3707 patents
Page 67 of 186
Utility
Data Masking In a Microservice Architecture
25 Nov 21
A method includes receiving an object from a client as part of a data ingestion process, by a masker worker, generating a list that identifies one or more byte ranges, of the object, to be masked, providing the list to an object access microservice, by the object access microservice, creating an object recipe of the object, and the object recipe includes one or more slices, and each of the slices includes one or more segments of data, masking only those segments of a slice that are in a byte range identified in the list, creating a masked slice that comprises the masked segments, and creating a masked object recipe that contains a reference to the masked slice, and the masking is performed before the object is stored in storage, creating a masked object that includes the masked slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 20 May 20
Utility
Data Masking In a Microservice Architecture
25 Nov 21
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 20 May 20
Utility
vmenou74bmcvl1ue4nlqwl5xtk6lj32hfqt
25 Nov 21
Embodiments described herein relate to a method for probabilistically forecasting the state of hardware components.
Rahul Deo Vishwakarma, Jitendra Singh
Filed: 7 Jul 20
Utility
i1jv9ek9dv910eodnxq5bty 1r26lt021d8jai48nvf8
18 Nov 21
Methods, apparatus, and processor-readable storage media for automated storage capacity provisioning using machine learning techniques are provided herein.
Shashidhar R. Kulkarni, Karthik Mani
Filed: 18 May 20
Utility
abp8hyvd7a ttup8hgg91m3w4lykow3o4ulsuuzn1ak
18 Nov 21
An apparatus comprises a host device configured to communicate over a network with source and target storage systems.
Vinay G. Rao, Gabriel Benhanokh, Arieh Don
Filed: 14 May 20
Utility
48a2rwsrwovr1baq6o05l uccg6i4gf00xpj4kwetpoazy7tjv
18 Nov 21
Technology for proactively allocating data storage resources to a storage object.
Nickolay Alexandrovich Dalmatov, Kirill Alexsandrovich Bezugly
Filed: 26 Apr 18
Utility
ggvj27eljqwzioh43otfp mvfzmyflaf5neqz
18 Nov 21
An intelligent method of handling incremental backups concurrent with load balancing movement.
George Mathew, Xiaohong Wang, Abhishek Rajimwale
Filed: 15 May 20
Utility
mvy41i1v1aduih05idoxsnqnx9vk1580l8a307xj1noas9lq5ejoyvmitp
18 Nov 21
A method of testing a data storage system includes maintaining libraries of test routines, a first library including a set of normal-functional tests each operable to test corresponding normal functionality of the data storage system, a second library including a set of fault inserters each being independently operable to induce a corresponding fault condition into the data storage system.
Charles R. Wilson, JR.
Filed: 14 May 20
Utility
sh5v4aji7fxnjf0w9e2olaq5h1w7np7 pnb4p1x18pz79s15ioj83
18 Nov 21
A storage system in one embodiment comprises storage nodes, an address space, address mapping sub-journals and write cache data sub-journals.
Vladimir Shveidel, Lior Kamran
Filed: 12 May 20
Utility
ftnmn bxkaedby807n4rmhbmhc0onhu8wye3v38c4qx
18 Nov 21
Techniques are provided for auditing individual object operations as multiple file system operations.
Dipankar Roy
Filed: 15 May 20
Utility
g7fjdepl5g2qx1113k9ggb9z
18 Nov 21
An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor coupled to a memory.
Asaf PORATH, Itay KELLER, Yonatan SHTARKMAN, Michal YARIMI
Filed: 29 Mar 19
Utility
g6kmtxicjeczi0fv7qxa5btqm1
18 Nov 21
Methods, apparatus, and processor-readable storage media for linking individual biometric data to protected resources accessed via user devices are provided herein.
Nagendra Gudibande Srikanta Sharma, Udayendranaidu Gottapu, Pedda Reddy Kathriki
Filed: 18 May 20
Utility
b68ct5r2af6dls5r m2jtcn4huvdn8wg6b2kilaaxveqipw4x2u67i6pgjpf
18 Nov 21
Described is a system that efficiently detects ransomware attacks within a storage environment.
Yossef Saad, Itay Glick
Filed: 18 May 20
Utility
3yr86iaycsn95w2opyot5c7nnsxjglw7lr7se51lm1ec4e2qg0fhuxc
11 Nov 21
A scheduler for a storage node uses multi-dimensional weighted resource cost matrices to schedule processing of IOs.
Ramesh Doddaiah
Filed: 20 Jul 21
Utility
2j4sjqlqvdhl0xdu65bzohm1cfifujjpsn3a1
11 Nov 21
A host device is configured to communicate over a network with a storage system.
Joseph G. Kanjirathinkal, Peniel Charles, Shamin P. Mohanan
Filed: 6 May 20
Utility
4egq49p5x2y 1gtqvb5vuzga96nz
11 Nov 21
The present disclosure relates to a method, a device, and a computer program for migrating a backup system.
Yuting Zhang, Kaikai Jia
Filed: 30 Jun 20
Utility
boeyoxg6uzbxw55wysw4331i279uakc8yenapc5e6tiauakm09xegb1as
11 Nov 21
A method comprises: in response to receiving a file identification of a first file in an application to be installed in a computing device, sending the file identification to a file server, wherein the first file belongs to a first file group of the application, and the first file group is a part of a file set of the application.
Zhenzhen Lin, Anzhou Hou, Pengfei Wu
Filed: 27 May 20
Utility
bhcyr0im huq1smu5diuss472n516tvs29ct4riypi1o1hue
11 Nov 21
One example method includes receiving input concerning a boot order sequence, where the input includes VM metadata, entering a training phase which includes generating a boot sequence rule based on the input, using the boot sequence rule to generate a proposed boot sequence, performing the proposed boot sequence, and gathering information concerning performance of the proposed boot sequence.
David Zlotnick, Assaf Natanzon, Boris Shpilyuck
Filed: 21 Jul 21
Utility
3s330g 71yx3j5rf2lgynux68wk3eikt51iz4uwi13f6ztx
11 Nov 21
One example method includes receiving input concerning a boot order sequence, where the input includes VM metadata, entering a training phase which includes generating a boot sequence rule based on the input, using the boot sequence rule to generate a proposed boot sequence, performing the proposed boot sequence, and gathering information concerning performance of the proposed boot sequence.
David Zlotnick, Assaf Natanzon, Boris Shpilyuck
Filed: 21 Jul 21
Utility
d4b6ec3ey3c4vwwozliz2r9 n34pfo8i5jhjjr00fj03easmnu59n
11 Nov 21
A method includes receiving data collected from a plurality of managed devices in a plurality of data collections.
Parminder Singh Sethi, Durai S. Singh, Lakshmi Saroja Nalam
Filed: 6 May 20