4565 patents
Page 120 of 229
Utility
System and method for asynchronous cleaning of data objects on cloud partition in a file system with deduplication
17 Aug 21
A data management device includes a persistent storage and a processor.
Abdullah Reza, Abhinav Duggal, Lan Bai
Filed: 31 Aug 17
Utility
Speeding deduplication using a most wanted digest cache
17 Aug 21
Embodiments are directed to techniques for performing deduplication.
Philippe Armangau, Christopher A. Seibel, Bruce E. Caram, Yubing Wang, John Gillono
Filed: 31 Oct 17
Utility
Advanced metadata management
17 Aug 21
A computer-executable method, system, and computer program product for managing metadata in a distributed data storage system, wherein the distributed data storage system includes a first burst buffer having a key-value store enabled to store metadata, the computer-executable method, system, and computer program product comprising receiving, from a compute node, metadata related to data stored within the distributed data storage system, indexing the metadata at the first burst buffer, and processing the metadata in the first burst buffer.
John M. Bent, Sorin Faibish, Zhenhua Zhang, Xuezhao Liu, Jingwang Zhang
Filed: 31 Mar 14
Utility
Determining zoned but inactive I/O paths
17 Aug 21
Combinations of host ports and storage ports (e.g., I-T pairs) on a storage network that are zoned but not masked may be determined, without accessing a switch or network administrator.
Michael E. Specht, Vinay G. Rao, Subin George, Arieh Don
Filed: 31 Jan 19
Utility
Evaluating, weighting, and scheduling the use of network links
17 Aug 21
The described technology is generally directed towards evaluating, weighting, and scheduling the use of network links.
Venkata L. R. Ippatapu
Filed: 30 Apr 19
Utility
Scaling a number of segments in a stream of data based on communication load and trend direction
17 Aug 21
The described technology is generally directed towards automatically scaling segments of a stream of data.
Jeff Wu, Ben Wang
Filed: 21 Feb 19
Utility
Techniques for processing management messages using multiple streams
17 Aug 21
Techniques for processing messages may include: establishing a plurality of streams between a source system and a target system; reserving one or more streams of the plurality of streams, wherein the one or more streams are reserved and used in transmitting only management messages, wherein the one or more streams includes a first stream of the plurality of streams; transmitting a first management message over the first stream from the source system to the target system; and transmitting a first data message over a second of the plurality of streams, wherein the second stream is not included in the one or more streams reserved for use in transmitting only management messages.
Leonid Ravich, Eyal Ben Ner
Filed: 23 Jul 19
Utility
Transporting data out of isolated network environments
17 Aug 21
The described technology is generally directed towards transporting data out of isolated network environments.
Anna Agnieszka Odziemczyk, Michael William Hurley
Filed: 30 Jul 19
Utility
Cloud-based scheduling of data operations to an object storage using an operation pool
17 Aug 21
Described is a system for cloud-based scheduling of data operations to an object storage.
Sunil Yadav, Shelesh Chopra, Amarendra Behera, Ravi Vijayakumar Chitloor, Tushar Dethe, Jigar Bhanushali, PrabhatKumar Dubey, Deependra Singh, Himanshu Arora
Filed: 23 Oct 20
Utility
Chassis and method for manufacturing the same
17 Aug 21
Techniques involve providing a chassis and for manufacturing the same.
Fajiang Liu, Wei Dong, Haifang Zhai
Filed: 13 Apr 20
Utility
User interface development
17 Aug 21
Systems and methods for developing user interfaces.
Richard B. Lyman
Filed: 30 Aug 19
Utility
Method and apparatus for caching data
17 Aug 21
Embodiments of the present disclosure relate to methods and apparatuses for caching data.
Yousheng Liu, Jian Gao, Xinlei Xu, Ruiyong Jia, Changyu Feng
Filed: 16 Sep 19
Utility
Non-disruptive transformation of a logical storage device from a first access protocol to a second access protocol
17 Aug 21
A host device discovers one or more first protocol endpoints presented by a storage system for a first logical storage device utilizing a first access protocol, and discovers one or more second protocol endpoints presented by the storage system for a second logical storage device utilizing a second access protocol.
Amit Pundalik Anchi, Sanjib Mallick
Filed: 18 Feb 20
Utility
Automated storage tiering by access pattern detection and temporal trend prediction
17 Aug 21
Techniques for data storage optimization processing that may include: receiving I/O access information characterizing observed I/O operations directed to a logical address space; analyzing the I/O access information to identify a predicted I/O access distribution expected for the plurality of logical regions of the logical address space at multiple points in time; determining a placement plan specifying placement of data portions of the plurality of logical regions among a plurality of storage tiers; and performing, in accordance with the placement plan, at least one data movement that moves at least a first data portion of a first of the plurality of logical regions from a first of the plurality of storage tiers to a second of the plurality of storage tiers.
Kirill Aleksandrovich Bezugly, Nickolay A. Dalmatov
Filed: 29 Oct 19
Utility
Automated seamless migration with signature issue resolution
17 Aug 21
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Amit Pundalik Anchi, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 11 Dec 19
Utility
Method, electronic device and computer program product for storage management
17 Aug 21
Techniques involve determining updated disk sets.
Shuai Ni, Geng Han, Jian Gao, Xinlei Xu, Tianshu Sun
Filed: 29 May 20
Utility
Sub-lun non-deduplicated tier in a CAS storage to reduce mapping information and improve memory efficiency
17 Aug 21
A method is disclosed for storing data in a storage system, comprising: receiving a write request at the storage system; detecting whether the write request is associated with one of a deduplication tier or a non-deduplication tier of the storage system; when the write request is associated with the deduplication tier of the storage system, storing data associated with the write request in the first portion of the volume and updating a first mapping structure to map the first LBA to at least one first hash digest that is generated based on the data; and when the write request is associated with the non-deduplication tier of the storage system, storing data associated with the write request in the second portion of the volume and updating the first mapping structure to map the first LBA to a second hash digest that is generated based on a second LBA.
Assaf Natanzon, Zvi Schneider, Amitai Alkalay
Filed: 29 Jan 19
Utility
Storage system with storage volume pre-copy functionality for increased efficiency in asynchronous replication
17 Aug 21
An apparatus is configured to identify a storage volume to be added to a consistency group for replication from a source storage system (“source”) to a target storage system (“target”), to generate a snapshot of the storage volume, to create a dummy volume on the target, to copy the snapshot to the dummy volume, and to add the storage volume to the consistency group.
David Meiri, Xiangping Chen
Filed: 15 Jan 19
Utility
Snapshot compliance techniques
17 Aug 21
Techniques for determining snapshot compliance may include receiving policy information for a snapshot policy associated with a storage group of logical devices; receiving snapshot information regarding snapshots taken of the storage group during a time period denoting an amount of time corresponding to the retention time for the storage group; determining, based on the snapshot creation interval of the snapshot policy, a timeline of expected policy runtimes denoting different points in time at which the snapshot policy is scheduled to run to take a snapshot of the storage group; analyzing the snapshot information and the timeline to determine a number of valid snapshots of the storage group; and determining a compliance level for the time period based on the number of valid snapshots of the storage group and at least one compliance threshold.
Brian O'Halloran, Siobhan McLoughlin
Filed: 12 Sep 19
Utility
Storage system with module affinity link selection for synchronous replication of logical storage volumes
17 Aug 21
An apparatus includes a processing device comprising a processor and a memory.
Xiangping Chen, David Meiri
Filed: 1 Jun 20