4565 patents
Page 135 of 229
Utility
Generating a data protection risk assessment score for a backup and recovery storage system
18 May 21
Described is a system and method that provides a data protection risk assessment for the overall functioning of a backup and recovery system.
Amihai Savir, Shai Harmelin, Anat Parush Tzur, Idan Levy, Roi Gamliel
Filed: 30 Dec 16
Utility
Multi-streaming with synthetic replication
18 May 21
According to one embodiment, a request is received to replicate a plurality of ranges of a source file from a source storage system to a target storage system, where the request specifies a first range of the source file and a second range of the source file.
Salil Dangi, Harshadrai Parekh
Filed: 29 Mar 16
Utility
Facial recognition for multi-stream video using high probability group and facial network of related persons
18 May 21
Techniques are provided for facial recognition using a high probability group database and a facial network of related persons.
Avitan Gefen, Amihai Savir, Omer Sagi
Filed: 1 May 19
Utility
Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application
18 May 21
Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application are disclosed.
Adrian John Sandham
Filed: 24 Jan 20
Utility
Method, device and computer program product for configuring service instance
18 May 21
Embodiments of the present disclosure relate to a method, a device and a computer program product for configuring service instances.
Yongsheng Guo, Ming Zhang, Mengze Liao, Raynor Zhang, Mike Zhu, Jing Yu
Filed: 30 Sep 19
Utility
RSA trusted networks: RSA packet frames for advanced networking switches
18 May 21
Embodiments are described for enhanced security in a switched network using RSA security between hops of a transmission path of a data frame from an origination node to a destination node, via one or more intervening switches.
Livingston Paul Delightson
Filed: 21 Jun 18
Utility
Secure data pools
18 May 21
Techniques for secure data management in a sensor data environment are provided.
Stephen J. Todd
Filed: 30 Nov 18
Utility
Host device with automated write throttling responsive to storage system write pressure condition
18 May 21
A host device comprises a processor coupled to a memory.
Sanjib Mallick, Krishna Deepak Nuthakki, Arieh Don
Filed: 20 May 20
Utility
Security module for auto-generating secure channels
18 May 21
A consolidated default security policy for a storage node is created by combining a system-wide default security policy with default security policies for multiple protocols and default security policies for multiple applications.
Venkata L. R. Ippatapu, Kenneth Dorman
Filed: 1 Nov 19
Utility
Remote service credentials for establishing remote sessions with managed devices
18 May 21
A method includes receiving an authentication request for a remote session between a managed device and a client device, the authentication request comprising an identifier of a user of the client device and a one-time remote service credential (RSC) passcode.
Ramakrishna Vakalapudi, Adel Hanna
Filed: 9 Jan 18
Utility
Host device with multi-path layer configured for detecting target failure status and updating path availability
18 May 21
A host device is configured to communicate over a network with a storage system comprising a plurality of storage devices.
Manikandan Sethuraman, Peniel Charles, Sanjib Mallick
Filed: 30 Sep 19
Utility
Resource allocation using restore credits
11 May 21
Systems and methods for allocating resources are disclosed.
Keyur B. Desai
Filed: 31 Mar 20
Utility
Method, apparatus and computer program product for executing an application in clouds
11 May 21
Embodiments of the present disclosure provide a method, apparatus and computer program product for executing an application in clouds.
Fei Chen, Fucai Liu, Kun Wang
Filed: 7 Mar 19
Utility
Methods and apparatus for protecting against suspicious computer operations using multi-channel protocol
11 May 21
Techniques are provided for preventing suspicious computer operations using a multi-channel protocol.
Boris Kronrod, Ayelet Biger-Levin, Maor Franco
Filed: 23 Sep 16
Utility
Moving target defense with network level changes providing substantially continuous access to applications
11 May 21
Network level Moving Target Defense techniques are provided with substantially continuous access to protected applications.
Amos Zamir, Oron Golan, Jehuda Shemer, Kfir Wolfson
Filed: 28 Sep 18
Utility
Method, device and computer program product for data processing
11 May 21
A data processing method comprises: receiving a data packet related to a service.
Zhi Ying, Pengfei Wu, Kun Wang
Filed: 24 May 19
Utility
Configuration system and method for an integrated computing system
11 May 21
An integrated computing system configuration system includes a computing system that executes an application to receive one or more user selected design elements (DEs) associated with a customized integrated computing system configuration in which each user selected DE includes abstracted information of a component used in a customized integrated computing system represented by the customized integrated computing system configuration.
Jeffery J. Hayward
Filed: 16 Dec 19
Utility
Resource allocation using distributed segment processing credits
11 May 21
Systems and methods for allocating resources are disclosed.
Keyur B. Desai
Filed: 8 Oct 18
Utility
Web content transfer utilizing messages of messaging protocol of cellular voice network
11 May 21
An apparatus includes at least one processing device including a processor coupled to a memory.
Shubham Gupta
Filed: 30 Dec 19
Utility
Data storage system with processor scheduling using distributed peek-poller threads
11 May 21
A method of multitasked operation of a data storage node includes executing provider threads of an application, the provider threads distributed among processing cores along with respective peek-poller threads, each provider thread having regular operations of (1) continually polling interfaces of the data storage node for application events requiring processing, and (2) performing processing tasks for the application events until there are no unprocessed additional events for the provider thread, and thereupon entering a sleep state.
Lior Kamran, Amitai Alkalay
Filed: 24 Jul 19