Jun 20
Utility
Securely Authorizing Service Level Access to a Backup System Using a Specialized Access Key
30 Dec 21
Described is a system (and method) for securely authorizing service level access to a backup system using an access key.
Senthil Ponnuswamy, Satish Inampudi
Filed: 24 Jun 20
Utility
07zpw4apt4qim8 chzf6mewcu
30 Dec 21
Methods, apparatus, and processor-readable storage media for detecting security threats in storage systems using AI techniques are provided herein.
Deepak Gowda, Bina K. Thakkar, Wenjin Liu
Filed: 29 Jun 20
Utility
f2lpnnbx4jbtcs2p 1nj6tgjsq1cv4nqlkcbygr1fm8ik0no1k5
30 Dec 21
One example method includes detecting a threat in a data confidence fabric, assigning a data confidence score to data implicated by the threat, generating trust insertion metadata concerning the threat, creating a ledger entry based on the data confidence score and the trust insertion metadata, and using the ledger entry to determine an overall data confidence score for the data confidence fabric.
Stephen J. Todd, Riaz Zolfonoon
Filed: 30 Jun 20
Utility
jr4fksz3n8hlhysnc11cu0 shdmqclqtgbc
30 Dec 21
One example method includes intercepting an IO that is directed to a volume, writing the IO to a grid-CG that is one of a plurality of grid-CGs that collectively form a distributed CG, adding the IO to a stream journal associated with the grid-CG, receiving a bookmark request, in response to the bookmark request, inserting a bookmark in the stream journal, incrementing a splitter counter and broadcasting a splitter counter value to the grid-CGs in the distributed CG, and inserting the bookmark in respective stream journals of the grid-CGs in the distributed CG.
Erez Sharvit, Jehuda Shemer, Valerie Lotosh, Saar Cohen
Filed: 24 Jun 20
Utility
9rgg41v5o70uww2bkz0m5vls1xxr0k2xtsj5sxg qby844q
30 Dec 21
A method and system of providing estimates or recommendations for software lifecycle management tasks by obtaining and storing local timing and result data for a current run of an application task on a local client, and gathering global timing and result data in a server computer for a plurality of clients including the local client.
Arun Murti, Adam Brenner, Mark Malamut, Vijay Anand
Filed: 24 Jun 20
Utility
585ttm mvuihhgyebgq4div
30 Dec 21
Archival task processing in a data storage system is described herein.
Shiv Shankar Kumar, Avadut Mungre
Filed: 25 Jun 20
Utility
397g8wjhhywgnpczv8eb24mwfv0o3dpw62140gg6fwpfxfxj73406gu
30 Dec 21
Incremental replication between foreign system dataset stores is described herein.
Evgeny Popovich, Michael Frank, Austin Voecks, Oliver Chung, Jonathan Walton
Filed: 29 Jun 20
Utility
v2kskw4o0uv29eyzdbk02vx 23ef8h
30 Dec 21
Systems and methods facilitating separation of dataset creation from movement in file replication are described herein.
Austin Voecks, Michael Frank, Evgeny Popovich
Filed: 30 Jun 20
Utility
pmbkam 20yw65gh4q6exn6crbl1a7
30 Dec 21
To manage a storage system, data objects are divided to groups according to keyword ranges of the data objects in the storage system.
Alex Pengbo Zhang, You Chen
Filed: 27 Aug 20
Utility
ra248kecqw0sbca7kbfjwf8cxntrwyen7r9do9e em5tgu653ee
30 Dec 21
Illustrative embodiments include a method, a device, and a computer program product for managing an image of a container.
Si Chen, Pengfei Wu, Zhenzhen Lin, Ruixue Zhang
Filed: 3 Aug 20
Utility
teivrtbdwskbhrqx 8q5ww9qd1cgej
30 Dec 21
Mapping applications or smart contracts to a data confidence fabric.
Stephen J. Todd, Gaurav Chawla
Filed: 24 Jun 20
Utility
olyvxnhhhnva28qj2wpk6b4ah62d3m5wxw82wymnjg107siqq0xy
30 Dec 21
Embodiments of the present disclosure relate to a method, a device, and a storage medium for deploying a machine learning model.
Jin Li, Jinpeng Liu, Zhen Jia, Qiang Chen
Filed: 23 Jul 20
Utility
n53h2opijp2phe uracichw6j8cj011fs2au0vdyq
30 Dec 21
One example method includes processing a file of a VM to create a decreased quality file that is a version of the file, storing the decreased quality file at a recovery site along with metadata indicating a file type and path name for the decreased quality file, in response to a disaster recovery request, creating a partial user VM at the recovery site, and the partial user VM includes the decreased quality file, and with the partial user VM, serving the decreased quality file to a user in response to a request from the user.
Boris Shpilyuck, Saar Cohen, Yossi Matatov
Filed: 24 Jun 20
Utility
oyqgw1z7l70qpcizx0bry70p4qqjdka991gfreqbr
30 Dec 21
At least one processing device comprises a processor and a memory coupled to the processor.
Vladimir Shveidel, Lior Kamran
Filed: 29 Jun 20
Utility
424dnf4scu6yeo33q8do6burf9c26xmhm9dyg7oioa7
30 Dec 21
A method for managing computing resources includes obtaining, by a resource use manager, a physical asset request from a client, in response to the physical asset request: initiating allocation of a landing area device to the client based on the physical asset request, determining a physical asset to be provided to the client, sending, to a manufacturer, a physical asset preparation request, obtaining a confirmation of deployment of the physical asset from the client, performing a restoration on the physical asset using a most recent landing area incremental backup, and after the initiating the restoration, initiating a transfer of operation from the landing area device to the physical asset.
Nicole Reineke, Hanna Yehuda, Robert Anthony Lincourt, JR.
Filed: 26 Jun 20
Utility
rkocvnnsoxgkukh05xqgm69dpumx3x3amqxlgsyczh
30 Dec 21
Embodiments are described for a method and system of applying data protection software mechanisms to network devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques.
Adam Brenner, Mark Malamut, Arun Murti
Filed: 16 Nov 20
Utility
tabn5tz85h 1x61fplqskibvlvs1
30 Dec 21
On-the-fly point-in-time recovery operations are disclosed.
Jehuda Shemer, Kfir Wolfson, Tomer Kushnir, Jawad Said
Filed: 24 Jun 20
Utility
5xvbinvo0ti9dtz752am2i73azdks
30 Dec 21
One example method includes performing, as part a planned failover procedure, operations that include connecting a replica OS disk to a replica VM, powering up the replica VM, booting an OS of the replica VM, disconnecting a source VM from a network, and connecting replica data disks to the replica VM.
Jawad Said, Kfir Wolfson, Jehuda Shemer
Filed: 24 Jun 20
Utility
rsvpf1qg61xl7kxj 9qz2yhksqsf47ys12pl
30 Dec 21
Methods, apparatus, and processor-readable storage media for artificial intelligence-based redundancy management are provided herein.
Parminder Singh Sethi, Bijan K. Mohanty, Hung T. Dinh
Filed: 24 Jun 20