3707 patents
Page 78 of 186
Utility
Methods and Systems for Performing Data Backups
2 Sep 21
A method for backing up a storage volume that includes receiving, by a volume manager, a block allocation table of a cloned storage volume backup, selecting a modification entry that comprises a volume offset for modified file data, obtaining a backup offset for the cloned storage volume backup based on the block allocation table and the volume offset, updating, based on the backup offset, the block allocation table to obtain an updated block allocation table, and sending the modified file data and the updated block allocation table to a backup server.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Sunil Yadav, Divyangana Sisodia, Yagnavalkya Chennojwala, Asif Khan, Aneesh Kumar Gurindapalli
Filed: 28 Feb 20
Utility
System and a Method for Generating Live VM Images with an Extended Recovery Range
2 Sep 21
One example method includes receiving, at an IO journal, a new entry that identifies a respective disk location L, and data X written at that disk location L, and determining whether a location specified in an oldest entry of the IO journal is specified in any other entries in the IO journal.
Nadav Azaria, Jehuda Shemer, Saar Cohen
Filed: 28 Feb 20
Utility
qeafrkoddkfdv5mjiywfsqk02yeahakeswsrc3acb9s4u65blyf5acbl
2 Sep 21
One example method includes receiving, at an IO journal, a new entry that identifies a respective disk location L, and data X written at that disk location L, and determining whether a location specified in an oldest entry of the IO journal is specified in any other entries in the IO journal.
Nadav Azaria, Jehuda Shemer, Saar Cohen
Filed: 28 Feb 20
Utility
nykmi19agubmku8xkac7w3qsp
2 Sep 21
Methods and systems for file level prioritization during a data restore operation are disclosed.
Mahesh Reddy A V, Swaroop Shankar DH, Chetan Battal
Filed: 28 Feb 20
Utility
gnoiyegoj3ksl3a uraxl0d2171tj8b0w
2 Sep 21
A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted.
Jehuda Shemer, Saar Cohen, Kfir Wolfson, Itay Azaria
Filed: 27 Feb 20
Utility
i362wl8hbj9xeuhx9g3vbg7u09j0i56jvy30hya4cgx1d4w cmn4o5
2 Sep 21
A garbage collection assisted deduplication process determines whether or not data segments should be deduplicated or not based on the liveness of segment data in a region, and the number of segments subject to deduplication in the region.
Ramprasad Chinthekindi, Abhinav Duggal
Filed: 28 Feb 20
Utility
retx i4zzwzet6vgd18x5nt8lky14o2u7s2mafcf8ed
2 Sep 21
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 27 Feb 20
Utility
08yvuek24zmm4m2ezm28xkyhowvhtdlkvs366 ig8f07zi0ls3oniz
2 Sep 21
A geographically diverse data storage system that can protect data via replication of data among relevant zones according to a determined replication topology is disclosed.
Mikhail Danilov, Yohannes Altaye
Filed: 27 Feb 20
Utility
mvdrfb0bu89tc45wgz3vo4lugw79s49445k5nlo43x40oug6otkd
2 Sep 21
A method for determining a model compression rate comprises determining a near-zero importance value subset from an importance value set associated with a machine learning model, a corresponding importance value in the importance value set indicating an importance degree of a corresponding input of a processing layer of the machine learning model, importance values in the near-zero importance value subset being closer to zero than other importance values in the importance value set; determining a target importance value from the near-zero importance value subset, the target importance value corresponding to a turning point of a magnitude of the importance values in the near-zero importance value subset; determining a proportion of importance values less than the target importance value in the importance value set in the importance value set; and determining the compression rate for the machine learning model based on the determined proportion.
Wenbin Yang, Jinpeng Liu, WuiChak Wong, Sanping Li, Zhen Jia
Filed: 20 Mar 20
Utility
4zevr3kk6t0dmx67jq981m1urtkyqvkvhaipu3ia2y7xc70ngcucvlzdsxz
2 Sep 21
Embodiments of the present disclosure provide a method for solving a problem, a computing system and a program product.
YuHong Nie, WuiChak Wong, Sanping Li, Xuwei Tang
Filed: 20 Mar 20
Utility
30aodnbkdrytjrec1wze4ig9qdr75xbxrrf9e118bir3vnhymmyt8fw
26 Aug 21
Techniques for performing management operations may include: creating a job using a graphical user interface (GUI) of an application, wherein the job includes at least one task and the job performs a first management operation including the at least one task; storing first information that describes the job in an application database for the application; and performing first processing that generates a code module for the job, wherein said first processing uses the first information from the application database.
Paul J. McSweeney, Fearghal O'Maolcatha, Aaron T. Twohig, Helen Walsh
Filed: 25 Feb 20
Utility
4soiaq06u2tqhfltck z48szqe85se
26 Aug 21
An apparatus includes at least one processing device, with the at least one processing device being configured, in conjunction with synchronous replication of at least one logical storage volume between first and second storage systems arranged in an active-active configuration, to create a first snapshot of the logical storage volume in the first storage system, to create a second snapshot of the logical storage volume in the second storage system, to create a third snapshot of the logical storage volume in the first storage system, to initiate an asynchronous replication cycle to transfer differential data between the first and the third snapshots in the first storage system to the second storage system, and to utilize the second snapshot and the transferred differential data to create an additional snapshot of the logical storage volume in the second storage system that is synchronized with the third snapshot in the first storage system.
Xiangping Chen, David Meiri
Filed: 21 Feb 20
Utility
74iis1a09qzm0npwzj76gkz3 qh
26 Aug 21
In a storage system that implements RAID (D+P) with an existing cluster of drives in which the drives have (D+P) partitions that are protection group members, cluster member transfer code creates a new drive cluster when fewer than D+P new drives are added to the storage system.
Kuolin Hua, Kunxiu Gao
Filed: 21 Feb 20
Utility
bsmj9sphsvh5o5l67nm18q22i8j0kkjy
26 Aug 21
One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 26 Feb 20
Utility
6h6m3etk2 zl84y68ann81ecpjht8bqwr1g2e69aoitqm9rg
26 Aug 21
A storage entity of the data storage system may be visible to the host over a first path and a second path.
Ian Wigmore, Mona S. Tse, Michael E. Specht, Sanjib Mallick, Vinay G. RAO, Arieh Don
Filed: 26 Feb 20
Utility
c2b70kdodvoz7k4sgossb3nuqk5n80elcclyd7r8ruv11tdzfy
26 Aug 21
A storage system comprises a disk array enclosure comprising an enclosure controller, a cache comprising a metadata journal, a plurality of data storage devices and a plurality of metadata storage devices.
Boris Glimcher, Amitai Alkalay
Filed: 25 Feb 20
Utility
2ecaxmbe tezf2u433vlv8dr
26 Aug 21
An apparatus comprises a host device configured to communicate over a network with a storage system.
Vinay G. Rao, Sanjib Mallick, Natasha Gaurav, Arieh Don
Filed: 21 Feb 20
Utility
e44v jr6ledoecpdeyem0hz9fr0rw3jewckemo8ac4fqoebnvnvp6y
26 Aug 21
A storage system comprises a disk array enclosure comprising at least one enclosure controller, a plurality of data storage devices and at least one metadata storage device.
Boris Glimcher, Amitai Alkalay
Filed: 25 Feb 20
Utility
iv7x579c3j7x1k7gn4oz rqn242jomxmv0hh
26 Aug 21
Methods, apparatus, and processor-readable storage media for filtering security controls are provided herein.
Danny V. Dhillon, Greg W. Lazar
Filed: 25 Feb 20
Utility
g9hkerke085lr7g8rpb6oqgtv7cs2potrjcfs00aheo5 0slqwc6kew6
26 Aug 21
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing virtual machine upgrade.
Qin Liu, Jie Liu
Filed: 11 May 20