3707 patents
Page 74 of 186
Utility
Dual Relationship-Based Hash Structure for Non-Volatile Memory Technology
30 Sep 21
Methods, apparatus, and processor-readable storage media for implementing dual relationship-based hash structures for non-volatile memory technology are provided herein.
Gopal Singh, Pooja Singh, Rahul D. Vishwakarma, Shelesh Chopra
Filed: 26 Mar 20
Utility
Filesystem Embedded Merkle Trees
30 Sep 21
One example method includes creating a source FS Merkle tree having a structure that matches a topology of a source FS, and a target FS Merkle tree having a structure that matches a topology of a target FS, receiving a change to the source FS, implementing the change in the source FS, updating the source FS Merkle tree to reflect the change, replicating the change to the target FS so that, with respect to the change, the target FS is synchronized with the source FS, updating the target FS Merkle tree to reflect the change to the target FS, and comparing the source FS Merkle tree to the target FS Merkle tree.
Alex Solan, Jehuda Shemer
Filed: 26 Mar 20
Utility
gc2uorjugekn94t13gcyj5h0waw6g7p46z2763a1 t9y
30 Sep 21
The present disclosure relates to a method, a device, and a computer program product for managing indexes in a storage system.
Jie Liu, Haitao Li, Jian Wen, Chao Lin
Filed: 30 Jun 20
Utility
9vj9ku6148b2hiom eupdfm6opw1dfghqqie1vr2k3kgiue9dpxrqatmrj
30 Sep 21
One example method includes transcribing a portion of the audio component to create a transcription file that includes text, searching the text of the transcription file and identifying information in the text that may include personal information, defining a textual window that includes the information, evaluating the text in the textual window to identify personal information, and masking the personal information in the audio component of the recording.
Idan Richman Goshen, Avitan Gefen
Filed: 27 Mar 20
Utility
way3a2 u4my48u23odnpogstkc
30 Sep 21
Methods, apparatus, and processor-readable storage media for estimating replication completion time using machine learning techniques are provided herein.
Jitendra Singh, Rahul D. Vishwakarma, Shelesh Chopra
Filed: 26 Mar 20
Utility
41ktdkmdwr90v2carrme0es5nvw bf5qdiax27y7xexg2ieijj43l00lxbq
30 Sep 21
Requests from file system services of a storage system are registered.
Shashikanth Lakshmikantha, Sankalp Suhas Taralekar, Tuan Nguyen, Venkata Narasa Kumar Kuchi, Koushik Nagaraj Godbole
Filed: 25 Mar 20
Utility
gwiodpf6jiv0q03xez3qsg
30 Sep 21
Methods, apparatus, and processor-readable storage media for implementing a message management framework using machine learning techniques are provided herein.
Sivaraman Damodaran, Mahesh Reddy Nagaiah Reddy, Vijayasri Chikmagalur Shivakumar, Narendra Buwade, Bijan K. Mohanty, Hung T. Dinh, Navin Kumar Neithalath, Girish VenkateshaMurthy, Rohit Das, Sristirupa Tripathy
Filed: 27 Mar 20
Utility
rph ztegje77naukv7b33e2vz3lin1evv
30 Sep 21
Aspects of annotating data are disclosed.
Stephen J. Todd, Aurelian Dumitru, Jason A. Shepherd
Filed: 31 Mar 20
Utility
egibtfcoi0ajy ery6de1wlygt
30 Sep 21
Recommending applications is disclosed.
Idan Richman Goshen, Avitan Gefen, Amihai Savir, Shiri Gaber
Filed: 30 Mar 20
Utility
cotodxn6 yegywqbui5nctdt9y
23 Sep 21
An available network address is acquired from a network address resource pool associated with the application system according to determination that a workload at a set of network ports of the application system meets a predetermined extension condition, the network address resource pool comprising network addresses configured to be assigned to the application system.
Rui Chen, Hua Wang, Maoyang Xu
Filed: 17 Sep 20
Utility
04gq0omp4kc4cygdkgt976hp5r07mxsduyw1cs6ky4fl8x0s b9tzbgnjg
23 Sep 21
Access path management is provided based on one or more path conditions in an information processing system.
Peniel Charles, Joseph G. Kanjirathinkal, Manikandan Sethuraman
Filed: 18 Mar 20
Utility
d9h33t02e u38a9c85a68j00u319g3jwmg
23 Sep 21
Techniques are provided for managing incompressible data in a compression-enabled log-structured array storage system.
Itay Keller, Nir Milstein
Filed: 19 Mar 20
Utility
glvrryc7mzoodfo0ixbz6qtaprnvuf5s75x61kz0z2huaep6skv5vyvkjctm
23 Sep 21
Application discovery from access patterns is disclosed.
Stephen D. Smaldone, Arieh Don, Owen Martin
Filed: 20 Mar 20
Utility
b3p6oghv2mwqkelhtmwx8xvmgsvit9bpk6hngzv0k7
23 Sep 21
Techniques are provided for utilizing snapshot longevity information to manage snapshots of storage volumes in a snapshot-enabled storage system.
Itay Keller, Nir Milstein, Yonatan Shtarkman
Filed: 18 Mar 20
Utility
iudemuooovv5cgftjh8wvvgdi73u4cfxtcdyuw37gq109ss3yi3fo
23 Sep 21
Techniques are provided for utilizing snapshot longevity information to manage snapshots in a snapshot-enabled storage system.
Itay Keller, Erez Webman, Nir Milstein, Yonatan Shtarkman
Filed: 18 Mar 20
Utility
zivko6exw8sics6x5qxq02yqahq550b4ym8g0300wp79d7dxif73i
16 Sep 21
One or more aspects of the present disclosure relate to testing, analyzing, and optimizing one or more data dedup techniques implemented by a storage system.
Arvind Petaru, Andrew M. Shooman
Filed: 10 Mar 20
Utility
v6mdpdwvn4nf3a7j87rpinighbenn3vokvmsm55d0pkc
16 Sep 21
Techniques for providing hiccup-less failback and journal recovery.
Ronen Gazit, Oran Baruch, Jenny Derzhavetz
Filed: 16 Mar 20
Utility
mrhnk3lmc2xnn440mwg4z7j187dor
16 Sep 21
Techniques for data migration may include: copying data of a source logical device of a source system to a target logical device of a target system; during said copying, receiving at the target system an I/O operation directed to a logical address of the target logical device and intercepting the I/O operation on the target system; determining, on the target system, to request from the source system a data page stored at the logical address; responsive to determining to request the data page stored, performing processing including: issuing a request to the source system for the data page stored at the logical address; and responsive to receiving said request, sending information from the source system to the target system, wherein the information includes the data page stored at the logical address and additional logical addresses of the source logical device at which the data page is stored.
Anton Kucherov, David Meiri
Filed: 13 Mar 20
Utility
8tlqkozh5px529i 1m9tb93xxxpqxou8hroovv
16 Sep 21
A method of managing operation of a data storage system (DSS) is provided.
Xiongcheng Li, Vamsi K. Vankamamidi, Xinlei Xu, Jian Gao, Geng Han
Filed: 16 Mar 20
Utility
atp557o8v3uf77hzb3ceckdy
16 Sep 21
Techniques for data placement may include receiving data portions stored at logical addresses, and storing the data portions on slices of physical storage located in storage tiers.
Nickolay Dalmatov
Filed: 3 Dec 20