4565 patents
Page 117 of 229
Utility
Method, apparatus and computer program product for managing storage system
24 Aug 21
Techniques manage a storage system.
Chun Ma, Changyu Feng, Jian Gao, Jibing Dong, Jianbin Kang, Xinlei Xu
Filed: 18 Mar 19
Utility
Method, apparatus and computer program product for managing storage device
24 Aug 21
Techniques manage a storage device.
Baote Zhuo, Jian Gao, Jibing Dong, Jianbin Kang, Geng Han
Filed: 18 Sep 19
Utility
Parallel access volume I/O processing with intelligent alias selection across logical control units
24 Aug 21
Techniques are provided for assigning alias devices in a parallel access volume storage environment.
Douglas Eric LeCrone, Paul Linstead
Filed: 31 Oct 17
Utility
Method and apparatus for dynamic flow control in distributed storage systems
24 Aug 21
A method for processing I/O requests that are received at a distributed storage system including a plurality of receiver nodes, a plurality of first nodes, and a plurality of second nodes, the method comprising: receiving, at a receiver node, an I/O request and executing the I/O request by using at least one of the first nodes and at least one of the second nodes; receiving, by the receiver node, one or more latency metrics from each of the first nodes and second nodes that are used to execute the I/O request, and reconfiguring the storage system, by the receiver node, based on any of the received latency metrics.
Vladimir Shveidel
Filed: 27 Jul 18
Utility
Storage array with dynamic cache memory configuration provisioning based on prediction of input-output operations
24 Aug 21
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Sanjib Mallick, John Krasner, Arieh Don, Ramesh Doddaiah
Filed: 14 May 20
Utility
Multipath device pseudo name to logical volume mapping for host devices
24 Aug 21
An apparatus comprises a host device comprising at least one processor coupled to memory.
Gopinath Marappan, Kurumurthy Gokam, Madhu Tarikere, Vinay G. Rao
Filed: 6 Jan 20
Utility
Managing data block compression in a storage system
24 Aug 21
An aspect of managing data block compression in a storage system includes performing, for each block written to the storage system: bit-wise traversing the block, searching the block for a pattern indicating a repeating sequence of bits and, upon determining the pattern exists in the block and the repeating sequence of bits in the pattern exceeds a threshold value, removing the repeating sequence of bits from the block thereby yielding a reduced-size block.
Uri Shabi, Amitai Alkalay
Filed: 16 Oct 19
Utility
Method, device and computer program product for expanding storage space
24 Aug 21
Techniques expand storage space.
Yousheng Liu, Jianbin Kang, Xinlei Xu, Lifeng Yang, Jian Gao
Filed: 16 Jan 19
Utility
Storage system configured to support one-to-many replication
24 Aug 21
An apparatus is configured to initiate a first replication session to replicate data of a first consistency group in a first storage system to a second consistency group in a second storage system, to create an additional consistency group linked to the first consistency group in the first storage system, and to initiate a second replication session to replicate data of the additional consistency group to another consistency group in a third storage system.
Xiangping Chen, Aharon Blitzer
Filed: 21 Jun 19
Utility
Storage system with throughput-based timing of synchronous replication recovery
24 Aug 21
An apparatus includes at least one processing device comprising a processor coupled to a memory, with the processing device being configured to maintain throughput statistics for at least portions of one or more asynchronous replication cycles of a replication process carried out between a first storage system and a second storage system, and to control a transition of the replication process from an asynchronous replication mode to a synchronous replication mode based at least in part on the maintained throughput statistics.
Xiangping Chen, David Meiri
Filed: 25 Oct 19
Utility
Transitioning from an original device to a new device within a data storage array
24 Aug 21
A technique provides transitioning from an original device to a new device within a data storage array.
Kundan Kumar, Kurumurthy Gokam, Md Haris Iqbal, Remesh Parakunnath
Filed: 21 Jan 20
Utility
VM protection with true zero RTO
24 Aug 21
One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 26 Feb 20
Utility
Unified approach to import, replication, and migration of a storage volume
24 Aug 21
Techniques for providing a unified approach to an orchestration of services for accomplishing data import tasks, data replication tasks, and/or data migration tasks in a clustered storage environment.
Nagasimha Haravu, Girish Sheelvant, Nagapraveen V. Seela, Alan L. Taylor
Filed: 30 Jul 18
Utility
Adaptively tuning polling intervals of control hosts in distributed storage systems
24 Aug 21
The described technology is generally directed towards adaptively tuning storage systems.
Xuedong Jiang, Daryl F. Kinney, John S. Copley, Michael E. Specht
Filed: 15 Apr 19
Utility
Providing build avoidance without requiring local source code
24 Aug 21
A technique controls a new software build.
Robert J. Bell, IV, DaoLong Fan
Filed: 29 Oct 19
Utility
Datacenter preemptive measures for improving protection using IoT sensors
24 Aug 21
One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state.
Kfir Wolfson, Jehuda Shemer, Assaf Natanzon
Filed: 10 Jul 18
Utility
Utilizing machine learning to predict success of troubleshooting actions for repairing assets
24 Aug 21
An apparatus includes at least one processing device configured to obtain information regarding a given asset to be repaired, to generate a recommended troubleshooting action to be performed on the given asset, and to provide the recommended troubleshooting action and the obtained information regarding the given asset as input to an encoder of a machine learning model implementing an attention mechanism.
Jeffrey Scott Vah, Ravi Shukla, Aaron Sanchez, Jim Henry Wiggers
Filed: 26 Feb 20
Utility
Detect and triage data integrity issue for virtual machine
24 Aug 21
One example method includes receiving an IO request that specifies an operation to be performed concerning a data block, determining if a policy exists for a device that made the IO request, when a policy is determined to exist for the device, comparing the IO request to the policy, recording the IO request, and passing the IO request to a disk driver regardless of whether the IO request is determined to violate the policy or not.
Man Lv, Yong Zou, Assaf Natanzon, Bing Liu
Filed: 19 Jun 20
Utility
Reconstruction of links to orphaned logical pages in a storage system
24 Aug 21
An apparatus comprises a processing device configured to determine that a first data structure comprises an indication that a first logical page is an orphan and to obtain the first logical page based at least in part on the determination.
Dixitkumar Vishnubhai Patel, James H. Shimer, James O. Owens
Filed: 30 Jun 20
Utility
System and method for accelerating application service restoration
24 Aug 21
A method for providing an application service to clients includes identifying a failure of the application service that causes the application service to be suspended; in response to identifying the failure: instantiating an instance of an application for providing the application service in a production host; identifying at least one virtual disk level backup that is: associated with the application and is a portion of deduplicated backups; extracting the at least one virtual disk level backup from deduplicated backups to obtain a copy of the at least one virtual disk level backup; identifying application data associated with the application within the copy of the at least one virtual disk level backup; transitioning an application service session for a client of the clients to the instance of the application; and resuming the application service for the client using the instance of the application and the application data.
Shelesh Chopra, Krishnendu Bagchi, Vipin Kumar Kaushal, Nitin Anand, Pallavi Prakash
Filed: 23 Apr 19