3707 patents
Page 61 of 186
Utility
Application Execution Path Tracing for Inline Performance Analysis
30 Dec 21
Techniques are provided for application tracing for inline performance analysis.
Vladimir Kleiner, Vladimir Shveidel, Anton Kucherov
Filed: 30 Jun 20
Utility
Quantum Compute Estimator and Intelligent Infrastructure
30 Dec 21
One example method includes evaluating code of a quantum circuit, estimating one or more runtime statistics concerning the code, generating a recommendation based on the one or more runtime statistics, and the recommendation identifies one or more resources recommended to be used to execute the quantum circuit, checking availability of the resources for executing the quantum circuit, allocating resources, when available, sufficient to execute the quantum circuit, and using the allocated resources to execute the quantum circuit.
Kenneth Durazzo, Seth Jacob Rothschild, Victor Fong
Filed: 30 Jun 20
Utility
d1rrou2zwrotugyh12vh0twhllxjxd0xai3b3 u252d7z3irejaf8orr
30 Dec 21
Generating and aggregating test result data of a distributed system of devices into a test case result for facilitating access of the test case result via a single iterator is presented herein.
Matthew Bryan, Henry Courtlandt Van Voorhis, II
Filed: 30 Jun 20
Utility
yq92vi453rh835 x7sn97zbm36397ctx5f
30 Dec 21
Described is a system for a verification microservice engine for generating and deploying a controller module and one or more worker nodes to detect corruption in a deduplicated object storage system accessible by one or more microservices while minimizing costly read operations on objects.
Tipper Truong, Joseph Brandt, Philip Shilane
Filed: 26 Jun 20
Utility
49jn6ievyh15 ekmmcp1yme1k9k0rqcrfdv4hu
30 Dec 21
Described is a system for a providing a service (or microservice) for performing deduplication for an object storage.
Kimberly Lu, Philip Shilane, Nicholas Noto
Filed: 29 Jun 20
Utility
qj4jq8r8cc038uah1nnxj3h7p5v0f570r509
30 Dec 21
Described is a system for providing quick and efficient identification of a desired version of content from an editing history of the content.
James Morton, Lihui Su, Gerald Jourdain, Ming Zhang
Filed: 29 Jun 20
Utility
y6b94sfnm0r9n11 l94ltk8n1tfxuy9wvutvrhb2f7t8oe74hhggql2po4
30 Dec 21
An apparatus comprises a processing device configured to determine that an entry of a first data structure comprises an indication that a link between a first logical page and a second logical page is broken and to determine that a first address pointed to by the first logical page and a second address pointed to by the second logical page match.
Dixitkumar Vishnubhai Patel, James O. Owens
Filed: 30 Jun 20
Utility
3aoybsb6bqnvtotobch7elti1ni8ntq4r0bwx
30 Dec 21
Routing data in a data confidence fabric.
Stephen J. Todd
Filed: 24 Jun 20
Utility
5jl7kzbuj2l1z0jbl47cq422c
30 Dec 21
Watermarking of an ordered event stream (OES) is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 29 Jun 20
Utility
m9n21hp09ydjl8ft0oe3itky19b5640gc8qytfmmra57qn
30 Dec 21
One example method includes receiving, from a VM, a request for a software license, in response to the request, transmitting a UUID to the VM, receiving, from the VM, a response that comprises a first encrypted UUID corresponding to the request, and transmitting a client object that includes the first encrypted UUID, and the client object serves as a request for entry of the client object in a database of a cloud computing site.
Parminder Singh Sethi, Durai S. Singh
Filed: 29 Jun 20
Utility
687i7nzgfz1dgh6a0l70qa1cumiiarkjcaxlm25pzm
30 Dec 21
Malware scan task processing in a data storage system is described herein.
Avadut Mungre, Shiv Shankar Kumar
Filed: 25 Jun 20
Utility
5pbhhc9gijr5 0xp1cpx4
30 Dec 21
A personal data platform is disclosed that provides users with control over their personal data.
Amy N. Seibel, Thinh Lam Truong Nguyen, Akshaya Khare, Victor Fong, Kenneth Durazzo
Filed: 30 Jun 20
Utility
v52nmkjqym4110zox6ue5wfozzxdk6vrz
30 Dec 21
Embodiments are described for a method and system of applying data protection software mechanisms to network equipment devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques.
Adam Brenner, Arun Murti, Mark Malamut, Vijay Anand
Filed: 25 Jun 20
Utility
5b2 374e3gmbgww0zyh1ylseh2wt
30 Dec 21
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for processing information.
Jiacheng Ni, Zijia Wang, Min Gong, Pengfei Wu, Zhen Jia
Filed: 3 Aug 20
Utility
mll8fyg7cshm39zy9u046o 79huf
30 Dec 21
The present disclosure relates to a method, an electronic device, and a computer program product for monitoring a field device.
Danqing Sha, Pedro Fernandez Orellana, Zhen Jia, Xuwei Tang
Filed: 21 Jul 20
Utility
xkc4ik46z8alnxrmmypydqelp4ybi ou48ccf8hg5uthknjwusmi
23 Dec 21
An apparatus comprises at least one processing device comprising a processor coupled to a memory; the at least one processing device being configured to: obtain a set of rebuild rate parameters for a given storage device from a storage array comprising a plurality of storage devices; and dynamically regulate a rebuild rate associated with a rebuild process for the given storage device based on the set of rebuild rate parameters obtained from the storage array for the given storage device.
Vamsi K. Vankamamidi, Shuyu Lee, Kurt W. Everson, Pavan Kumar Vutukuri, Andrew P. Kubicki
Filed: 22 Jun 20
Utility
4ecq2zx72dg9jzoci4njxjhfkiyaa2p9
23 Dec 21
An application is provided as a compound virtual appliance having components to be hosted by virtual machines.
James Morton, Ming Zhang, Lihui Su, Min Liu, Yujun Liang, Scott Quesnelle
Filed: 23 Jun 20
Utility
h5yt98fqizj2liekxnzjeaflw2rihn4be
23 Dec 21
Embodiments for predictive scheduling of backups in a data protection system by initiating a first backup job in a series of scheduled consecutive backup jobs, wherein a second backup job is allowed to begin only after the first backup job is finished and not active, detecting whether or not the first backup job is still active when a second job is to start, and if so, estimating an amount of additional time required to finish the first backup job.
Sharath Talkad Srinivasan, Upanshu Singhal, Srikanth Venkataraman
Filed: 23 Jun 20
Utility
01g2cemmte081y0tr1dp2eaaob3d4kst7e5u352ccvkhjs1m65t
23 Dec 21
A data protection application creates backups of assets.
James Morton, Ming Zhang, Lihui Su, Gerald Jourdain
Filed: 23 Jun 20
Utility
18tiyy8zcwqbkpsru6elsuq3nx097w09no
23 Dec 21
Any point in time backups for distributed consistency is disclosed.
Jehuda Shemer, Valerie Lotosh, Saar Cohen, Erez Sharvit
Filed: 23 Jun 20