4565 patents
Page 104 of 229
Utility
Prediction of maintenance window of a storage system
9 Nov 21
A method in one embodiment comprises detecting one or more storage arrays in an information technology infrastructure, and receiving input-output (IO) operation performance data recorded over a given time period from the one or more storage arrays.
Joseph G. Kanjirathinkal, Sanjib Mallick, Peniel Charles
Filed: 31 Mar 20
Utility
Automated generation of an information technology asset ontology
9 Nov 21
A method includes obtaining information regarding a plurality of information technology assets in use across an enterprise system, identifying dependencies between the information technology assets in use across the enterprise system, and generating an information technology asset ontology comprising a knowledge graph with nodes representing the information technology assets and edges between the nodes representing dependencies between the information technology assets.
Ravi R. Shastri, Mainak Chowdhury
Filed: 21 Nov 19
Utility
Identifying and mitigating risks of cryptographic obsolescence
9 Nov 21
A method includes monitoring an enterprise system to identify cryptographic techniques utilized by one or more components of the enterprise system, the one or more components comprising at least one of physical and virtual computing resources.
Eric Young, Zulfikar A. Ramzan
Filed: 25 Jan 19
Utility
Generating authentication information utilizing linear feedback shift registers
9 Nov 21
An apparatus includes at least one linear feedback shift register and at least one processing device comprising a processor coupled to a memory.
Zulfikar A. Ramzan, Piers Bowness
Filed: 9 Jan 19
Utility
Data management for edge computing environment
9 Nov 21
In an edge data management methodology, first information is obtained pertaining to a given data set associated with a computing environment, wherein the computing environment comprises one or more edge computing networks and one or more centralized computing networks.
Nicole Reineke, James R. King
Filed: 17 Jul 19
Utility
Dynamic cloud native cluster construction using under-utilized machines
9 Nov 21
One example method includes connecting to a server component, transmitting, to the server component, information concerning a hardware configuration associated with an asset having a capability that is fully utilized during a first time period and the capability is idle during a second time period, receiving, from the server component, cluster connection information, and using the cluster connection information to temporarily connect the asset to the cluster as a node of the cluster so that the capability is available during idle time to perform a workload of the cluster.
Victor Fong, Xuebin He, Megan Murawski
Filed: 29 Jan 20
Utility
Rekeying information on storage devices using a proactive copy service
2 Nov 21
A technique rekeys information to maintain data security.
Naizhong Chiu, Ping Zhang, Xuan Tang
Filed: 28 Oct 19
Utility
Concurrent copy emulation
2 Nov 21
Causing an application on a host to access a point-in-time image on a storage system includes the application generating concurrent copy commands that are designed to cause data to be copied from a first location to a second location independent of whether the data is accessed by the host following initiating creation of a concurrent copy, intercepting concurrent copy commands and data generated by the application prior to sending the commands and data from the host to the storage system, transforming the concurrent copy commands and data to revised commands and data that are used to access the point-in-time image.
Douglas E. LeCrone, Bruce A. Pocock
Filed: 29 Oct 19
Utility
Storage system and method for movement between rotation subgroups
2 Nov 21
A method, computer program product, and computing system for compartmentalizing a plurality of RAID extents, within a RAID system, into a plurality of rotation subgroups.
Nickolay Dalmatov, Michael P. Wahl, Jian Gao
Filed: 31 Oct 17
Utility
Natural order API calls
2 Nov 21
Described are techniques for request processing.
Chao Wang, Jichao Zhang, James O. Pendergraft, Peter Jun Peng, Kenneth Lee, Wei Wang
Filed: 15 Feb 19
Utility
Methods, devices and computer readable mediums for managing storage system
2 Nov 21
The techniques involve, in response to receiving a message indicating that a failure occurs in a first disk group of an array, selecting, from lists in a cache, a first entry to be written into the array, the lists including first and second lists, wherein the first list is used to cache a data entry for the first disk group.
Lifeng Yang, Xinlei Xu, Jian Gao, Jibing Dong, Geng Han
Filed: 2 Jun 20
Utility
Automated transformation from command mode to transport mode
2 Nov 21
Communicating between a first device and a second device includes the first device generating command mode control words for communication with the second device, the first device converting the command mode control words into transport mode control words prior to transmitting the control words to the second device, the first device receiving transport mode control words from the second device, and the first device converting the transport mode control words received from the second device into received command mode control words.
Douglas E. LeCrone, Paul A. Linstead
Filed: 14 Apr 20
Utility
Non-disruptive migration of a virtual volume in a clustered data storage system
2 Nov 21
A virtual volume is initially provided from a first storage appliance within a cluster of storage appliances by providing access to the virtual volume over a data path between a host computer and a protocol endpoint hosted on the first storage appliance, based on an initial binding between the virtual volume and the protocol endpoint hosted on the first storage appliance.
Dmitry Tylik, Vinod Rajasekaran, Anil K. Koluguri, Matthew H. Long
Filed: 27 Jul 20
Utility
Method, electronic device and computer program product for managing redundant arrays of independent disks
2 Nov 21
Techniques manage a redundant array of independent disks.
Xiongcheng Li, Xinlei Xu, Geng Han
Filed: 16 Oct 19
Utility
Media hiccup management in a storage system
2 Nov 21
A method for use in a storage system, the method comprising: receiving an I/O command; identifying a latency of a first storage device that is associated with the I/O command; and executing the I/O command at least in part based on the latency, wherein executing the I/O command based on the latency includes: performing a first action when the latency is less than a first threshold, and performing a second action when the latency is greater than the first threshold, wherein identifying the latency includes retrieving the latency from a latency database, and wherein the first storage device is part of a storage array, the storage array including one or more second storage devices in addition to the first storage device.
Lior Kamran, Alex Soukhman
Filed: 13 Feb 20
Utility
Systems and methods of updating persistent statistics on a multi-transactional and multi-node storage system
2 Nov 21
Techniques for updating persistent statistics on a multi-transactional and multi-node storage system.
Philippe Armangau, Vamsi K. Vankamamidi, Yubing Wang, Ajay Karri
Filed: 1 Jul 20
Utility
Migration from an asynchronous execution model to a synchronous execution model
2 Nov 21
A method is provided comprising: initializing a first thread based on a first work request; and executing the first thread to complete the first work request, wherein the first thread is initialized and executed by using an Application Programming Interface (API) that is arranged to emulate a work request queue by initializing a different respective thread for each work request that is submitted to the API for addition to the work request queue.
Vladimir Shveidel, Ronen Gazit, Bar David
Filed: 18 Oct 19
Utility
Methods, devices and computer readable medium for managing a redundant array of independent disks
2 Nov 21
A technique involves: in response to establishing a stripe in a Redundant Array of Independent Disks (RAID), generating first mapping information of the stripe in a block allocated for the stripe, the RAID being built based on extents obtained by dividing disks, the stripe including a first extent set, the first mapping information recording respective disk locations of the first extent set; in response to a failure occurring in a first disk where a first extent in the first extent set is located, replacing the first extent with a second extent to obtain a second extent set corresponding to the stripe; generating second mapping information of the stripe in the block, to record respective disk locations of the second extent set; and in response to the first disk being recovered from the failure, restoring data in the stripe based on the first mapping information and the second mapping information.
Jibing Dong, Jian Gao, Geng Han, Xinlei Xu
Filed: 25 Sep 19
Utility
Method and apparatus for error ticket management
2 Nov 21
A method is provided comprising: storing one or more tickets in a ticket database, each of the tickets being associated with a corresponding test system, and each of the tickets being associated with an error that is generated as a result of executing one of a plurality of tests on the ticket's corresponding test system; executing a reclamation agent that is configured to: retrieve a plurality of tickets from a ticket database, detect if each of the tickets satisfies a predetermined condition, and return the ticket's corresponding test system to a pool of available test systems when the predetermined condition is satisfied by the ticket.
Ilan Yosef, Shay Goldshmidt
Filed: 30 Mar 20
Utility
Adaptive ingest throttling in layered storage systems
2 Nov 21
A method of accepting writes in a multilayered storage system is provided.
Sorin Faibish, Istvan Gonczi, Ivan Bassov
Filed: 17 Oct 19