3707 patents
Page 7 of 186
Utility
Granular Data Replication
23 Mar 23
Embodiments for granular replication of data with high efficiency.
Charles J. Hickey, Murthy V. Mamidi, Neerajkumar Chourasia
Filed: 20 Sep 21
Utility
Memory Optimized Algorithm for Evaluating Deduplication Hashes for Large Data Sets
23 Mar 23
One example method includes performing a hash of data to generate a hash value, checking a binary trie to determine if the hash value has previously been entered into the binary trie, if the hash value has previously been entered in the binary trie, declaring the data as a duplicate of other data, and if the hash value has not been previously entered in the binary trie, updating the binary trie to include the hash value.
Amro Magdi Mahmoud Sayed Khalifa, Angelo Reis
Filed: 16 Sep 21
Utility
Method, Electronic Device, and Program Product for Failure Handling
23 Mar 23
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for failure handling.
Bing Liu, Lingdong Weng, Zheng Li
Filed: 9 Nov 21
Utility
Method, Electronic Device and Computer Program Product for Flushing Metadata
23 Mar 23
Techniques for flushing metadata involve: receiving a flushing request, the flushing request instructing to flush metadata in at least one cache region to a persistent storage device; acquiring a plurality of target indicators, the target indicator at least indicating a type of a cache region and a block in the cache region, where the plurality of target indicators are classified based on types of cache regions indicated by the target indicators among the plurality of target indicators; determining, from the plurality of target indicators, at least one target indicator of the same type as the at least one cache region; and flushing metadata in a block indicated by the at least one target indicator.
Ming Zhang, Chen Gong, Qiaosheng Zhou
Filed: 17 May 22
Utility
Method or Apparatus to Integrate Physical File Verification and Garbage Collection (GC) by Tracking Special Segments
23 Mar 23
Methods and systems for managing data in a distributed system are disclosed.
Rahul Goyal, Tony Wong
Filed: 23 Sep 21
Utility
Application Discovery Using Access Pattern History
23 Mar 23
Application discovery from access patterns is disclosed.
Stephen D. Smaldone, Arieh Don, Owen Martin
Filed: 28 Nov 22
Utility
Remotely Replicating Duplicated Data
16 Mar 23
Data may be replicated from a host storage system to a target storage system.
Benjamin Yoder, William R. Stronge
Filed: 10 Nov 22
Utility
Filesystem Embedded Merkle Trees
16 Mar 23
One example method includes creating a source FS Merkle tree having a structure that matches a topology of a source FS, and a target FS Merkle tree having a structure that matches a topology of a target FS, receiving a change to the source FS, implementing the change in the source FS, updating the source FS Merkle tree to reflect the change, replicating the change to the target FS so that, with respect to the change, the target FS is synchronized with the source FS, updating the target FS Merkle tree to reflect the change to the target FS, and comparing the source FS Merkle tree to the target FS Merkle tree.
Alex Solan, Jehuda Shemer
Filed: 19 Oct 22
Utility
Using Rpo As an Optimization Target for Datadomain Garbage Collection
16 Mar 23
One example method includes ingesting data to a data protection system, separating, by the data protection system, the ingested data into groups according to Recovery Point Objective (RPO) such that each group is associated with a different respective RPO, storing the groups in respective storage pools, and each of the storage pools is associated with a respective one of the RPOs, and performing a respective garbage collection (GC) process at each storage pool.
Anand Rudrabhatla, Jehuda Shemer, Abhinav Duggal
Filed: 16 Sep 21
Utility
System and Method for Building Leased Infrastructure Trust Domains
16 Mar 23
A method for processing trust and security for leased infrastructure includes: detecting a first audit event directed to the leased infrastructure; initiating, in response to detecting the first audit event, an execution of a first trust audit; making a first determination, based on a result of the first trust audit, that the first audit event is a verified event; and transmitting, in response to the first determination and to a computing device of a user leasing the leased infrastructure, first instructions for the computing device to display a first output notifying the user that the leased infrastructure is in a trusted domain.
Srinivas Gowda, Shyam Iyer, Syama Poluri
Filed: 15 Sep 21
Utility
Interactive Query by Example Expert System for Autonomous Data Protection
16 Mar 23
One example method includes scanning a storage device to obtain data and metadata concerning operation of a computing system, analyzing the data and, based on the analyzing, deriving data groups that include some of the data, and deriving data relationships among some of the data, receiving, by an expert system, a query from a user, and the query specifies a sample object for the expert system to investigate, but the query does not indicate purpose of the user in submitting the query, analyzing the query, based on the data groups and data relationships, and based on the analyzing of the query, generating, by the expert system, query results that comprise a set of user-selectable investigation directions that relate to the sample object, and presenting, by the expert system, the set of user-selectable investigation directions to the user.
Anand Rudrabhatla, Jehuda Shemer, Abhinav Duggal
Filed: 16 Sep 21
Utility
Backup and Tiered Policy Coordination In Time Series Databases
9 Mar 23
A data protection system configured to backup a time series database is provided.
Kfir Wolfson, Assaf Natanzon, Jehuda Shemer
Filed: 2 Nov 22
Utility
Generating and Morphing a Collection of Databases That Collectively Has Desired Dedupability, Compression, Clustering and Commonality
9 Mar 23
One example method includes receiving a set of database parameters, creating one or more simulated databases based on the database parameters, receiving a set of target characteristics for the database, based on the target characteristics, slicing a datastream into a grouping of data slices, populating the simulated database(s) with the data slices to create the database collection and forward or reverse morphing the database from one generation to another without rewriting the entire database collection.
Salil Dangi
Filed: 25 Oct 22
Utility
Methods and Systems for Automatically and Securely Joining an Association
9 Mar 23
A method for joining an association that includes receiving, by a first cluster, an association access credential and a unique address of an association manager, generating, based on the association access credential, an association access request, sending, to the unique address, the association access request, receiving, in response to the sending, association information, and initiating, based on the association information, a connection to a second cluster in the association.
Qi Bao, Himabindu Tummala
Filed: 8 Nov 22
Utility
System and Method for Preserving Access Control Lists In Storage Devices
9 Mar 23
A method for preserving data stored in a source device is provided.
Prachi Sharma, Adrian Dobrean, Vibhanshu Rai
Filed: 8 Sep 21
Utility
Techniques for Determining Compression Tiers and Using Collected Compression Hints
2 Mar 23
Tiers of compression algorithms may be determined using compression information collected regarding compression ratios achieved for data sets using compression algorithms.
Owen Martin, Alesia A. Tringale
Filed: 10 Nov 22
Utility
Based on Io Pattern Influence Nfit Table for Persistence for SCM Firmware
2 Mar 23
One example method includes analyzing an IO pattern comprising IOs issued by a client application, based on the analyzing, generating a rule relating to an NFIT, using the rule to modify the NFIT, and after the NFIT is modified, changing a configuration of SCM firmware based on the NFIT.
Parmeshwr Prasad, Bing Liu, Rahul Deo Vishwakarma
Filed: 26 Aug 21
Utility
Leveraging a Cloud-based Object Storage to Efficiently Manage Data from a Failed Backup Operation
2 Mar 23
Described is a system (and method) for leveraging data previously transferred to a cloud-based object storage as part of a failed backup when performing a subsequent backup operation.
Sunil Yadav, Shelesh Chopra, Amarendra Behera
Filed: 31 Aug 21
Utility
Method and System for Automated Dataset Placement for Application Execution
2 Mar 23
Techniques described herein relate to a method for distributed data management.
William Jeffery White, John S. Harwood, Robert Anthony Lincourt, JR.
Filed: 30 Aug 21
Utility
Method and System for Network Opportunity Discovery Based on Subscription and Hardware Visibility
2 Mar 23
One example method includes various processes performed by a vendor system including discovering infrastructure assets of a subscriber system, determining that the vendor system is permitted by the subscriber system to access information about the infrastructure assets of the subscriber system, accessing the information about the infrastructure assets of the subscriber system, assessing an ability of the infrastructure assets of the subscriber system to implement a service offering of the vendor system, and the assessing is based on the information about the infrastructure assets, and implementing the service offering in the infrastructure assets of the subscriber system when (i) given permission to do so by the subscriber system and (ii) the infrastructure assets have been determined to be able to implement the service offering.
Nicole Reineke, Barbara Ballard
Filed: 30 Aug 21