3707 patents
Page 80 of 186
Utility
Method And Apparatus For Avoiding Redundant Data Recovery
19 Aug 21
A method for use in a storage system, comprising: detecting that at least one storage device in a redundant storage device array has failed, the redundant storage device array including a plurality of storage devices; storing, in a memory, a recovery cache containing recovered data blocks, the recovered data blocks containing data previously stored on the failed storage device that has been calculated as part of executing read commands before the redundant storage device array is rebuilt; receiving an I/O command that is associated with the redundant storage device array, the I/O command including one of a read command or a write command; and executing the I/O command by using the recovery cache, wherein the redundant storage device array includes a plurality of storage regions, wherein any of the storage regions includes a respective portion of each of the plurality of storage devices.
Lior Kamran, Alex Soukhman
Filed: 13 Feb 20
Utility
Backup Agent Scaling with Evaluation of Prior Backup Jobs
19 Aug 21
A number of backup agents to be deployed to a system can be predicted by training one or more machine learning (ML) objects of a first prediction algorithm and training one or more ML objects of a second prediction algorithm.
Wei Wang, Mark Malamut
Filed: 13 Feb 20
Utility
0mhlydv89k7hii3vzf6jptoyidi2 f2on8b8gy6k7p
19 Aug 21
Methods and systems for restoring data are described.
Mahesh Reddy A V, Chetan Battal, Mahantesh Ambaljeri, Swaroop Shankar DH
Filed: 13 Feb 20
Utility
bxak55lmm0 4qrk32s1fcme83jnc9o0gfjrhb
19 Aug 21
Embodiments are described for a heuristic configuration selection process as part of or accessible by the backup management process.
Dinesh Kumar, Anand Reddy
Filed: 6 May 21
Utility
39jzewkz2pxzhez2rru5v 5i30n62qmw37iuyiiel
19 Aug 21
According to one embodiment, a method identifies a plurality of parameters associated with one or more virtual machines to be backed up to a backup storage system and a number of available backup proxy sessions.
Sharath Talkad Srinivasan, Smitha Prakash Kalburgi
Filed: 19 Feb 20
Utility
73mososhcz1zvmfzo0l2p6xega2ltulkm76mlquldm8 l45mo1lh91
19 Aug 21
One example method includes receiving a write request that includes a data structure version to be written, wherein the data structure version is associated with a unique identifier, storing the data structure version in association with the unique identifier, receiving a read request for a most recent version of the data structure and, when the stored data structure version is not the most recent version of the data structure, examining respective unique identifiers of each of a group of other stored data structure versions to determine which stored data structure version is the most recent.
Philip Shilane, Venkata Ravi Chandra Bandlamudi, Atul A. Karmarkar
Filed: 1 Feb 21
Utility
q7pxoh v4sq1awtougbum
19 Aug 21
Stream retention in a data storage system is described herein.
Mikhail Danilov, Igor Medvedev
Filed: 19 Feb 20
Utility
gvlkazmycfoi ecmj16t
19 Aug 21
An apparatus includes at least one processing device configured to obtain event metadata for events published by event sources to an event platform, the event metadata comprising static event tags for respective ones of the events.
Mohammad Rafey
Filed: 18 Feb 20
Utility
pidfv94w0g4ia7ukrpnxlc5yym49vu4 aemxmmsfntmjbc1a
19 Aug 21
Techniques are provided for caching of machine learning model training parameters.
Sean Creedon, Ian Gerard Roche
Filed: 19 Feb 20
Utility
26tusmmqhsmoyud03vczrhjir
19 Aug 21
Embodiments are described for an autonomously and dynamically allocating resources in a distributed network based on forecasted a-priori CPU resource utilization, rather than a manual throttle setting.
Rahul Deo Vishwakarma, Jayanth Kumar Reddy Perneti, Gopal Singh
Filed: 5 May 21
Utility
ve1hh4oyk0j0jz2ewq1b6rg2tvjhzehgns0aykmcaz8gs7db8xh83v3
19 Aug 21
A method and system for backing up and restoring data includes: determining, at a server storage area network (SAN) node, an LUN required for protection within a server SAN node based on communication between a backup agent and a logic unit number (LUN) agent in the server SAN node; determining a target backup device based on communication between the backup agent and respective target agent of a plurality of backup devices, the plurality of backup devices being connected with the server SAN node; and transmitting a virtual disk control command to the target backup device in response to the backup or restoration being triggered, such that data in the LUN required for protection is backed up to the target backup device or restored from the target backup device via an activated virtual disk interface of the target backup device.
Ried Ruifang Liu, Colin Yong Zou, Man Lv, Tao Xu
Filed: 4 May 21
Utility
nb1yncx 6h04nsoqdxrbdiodfxupj3mgx
12 Aug 21
An aspect of performing flow control of IO in a synchronous replication session between a local storage and a remote storage of a storage system includes tracking an amount of time an input/output (IO) request is processed at the remote storage including an amount of time the IO request is in transmit to and from the remote storage system.
Svetlana Kronrod, Anton Kucherov, Vladimir Shveidel, Xiangping Chen
Filed: 10 Feb 20
Utility
ms6d3asa8kei20pwwoy92c7x9
12 Aug 21
The disclosed technology generally describes a data protection scheme that for “mid-size” objects directly writes divided object data fragments, and performs erasure coding to directly write object coding fragments, to distributed storage locations in a node cluster.
Mikhail Danilov, Konstantin Buinov
Filed: 7 Feb 20
Utility
gsxcbm16v2ki 9vqlujo3nd05zx
12 Aug 21
A request manager analyzes API calls from a client to a host application for state and performance information.
Aidan Hally, Paul Mcsweeney, Kenneth Byrne
Filed: 10 Feb 20
Utility
ydotu6vib vvncfq00n9
12 Aug 21
Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application are disclosed.
Adrian John Sandham
Filed: 28 Apr 21
Utility
hhfxmbbhfs9bk9ot33gjpgvxayjhi
12 Aug 21
An aspect includes displaying a list of test case functions via a user interface.
Ilan Yosef, Bella Bekker Vernick
Filed: 10 Feb 20
Utility
78fgricj7bme32wll7pgox7j 83gf3nn
12 Aug 21
At least one identity for a given entity is established in accordance with a decentralized identity management system maintained in accordance with a distributed ledger, wherein the identity of the given entity and a set of attributes relating to the identity are defined by a secure token file.
Stephen Todd, Mark A. O'Connell
Filed: 29 Apr 21
Utility
aha3b0qqkocd6vc811bm jkic7w4j
12 Aug 21
A node mask of a global metadata structure entry representing an MD portion in GM may be updated when an entry of a local MD table representing the MD portion is removed in response to receiving an IO operation, without negatively impacting performance of the IO operation.
Kevin M. Tobin, Gabi Benhanokh, Andrew L. Chanler, Jerome J. Cartmell
Filed: 6 Feb 20
Utility
y3maj972u866x47a6zln9z59
12 Aug 21
A method in one embodiment comprises receiving a plurality of requests for data records from a plurality of clients.
Aurelian Dumitru, Gaurav Chawla
Filed: 10 Feb 20
Utility
xto7phpir99x7wd7dwwc8l5n51e7c2y6rigmsr83qi8ohhly8nx0l 6k
12 Aug 21
Retroactive backup compliance.
Saar Cohen, Jehuda Shemer, Valerie Lotosh, Erez Sharvit
Filed: 7 Feb 20