4565 patents
Page 14 of 229
Utility
Client-side compression
8 Aug 23
A method of sending blocks of data from a client to be stored at a storage server, wherein for each block compression and encryption is performed at the client, and deduplication is performed at the server.
Senthil Ponnuswamy, Charles W. Kaufman, Radia J. Perlman
Filed: 2 Dec 20
Utility
Path management and failure prediction using target port power levels
8 Aug 23
Techniques are provided for path management and failure prediction in a multipath environment using target port power levels.
Joseph G. Kanjirathinkal, Peniel Charles, Owen Crowley
Filed: 13 Oct 20
Utility
Managing I/O connections using virtual host ports
8 Aug 23
Bandwidth consumption and/or an I/O transmission rate on an I/O path between a port of a storage system and a physical host port may be managed, including determining when multiple virtual host ports correspond to (i.e., are mapped to) a same physical host port.
Krishna Deepak Nuthakki, Arieh Don, Erik P. Smith
Filed: 30 Oct 20
Utility
Temporary partial authentication value provisioning for offline authentication
8 Aug 23
Methods, apparatus, and processor-readable storage media for temporary partial authentication value provisioning for offline authentication are provided herein.
Piers Bowness, Salah E. Machani
Filed: 28 Jan 19
Utility
Automatically discovering and securely identifying connected systems
8 Aug 23
Methods, apparatus, and processor-readable storage media for automatically discovering and securely identifying connected systems are provided herein.
Anurag Sharma, Maunish A. Shah, Senthil Ponnuswamy
Filed: 14 Jan 21
Utility
Method for protecting edge device trust score
8 Aug 23
One example method includes correlating trust scoring with authentication levels.
Mohamed Sohail, Robert A. Lincourt, Said Tabet
Filed: 31 Dec 20
Utility
Decentralized and distributed continuous replication system for moving devices
8 Aug 23
A replication system for data of mobile devices is disclosed.
Assaf Natanzon, Kfir Wolfson, Jehuda Shemer
Filed: 10 Feb 22
Utility
Framework to quantify security in DevOps deployments
8 Aug 23
Techniques for providing a framework that quantifies security in DevOps deployments.
Mahadevan Vasudevan, Hanumesh Jojode
Filed: 12 Jan 21
Utility
Method, electronic device, and computer program product for managing operating system
1 Aug 23
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for managing an operating system.
Chenxi Hu, Rui Song
Filed: 24 Nov 21
Utility
Dynamic selective filtering of persistent tracing
1 Aug 23
An apparatus comprises at least one processing device that includes a processor coupled to a memory.
Xiangping Chen, David Meiri
Filed: 17 Jun 21
Utility
Escalated authentication system to perform an integrity-check based on behavior patterns
1 Aug 23
Aspects of the disclosure include an escalated authentication system based on user behavior patterns.
Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu, Srinath Kappgal
Filed: 6 Apr 21
Utility
Credential manager with account selection and resource load-balancing
1 Aug 23
The described technology is generally directed towards managing accounts for connecting applications to (e.g., third party) cloud storage providers.
Wyatt Tischler
Filed: 14 Oct 20
Utility
Using sparse merkle trees for smart synchronization of S3
25 Jul 23
One example method, which may be performed in connection with an object store, includes receiving a key of a key-value pair, correlating the key to a location in a base of a Merkle tree, inserting the key at the location, hashing the value associated with the key to produce a data hash, and inserting the data hash in the Merkle tree.
Alex Solan, Jehuda Shemer
Filed: 29 Jan 20
Utility
Smart de-fragmentation of file systems inside VMS for fast rehydration in the cloud and efficient deduplication to the cloud
25 Jul 23
One example method includes chunking a respective disk of each of a plurality of virtual machines (VM) to create a respective plurality of chunks associated with each of the VMs, creating, based on the chunking process, a cluster comprising one or more of the VMs, creating a VM template whose data and disk structure match respective data and disk structures of each of the VMs in the cluster, and in response to a file operation involving a first one of the VM disks, defragmenting the first VM disk so that a disk structure of the first VM disk is the same as a disk structure of the VM template.
Assaf Natanzon, David Zlotnick, Boris Shpilyuck
Filed: 10 Feb 21
Utility
Non-disruptive firmware upgrade of symmetric hardware accelerator systems
25 Jul 23
In a symmetric hardware accelerator system, an initial hardware accelerator is selected for an upgrade of firmware.
Tao Chen, Yong Zou, Ran Liu
Filed: 14 Jun 21
Utility
Method, device, and program product for managing storage pool of storage system
25 Jul 23
Storage devices in a pool are divided into at least one group with a first number of storage devices in an existing group not higher than a range.
Huijuan Fan, Chi Chen
Filed: 15 Mar 21
Utility
Optimized client-side deduplication
25 Jul 23
One example method includes optimizing client-side deduplication.
Jehuda Shemer, Maxim Drobachevsky, Zion Drori
Filed: 1 Oct 21
Utility
Managing datapath validation on per-transaction basis
25 Jul 23
A technique for managing a datapath of a data storage system includes receiving a request to access target data and creating a transaction that includes multiple datapath elements in a cache, where the datapath elements are used for accessing the target data.
Vamsi K. Vankamamidi, Geng Han, Xinlei Xu, Philippe Armangau, Vikram Prabhakar
Filed: 29 May 20
Utility
Method, device and computer program for data storage
25 Jul 23
Techniques involve: selecting a stream from a plurality of streams having respective update frequencies, the update frequency of the selected stream matching an update frequency of to-be-written data; determining a label of the data based on a label of the selected stream; and sending a write request for the data to a storage system, the write request comprising the label of the data, so that the storage system performs a write operation for the data based on the stream identified by the label.
Shuo Lv, Leihu Zhang
Filed: 18 Sep 20
Utility
Scheduling storage system tasks to promote low latency and sustainability
25 Jul 23
A technique for scheduling access to a resource arranges tasks into multiple classes, where each class has a respective share and a respective priority.
Vladimir Shveidel, Ronen Gazit
Filed: 14 Jan 21