3707 patents
Page 64 of 186
Utility
Assigning Workloads in a Multi-Node Processing Environment Using Feedback From Each Node
2 Dec 21
Eduardo Vera Sousa, Edward José Pacheco Condori, Tiago Salviano Calmon, VinÃcius Michel Gottin
Filed: 29 May 20
Utility
Compliance Recycling Algorithm for Scheduled Targetless Snapshots
2 Dec 21
Targetless snapshots that are in use are excluded from discard and exempted from inclusion against a snapshot retention count limit.
Nicholas Von Hein, Michael Ferrari, Daryl Kinney, Shakil Anwar, Tao Tao
Filed: 29 May 20
Utility
Finding the Optimum Time to Prestart Container Running Functions Using Events
2 Dec 21
A method includes identifying a first event that has been at least partly performed, wherein the first event comprises an element of a sequence of events, and the first event comprises performance of a first computing function, predicting a second event expected to occur next in the sequence after completion of the first event, and the second event comprises performance of a second computing function, predicting a start time of the second event, based on information about the second event, identifying a particular container capable of implementing the second computing function associated with the second event, predicting a start time for start-up of the container, starting up the container, and completing start-up of the container prior to receipt of a request for the second computing function to be performed by the container, wherein the container is ready to perform the second computing function immediately after start-up has been completed.
Victor Fong, Xuebin He, Prasenjit Roy, Nisanth Mathilakath Padinharepatt
Filed: 29 May 20
Utility
Encapsulated Ficon Communication
2 Dec 21
Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system.
Douglas E. LeCrone, Jeffrey L. Jones
Filed: 28 May 20
Utility
Automated Alert Augmentation for Deployments of Software-defined Storage
2 Dec 21
Methods, apparatus, and processor-readable storage media for automated alert augmentation for deployments of software-defined storage are provided herein.
Sean R. Gallacher, Trevor H. Dawe, Eric Young, Ian D. Bibby
Filed: 29 May 20
Utility
Method, Electronic Device and Computer Program Product for Backup
2 Dec 21
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for backup.
Jinru Yan, Mengze Liao, Min Liu, Xiaoliang Zhu, Zheyi Zhu
Filed: 30 Jun 20
Utility
Efficient Method to Build a Backup Scheduling Plan for a Server
2 Dec 21
One example method includes identifying a group of asset backups to be performed, and each asset backup is associated with a respective asset and has an associated backup time and RPO, selecting an asset backup to run first, and the asset backup that will run first is chosen based on a start deadline of that asset backup relative to respective start deadlines of one or more other asset backups, and the start deadline falls within a time slot, selecting a stream from a group of streams for the selected asset backup, and the selected stream is a stream with a lowest value of first available time slot, and backing up the asset at a backup server by running the selected asset backup, and backup begins at a start time that is a time when the selected stream becomes available, and the asset backup runs on the selected stream.
Tiago Salviano Calmon, Hugo de Oliveira Barbalho, Eduardo Vera Sousa
Filed: 28 May 20
Utility
Data Placement Method Based on Health Scores
2 Dec 21
Embodiments described herein relate to techniques for placing backup data based on health scores.
Parmeshwr Prasad, Bing Liu, Rahul Deo Vishwakarma
Filed: 29 May 20
Utility
System and Method for an Application Container Evaluation Based on Container Events
2 Dec 21
A method for a backup operation in accordance with one or more embodiments of the invention includes obtaining, by a vulnerability analyzer executing on a backup server, a plurality of container event entries, wherein a container event entry of the plurality of container event entries specifies a an application container identifier, a container event identifier, an event severity, and an event type, selecting the container event identifier, identifying a portion of the plurality of container event entries that specify the container event identifier, generating a mean event severity based on the portion of the plurality of container event entries, generating a first vulnerability value associated with the application container identifier, and initiating a backup policy update based on a vulnerability ranking, wherein the vulnerability ranking is based on the first vulnerability value.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20
Utility
System and Method for an Application Container Backup Prioritization Based on Container Information and Resource Availability
2 Dec 21
A method for performing a backup operation includes obtaining, by a backup server, container information associated with a plurality of application containers, generating a container score for each application container in the plurality of application containers based on the container information, identifying a resource availability for a backup agent associated with the plurality of application containers, generating an ordering of the plurality of application containers based on the availability and the container scores, and sending a prioritization list update request to the backup agent based on the ordering.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20
Utility
System and Method for an Application Container Prioritization During a Restoration
2 Dec 21
The method includes obtaining, by a restoration policy manager, a restoration request for a plurality of application containers, and in response to the restoration request: obtaining, by a backup server, container information associated with the plurality of application containers, assigning a restoration type to each application container in the plurality of application containers, updating a restoration type list based on the assigning, and initiating a restoration of the plurality of application containers using the restoration type list.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20
Utility
Method, Electronic Device, and Computer Program Product for Storage Management
2 Dec 21
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for storage management.
Cheng Wang, Bing Liu
Filed: 29 Jun 20
Utility
Sequence Thrashing Avoidance Via Fall Through Estimation
2 Dec 21
One example method includes determining a fall through threshold value for a cache, computing a length ‘s’ of a sequence that is close to LRU eviction, and the length ‘s’ is computed when a current fall through metric value is greater than the fall through threshold value, when the sequence length ‘s’ is greater than a predetermined threshold length ‘k,’ performing a first shift of an LRU position to define a protected queue of the cache, initializing a counter with a value of ‘r’, decrementing the counter each time a requested page is determined to be included in the protected queue, until ‘r’=0, and performing a second shift of the LRU position.
Hugo de Oliveira Barbalho, Jonas F. Dias, Vinicius Michel Gottin
Filed: 29 May 20
Utility
Verifiable Intra-Cluster Migration for a Chunk Storage System
2 Dec 21
Verifiable intra-cluster migration (VICM) for a chunk storage system is disclosed.
Mikhail Danilov, Mikhail Edkov
Filed: 29 May 20
Utility
Generating and Morphing a Collection of Files In a Folder/sub-folder Structure That Collectively Has Desired Dedupability, Compression, Clustering and Commonality
2 Dec 21
One example method includes receiving a set of filesystem parameters, creating a simulated filesystem based on the filesystem parameters, receiving a set of target characteristics for a file collection, based on the target characteristics, slicing a datastream into a grouping of data slices, populating the simulated files with the data slices to create the file collection and forward or reverse morphing the file collection from one generation to another without rewriting the entire file collection.
Salil Dangi, Ernest Daza
Filed: 17 Aug 21
Utility
Method, Electronic Device, and Computer Program Product for Data Indexing
2 Dec 21
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data indexing.
Qiang Chen, Jing Yu, Pengfei Wu
Filed: 30 Jun 20
Utility
Bulk File Verification
2 Dec 21
Systems and methods for verifying files in bulk in a file system.
Abhinav Duggal, Tony Wong
Filed: 17 Aug 21
Utility
Managing Datapath Validation on Per-transaction Basis
2 Dec 21
A technique for managing a datapath of a data storage system includes receiving a request to access target data and creating a transaction that includes multiple datapath elements in a cache, where the datapath elements are used for accessing the target data.
Vamsi K. Vankamamidi, Geng Han, Xinlei Xu, Philippe Armangau, Vikram Prabhakar
Filed: 29 May 20
Utility
DCF Node Configuration for Device Data
2 Dec 21
One example method includes receiving, at a node of a data confidence fabric (DCF), a DCF backbone, installing the DCF backbone at the node, receiving a config file at the node, and the config file includes configuration information concerning the node, and receiving and installing a trust insertion component specified in the configuration information, where operation of the trust insertion component is enabled by the DCF backbone, and the trust insertion component is operable to associate trust metadata with data received by the node.
Stephen J. Todd
Filed: 28 May 20
Utility
Information Uniqueness Assessment Using String-based Collection Frequency
2 Dec 21
Techniques are provided for assessing uniqueness of information using string-based collection frequency techniques.
Shou-Huey Jiang, Wenjin Liu, Chao Su
Filed: 29 May 20