3707 patents
Page 63 of 186
Utility
Intelligently Distributing Retrieval of Recovery Data Amongst Peer-based and Cloud-based Storage Sources
9 Dec 21
Described is a system for intelligently distributing the retrieval of recovery data amongst peer-based and cloud-based storage sources.
Yossef Saad, Alex Solan
Filed: 3 Jun 20
Utility
Remotely Replicating Duplicated Data
2 Dec 21
Data may be replicated from a host storage system to a target storage system.
Benjamin Yoder, William R. Stronge
Filed: 28 May 20
Utility
Caching and Data Promotion Techniques
2 Dec 21
Techniques for performing data movements may include tracking sets of I/O statistics for a extents, wherein each of the sets of I/O statistics characterizes I/O operations directed to a corresponding one of the extents having data stored on a first storage tier of first non-volatile storage devices; determining, in accordance with the sets of I/O statistics, a list that includes one or more of the extents qualified for promotion from the first storage tier to a second storage tier, wherein the second storage tier includes second non-volatile storage devices have a higher performance ranking that the first non-volatile storage devices of the first storage tier; selecting, from the list, a first extent to be promoted from the first storage tier to the second storage tier; and performing first processing that promotes only cached data of the first extent from the first storage tier to the second storage tier.
Owen Martin, Vladimir Desyatov, Mark D. Moreau, Dustin H. Zentz, Anoop Raghunathan, Sean B. Reilly
Filed: 26 May 20
Utility
Data Migration In Heterogeneous Storage Environment
2 Dec 21
Transferring data for a virtual machine from a source storage device to a destination storage device includes determining if either the source storage device or the destination storage device is capable of unilaterally transferring data to a storage device having only input and output capabilities.
Amit Pundalik Anchi, Srinivas Kangyampeta, Santoshkumar Konnur
Filed: 13 Jul 20
Utility
Techniques for Selection of a Data Reduction Technique When Performing Data Replication
2 Dec 21
Techniques for processing data may include: receiving a write operation that writes first data to a first storage device of a first data storage system that is configured for replication on a second storage device of a second data storage system; and replicating the first data on the second storage device on the second data storage system.
Venkata L. R. Ippatapu
Filed: 28 May 20
Utility
Targetless Snapshot System Replication Data Pointer Table
2 Dec 21
Storage objects and targetless snaps of the storage objects are represented using a system replication data pointer table (SRT), direct index lookup (DIL) tables, and virtual replication data pointer tables (VRTs).
Michael Ferrari, Jeffrey Wilson, Sandeep Chandrashekhara
Filed: 28 May 20
Utility
Front-end Offload of Storage System Processing
2 Dec 21
A storage system in one embodiment comprises a front-end device and a plurality of storage nodes.
Lior Kamran, Amitai Alkalay
Filed: 27 May 20
Utility
Snapshot Metadata Management
2 Dec 21
A snapshot lookup table (SLT) and snapshot pointer structure(s) (SPSs) may be provided for a logical data unit (LSU), each SPS entry corresponding to an LSU data portion and a physical storage location at which data is stored for the data portion for a particular snapshot.
Jeffrey Wilson, Michael Ferrari, Mark J. Halstead, Sandeep Chandrashekara
Filed: 28 May 20
Utility
Cover Interlock Mechanism
2 Dec 21
A cover interlock mechanism for drawer in a rack enclosure includes a first protrusion and a second protrusion coupled to opposing sides of the drawer, the protrusions being urged outward from the drawer, at least one structural component of the rack enclosure that engages the protrusions to prevent the drawer from being inserted into the rack enclosure, and a cover for the drawer having cavities that align with the protrusions when the cover is placed on the drawer to urge the protrusions toward the drawer to allow the drawer to be inserted into the rack enclosure.
Jeffrey Michael Lewis, Joseph L. Brigham, Jr.
Filed: 28 May 20
Utility
Targetless Snapshot Virtual Replication Data Pointer Table
2 Dec 21
A first direct index lookup table represents the current state of a storage object using entries with references corresponding to tracks of the storage object.
Jeffrey Wilson, Michael Ferrari, Sandeep Chandrashekhara
Filed: 28 May 20
Utility
Generating Data Replication Configurations Using Artificial Intelligence Techniques
2 Dec 21
Methods, apparatus, and processor-readable storage media for generating data replication configurations using AI techniques are provided herein.
Kasnadi Sitaram Nandan, Mohit Kolluri, Vinod Kumar, Sujay Prasheel Sundaram, Sarat Manchiraju, Bijan Kumar Mohanty, Hung T. Dinh, Subrato Nath, Naveen Silvester
Filed: 27 May 20
Utility
Identifying Point-in-time Asynchronous Application Data
2 Dec 21
Maintaining a timestamp indicating when data transferred to a remote storage system was written by a host at a local storage system includes writing a timestamp file at the local storage system, the timestamp file being part of a first chunk of data corresponding to current writes to the local storage system by the host, providing a second chunk at the local storage system, the second chunk being different from the first chunk and corresponding to writes by the host that were begun prior to beginning any of the writes for the first chunk, and transferring the writes for the second chunk to the remote storage system.
Brett A. Quinn, Douglas E. LeCrone
Filed: 27 May 20
Utility
Input / Output Load Balancing In a Data Storage System
2 Dec 21
The described technology is generally directed towards an input/output (I/O) load balancer of a data storage system that detects an I/O overloaded (“hot”) storage unit and logically moves its hot data to a non-overloaded (“cold”) storage unit.
Mikhail Danilov, Konstantin Buinov
Filed: 29 May 20
Utility
Techniques for Resource Allocation
2 Dec 21
Techniques for allocating resources in a system may include: monitoring, using a first proportional-integral-derivative (PID) controller, a size of a pool of free shared resources of a first type; responsive to determining the size of the pool of the free shared resources is at least a minimum threshold, providing the size of the pool of free shared resources as an input to a second PID controller; monitoring, using the second PID controller, a total amount of resources of the first type that are available; determining, using the second PID controller and in accordance with one or more resource policies for one or more applications, a deallocation rate or amount; deallocating, using the second PID controller and in accordance with the deallocation rate or amount, resources of the first type; and allocating a least a first of the deallocated resources for use by one of the applications.
Jonathan I. Krasner, Chakib Ouarraoui
Filed: 29 May 20
Utility
Resource Use Method, Electronic Device, and Computer Program Product
2 Dec 21
A resource use method, an electronic device, and a computer program product are provided in embodiments of the present disclosure.
Jet CHEN, Bing LIU
Filed: 30 Jun 20
Utility
Snapshot Metadata Deduplication
2 Dec 21
Snapshots may be managed on a data storage system including logical storage unit including data portions.
Kevin M. Tobin, Andrew L. Chanler, Michael Ferrari, Jeffrey Wilson
Filed: 28 May 20
Utility
System and Method for an Application Container Backup Prioritization Based on Container Information and Resource Availability
2 Dec 21
A method for performing a backup operation includes obtaining, by a backup server, container information associated with a plurality of application containers, generating a container score for each application container in the plurality of application containers based on the container information, identifying a resource availability for a backup agent associated with the plurality of application containers, generating an ordering of the plurality of application containers based on the availability and the container scores, and sending a prioritization list update request to the backup agent based on the ordering.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20
Utility
Compliance Recycling Algorithm for Scheduled Targetless Snapshots
2 Dec 21
Targetless snapshots that are in use are excluded from discard and exempted from inclusion against a snapshot retention count limit.
Nicholas Von Hein, Michael Ferrari, Daryl Kinney, Shakil Anwar, Tao Tao
Filed: 29 May 20
Utility
Verifiable Intra-Cluster Migration for a Chunk Storage System
2 Dec 21
Verifiable intra-cluster migration (VICM) for a chunk storage system is disclosed.
Mikhail Danilov, Mikhail Edkov
Filed: 29 May 20
Utility
Grouping of Multiple Concurrent Schedules of Point-in-time Snapshots for Consistently Defined Data Image Protection
2 Dec 21
Targetless snapshot schedules are defined by policy objects that include a snap creation interval, maximum snap count, and schedule ID.
Nicholas Von Hein, Michael Ferrari, Daryl Kinney, Shakil Anwar, Tao Tao
Filed: 29 May 20