4565 patents
Page 116 of 229
Utility
Rule book based retention management engine
31 Aug 21
Systems and methods for determining retention periods or policies for backups are disclosed.
Mahesh Reddy Av, Gururaj Kulkarni, Swaroop Shankar D H, Lakshminarayanan Muniswamy
Filed: 25 Oct 18
Utility
System and method for management of largescale data backup
31 Aug 21
A remote agent for providing data protection services includes persistent storage and a backup manager.
Shelesh Chopra, Manish Sharma, Sunil Yadav, Amit Jain, Aaditya Rakesh Bansal, Sneha Yadav, Jayashree B. Radha
Filed: 26 Apr 19
Utility
Dynamic application consistent data restoration
31 Aug 21
Restore operations in containerized environments are disclosed.
James R. King, Ethan A. Kaley, Joseph J. Gorse, III
Filed: 15 Oct 19
Utility
Data service failover in shared storage clusters
31 Aug 21
Described herein is a system that provides data service failover in shared storage clusters.
G. Paul Koning, Himabindu Tummala, Sudhir Srinivasan
Filed: 13 Sep 19
Utility
Persistence points based coverage mechanism for flow testing in high-performance storage systems
31 Aug 21
A processing device maintains a data structure for a set of process flows executing on one or more processing cores of a storage system.
Alex Soukhman, Lior Kamran
Filed: 21 Jan 20
Utility
Adaptive thresholds for containers
31 Aug 21
A method includes identifying container metrics for containers running in a container environment, collecting container data for the containers, and generating an adaptive threshold for a given one of the identified container metrics.
Sudhir Vijendra, Shashidhar Krishnaswamy
Filed: 22 Jun 18
Utility
Systems and methods for rebuilding a cache index
31 Aug 21
Systems and methods for rebuilding an index for a flash cache are provided.
Philip N. Shilane, Grant R. Wallace
Filed: 13 Jun 19
Utility
Enhanced tape drive communication
31 Aug 21
Communicating with a tape drive emulation unit that communicates using command mode or transport mode includes the tape drive emulation unit receiving an inquiry about whether the tape drive emulation unit communicates using transport mode, the tape drive emulation unit responding to the inquiry by indicating that the tape drive emulation unit does communicate using transport mode, and the tape drive emulation unit servicing transport mode commands until receiving a release command.
Douglas E. LeCrone, Paul A. Linstead
Filed: 23 Apr 19
Utility
Method, device and computer program product for storing metadata
31 Aug 21
In an example, a method comprises determining, based on a set of metadata items to be stored, a first sequence and a second sequence, wherein the first sequence and the second sequence each include a plurality of key-value pairs, each key-value pair including a metadata item from the set of metadata items and a keyword corresponding to the metadata item in the set.
Aaron Yurun Wu, Gary Jialei Wu, Ao Sun
Filed: 14 Jun 19
Utility
DNA-based data center with deduplication capability
31 Aug 21
A DNA storage system for binary digital data.
Omer Sagi, Avitan Gefen, Ran Taig
Filed: 24 Apr 18
Utility
Methods, systems, and computer readable mediums for performing metadata-driven data collection
31 Aug 21
Methods, systems, and computer readable media for performing metadata-driven data collection are disclosed.
Venkatesh Sudarsanam Madhipatla, Bayi Peng, Xiaohong Fu
Filed: 5 Dec 16
Utility
Multi point in time object store
31 Aug 21
A System, Computer Program Product, and Computer-executable method for managing an object based storage within a cloud storage provider, the System, Computer Program Product, and Computer-executable method including receiving a data I/O, determining whether the data I/O relates to an existing object within the object based storage, if the data I/O relates to an existing object, updating a stream and existing data object in the object based storage, and creating a new data object and key based on the data I/O and updating the object based storage.
Jehuda Shemer, Assaf Natanzon
Filed: 29 Sep 15
Utility
NLP-assisted automatic assignment of data protection policies based on user intentions
31 Aug 21
One example method includes receiving user input concerning a data protection policy for an entity, where the user input is in the form of written input and/or audio input, when the user input comprises audio input, translating the audio input into text, determining an intention of the user with respect to data protection for the entity by translating the text to common terms by interpreting terms of the text that have the same meaning as being similar words and applying context to the words, identifying a data protection policy that best corresponds to the intention of the user concerning data protection for the entity, and applying the data protection policy to the entity.
Yossef Saad, Assaf Natanzon
Filed: 25 Oct 18
Utility
Multi-tenant deduplication with non-trusted storage system
31 Aug 21
An apparatus, in one example, comprises a storage system configured to perform one or more deduplication operations on encrypted datasets received for a plurality of tenants and store at least a portion of the encrypted datasets, the datasets having been encrypted for respective ones of the plurality of tenants using a common encryption key.
Assaf Natanzon, Udi Shemer, Zvi Schneider, Amitai Alkalay
Filed: 30 Jul 18
Utility
Object storage for guaranteed content for backup and retention
31 Aug 21
Systems, apparatus and methods for managing an object's lifecycle in an object store.
Assaf Natanzon, Jehuda Shemer, Kfir Wolfson
Filed: 25 Oct 18
Utility
Method and device for managing storage system
31 Aug 21
Implementations of the present disclosure relate to method and device for managing a storage system.
Lester Zhang, Chen Gong, Leon Zhang, Geng Han
Filed: 17 Apr 18
Utility
Digital disappearing ink
31 Aug 21
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for implementing digital disappearing ink.
Wayne A Pauley, Jr., Stephen J Todd, Michel F Fisher
Filed: 28 Jun 12
Utility
Security for network computing environment using centralized security system
31 Aug 21
Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system.
Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
Filed: 9 Jul 19
Utility
Dynamic three-dimensional map generation for computing environment
31 Aug 21
In a computing environment comprising a plurality of equipment racks wherein each equipment rack comprises one or more of compute, storage and network assets, the method captures an image of at least one equipment rack in the computing environment.
James R. King, Nicole Reineke
Filed: 2 Aug 19
Utility
Human trust overlays for automated data confidence fabrics
31 Aug 21
A social overlay is provided that allows an application to seek human input when performing high-risk decisions.
Stephen J. Todd, Jason A. Shepherd
Filed: 31 Mar 20