3707 patents
Page 78 of 186
Utility
Methods and Systems for Performing Data Backups
2 Sep 21
A method for backing up a storage volume that includes receiving, by a volume manager, a block allocation table of a cloned storage volume backup, selecting a modification entry that comprises a volume offset for modified file data, obtaining a backup offset for the cloned storage volume backup based on the block allocation table and the volume offset, updating, based on the backup offset, the block allocation table to obtain an updated block allocation table, and sending the modified file data and the updated block allocation table to a backup server.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Sunil Yadav, Divyangana Sisodia, Yagnavalkya Chennojwala, Asif Khan, Aneesh Kumar Gurindapalli
Filed: 28 Feb 20
Utility
System and a Method for Generating Live VM Images with an Extended Recovery Range
2 Sep 21
One example method includes receiving, at an IO journal, a new entry that identifies a respective disk location L, and data X written at that disk location L, and determining whether a location specified in an oldest entry of the IO journal is specified in any other entries in the IO journal.
Nadav Azaria, Jehuda Shemer, Saar Cohen
Filed: 28 Feb 20
Utility
7gi8m5ug8oqxxga6k629x0e9
2 Sep 21
One example method includes receiving, at an IO journal, a new entry that identifies a respective disk location L, and data X written at that disk location L, and determining whether a location specified in an oldest entry of the IO journal is specified in any other entries in the IO journal.
Nadav Azaria, Jehuda Shemer, Saar Cohen
Filed: 28 Feb 20
Utility
dhp6fy4spa2ttf0krvgiiksxdvke9poxaanfhks 41ayfysok
2 Sep 21
Methods and systems for file level prioritization during a data restore operation are disclosed.
Mahesh Reddy A V, Swaroop Shankar DH, Chetan Battal
Filed: 28 Feb 20
Utility
t5l2tdae8l1r7z8h23d65ouj8hklouj50lf9oc05elra1g1lddp1l
2 Sep 21
A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted.
Jehuda Shemer, Saar Cohen, Kfir Wolfson, Itay Azaria
Filed: 27 Feb 20
Utility
xuv1e69q8posnzy5b6z 0sttdu6qt1
2 Sep 21
A garbage collection assisted deduplication process determines whether or not data segments should be deduplicated or not based on the liveness of segment data in a region, and the number of segments subject to deduplication in the region.
Ramprasad Chinthekindi, Abhinav Duggal
Filed: 28 Feb 20
Utility
4qu9gxqc28vxqalcevwf54fb7w6 usk9lo
2 Sep 21
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 27 Feb 20
Utility
pv979ijzgnqlrjb2ke35axu623y926o 8tslo3e04h967o
2 Sep 21
A geographically diverse data storage system that can protect data via replication of data among relevant zones according to a determined replication topology is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 27 Feb 20
Utility
q7iq6hc6q6ssgp05wsoqxsje5owtdfeb520dy0myu7j4zrr83javbvx
2 Sep 21
A method for determining a model compression rate comprises determining a near-zero importance value subset from an importance value set associated with a machine learning model, a corresponding importance value in the importance value set indicating an importance degree of a corresponding input of a processing layer of the machine learning model, importance values in the near-zero importance value subset being closer to zero than other importance values in the importance value set; determining a target importance value from the near-zero importance value subset, the target importance value corresponding to a turning point of a magnitude of the importance values in the near-zero importance value subset; determining a proportion of importance values less than the target importance value in the importance value set in the importance value set; and determining the compression rate for the machine learning model based on the determined proportion.
Wenbin Yang, Jinpeng Liu, WuiChak Wong, Sanping Li, Zhen Jia
Filed: 20 Mar 20
Utility
809sh0af3kkwk6f10tylemtjowqutbyj6ahyj
2 Sep 21
Embodiments of the present disclosure provide a method for solving a problem, a computing system and a program product.
YuHong Nie, WuiChak Wong, Sanping Li, Xuwei Tang
Filed: 20 Mar 20
Utility
relww959pctnbj2ny36q3byu244rbxof1a86cmjt6dqhjjg3iw5d94yhp786
26 Aug 21
Techniques for performing management operations may include: creating a job using a graphical user interface (GUI) of an application, wherein the job includes at least one task and the job performs a first management operation including the at least one task; storing first information that describes the job in an application database for the application; and performing first processing that generates a code module for the job, wherein said first processing uses the first information from the application database.
Paul J. McSweeney, Fearghal O'Maolcatha, Aaron T. Twohig, Helen Walsh
Filed: 25 Feb 20
Utility
thl9jce e37x1kto5pg69u9rdyiacv
26 Aug 21
An apparatus includes at least one processing device, with the at least one processing device being configured, in conjunction with synchronous replication of at least one logical storage volume between first and second storage systems arranged in an active-active configuration, to create a first snapshot of the logical storage volume in the first storage system, to create a second snapshot of the logical storage volume in the second storage system, to create a third snapshot of the logical storage volume in the first storage system, to initiate an asynchronous replication cycle to transfer differential data between the first and the third snapshots in the first storage system to the second storage system, and to utilize the second snapshot and the transferred differential data to create an additional snapshot of the logical storage volume in the second storage system that is synchronized with the third snapshot in the first storage system.
Xiangping Chen, David Meiri
Filed: 21 Feb 20
Utility
uhpuwifjf57bal5e05uvfmz16muesveyub6lddz0t1arxi7gqm6oek617t
26 Aug 21
In a storage system that implements RAID (D+P) with an existing cluster of drives in which the drives have (D+P) partitions that are protection group members, cluster member transfer code creates a new drive cluster when fewer than D+P new drives are added to the storage system.
Kuolin Hua, Kunxiu Gao
Filed: 21 Feb 20
Utility
b5xhs329ljnu0e7nx1p9kfx5fu2v4
26 Aug 21
One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 26 Feb 20
Utility
yayjfsymj14sksu72dzr1o4k0y nifv3l6z2nb2pc7leef
26 Aug 21
A storage entity of the data storage system may be visible to the host over a first path and a second path.
Ian Wigmore, Mona S. Tse, Michael E. Specht, Sanjib Mallick, Vinay G. RAO, Arieh Don
Filed: 26 Feb 20
Utility
nqnkxru5qf55a6hkztosy8ulenin0s61e67np
26 Aug 21
A storage system comprises a disk array enclosure comprising an enclosure controller, a cache comprising a metadata journal, a plurality of data storage devices and a plurality of metadata storage devices.
Boris Glimcher, Amitai Alkalay
Filed: 25 Feb 20
Utility
ggt8f993onpfhaw4xr6u od2eca84c2ac9
26 Aug 21
An apparatus comprises a host device configured to communicate over a network with a storage system.
Vinay G. Rao, Sanjib Mallick, Natasha Gaurav, Arieh Don
Filed: 21 Feb 20
Utility
0jzim7ia9fnfolj0alufknflvj685tw76abm0a1m6oaqvx5o55j
26 Aug 21
A storage system comprises a disk array enclosure comprising at least one enclosure controller, a plurality of data storage devices and at least one metadata storage device.
Boris Glimcher, Amitai Alkalay
Filed: 25 Feb 20
Utility
rr42dj8cu3ibbbceeg87jd0vx j1
26 Aug 21
Methods, apparatus, and processor-readable storage media for filtering security controls are provided herein.
Danny V. Dhillon, Greg W. Lazar
Filed: 25 Feb 20
Utility
lmk2cub4dbbx evd1wzkxfexdsi6xg4va9u5h
26 Aug 21
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing virtual machine upgrade.
Qin Liu, Jie Liu
Filed: 11 May 20