4565 patents
Page 16 of 229
Utility
Method for dynamic pseudofs creation and management in a network filesystem
18 Jul 23
One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs.
Robert L. Fair, Thomas R. Vanderputten
Filed: 17 May 22
Utility
File level incremental continuous data protection
11 Jul 23
Creating point-in-time versions of files for applications at a storage system includes maintaining at the storage system a data structure correlating each of a plurality of applications with files for each of the applications and correlating each of the files with portions of the data storage system, using the data structure to determine specific files for a particular one of the applications for which a point-in-time version is being created, using the data structure to determine specific portions of the storage system corresponding to the specific files, suspending writes to the specific portions, completing previous writes to the specific portions following suspending writes, and performing a snapshot of the specific files following completing previous writes.
Brett A. Quinn, Douglas E. LeCrone
Filed: 29 Oct 20
Utility
Method, electronic device, and computer program product for processing data
11 Jul 23
Embodiments of the present disclosure relate to processing data.
Pengfei Su, Lu Lei, Julius Jian Zhu
Filed: 30 Apr 21
Utility
Data deduplication (dedup) management
11 Jul 23
Aspects of the present disclosure relate to data deduplication (dedup) techniques for storage arrays.
Ramesh Doddaiah
Filed: 26 Oct 20
Utility
Method to provide recommendations for cloud storage providers and storage classes based on backup server's usage patterns for lowering overall cloud costs
4 Jul 23
A method, apparatus, and system determines an optimal storage configuration of storing backup data.
Jagannathdas Rath, Kalyan C Gunda
Filed: 3 Jun 21
Utility
Machine learning to improve caching efficiency in a storage system
4 Jul 23
A system and method improve caching efficiency in a data storage system by performing machine learning processes on metadata relating to extents of data blocks, rather than individual blocks themselves.
Vamsi Vankamamidi, Shaul Dar
Filed: 29 Apr 21
Utility
Device protection using configuration lockdown mode
4 Jul 23
Techniques are provided for device protection using a configuration lockdown mode.
Tomer Shachar, Yevgeni Gehtman, Maxim Balin
Filed: 27 Nov 20
Utility
Data protection via commutative erasure coding in a geographically diverse data storage system
4 Jul 23
Commutative coding in a geographically diverse data storage system is disclosed.
Mikhail Danilov, Igor Medvedev
Filed: 28 Oct 20
Utility
Techniques for command execution using a state machine
4 Jul 23
Techniques for processing a request may include: providing tasks to a state machine framework, wherein the tasks perform processing of a workflow for servicing the request; generating, by the state machine framework, a state machine for processing the request, wherein the state machine includes states associated with the tasks, wherein generating the state machine may include automatically determining a first state transition of the state machine between a first and a second of the states; receiving the request; and responsive to receiving the request, performing first processing using the state machine to service the request.
Daniel K. O'Reilly, Jr., Matthew P. Jean, Michael J. Burns
Filed: 11 Sep 20
Utility
Method to optimize restore based on data protection workload prediction
4 Jul 23
An intelligent method of selecting a data recovery site upon receiving a data recovery request.
Bing Liu, George Mathew
Filed: 13 Aug 20
Utility
Method and system for a fast adaptation for image segmentation for autonomous edge vehicles
4 Jul 23
A method includes obtaining, by a local data system manager of a local data system of the local data systems, a portion of unlabeled data from a local data source, performing, using a domain classifier in the local data system manager, a domain classification analysis on the portion of the unlabeled data to identify a domain of the unlabeled data, making a first determination, based on the domain classification, that the domain classification has significantly varied from a previous domain, based on the first determination: performing an adaptive procedure on a local data system image segmentation model to obtain an adapted image segmentation model, and performing a domain reclassification on the domain classifier to obtain an updated domain classifier, and implementing the adapted image segmentation model on the local data system.
Pablo Nascimento da Silva, Hugo de Oliveira Barbalho
Filed: 12 Mar 21
Utility
Facilitating outlier object detection in tiered storage systems
4 Jul 23
Facilitating outlier object detection in tiered storage systems is provided herein.
Xin Wu, Jignesh Bhadaliya, Min Gong, Meng Wang, Minglong Sun
Filed: 27 Dec 19
Utility
Managing IO path bandwidth
4 Jul 23
Bandwidth consumption for IO paths between a storage system and host may be managed.
James Davidson, Alan Rajapa, Scott Rowlands, Igor Fradkin, Arieh Don
Filed: 13 Jul 20
Utility
Data deduplication latency reduction
27 Jun 23
Aspects of the present disclosure relate to reducing the latency of data deduplication.
Venkata Ippatapu, Ramesh Doddaiah, Sweetesh Singh
Filed: 22 Jul 21
Utility
Using machine learning to detect system changes
27 Jun 23
Techniques for detecting state changes in a system may include receiving a first neural network that is trained to detect when the system transitions into a first resulting state, wherein the system transitions into at least a first intermediate state prior to transitioning into the final resulting state; training the first neural network using a first plurality of inputs denoting the system in the first intermediate state; obtaining a plurality of sets of internal state information of the first neural network, each set of the plurality of sets denoting an internal state of the first neural network at a different point in time after the first neural network has processed at least a portion of the first plurality of inputs; and training a second neural network, using the plurality of sets of internal state information, to detect the first intermediate state.
Sorin Faibish, James M. Pedone, Jr., Philippe Armangau
Filed: 30 Apr 19
Utility
Pipeline-based system for configuration checking and reporting associated with an information processing system
27 Jun 23
Pipeline-based techniques for system configuration management are provided.
Anurag Sharma, Sujayendra Thammaiah, Christopher Trudel, John Moran, Ramesh Ramanathan, Ranjini Gogga, Sunil Bhaskarnaidu
Filed: 14 Oct 20
Utility
Leveraging data in data marketplace environment
27 Jun 23
Techniques for leveraging data in a data marketplace environment are provided.
Stephen J. Todd
Filed: 29 Jan 19
Utility
Tiered persistent memory allocation
27 Jun 23
The present disclosure relates to one or more memory management techniques.
Owen Martin, Michael Scharland, Earl Medeiros, Parmeshwr Prasad
Filed: 27 Jan 21
Utility
Self-adaptive copy retention management
27 Jun 23
A current retention mode is identified as being one of conservative or aggressive.
Mengze Liao, Scott Quesnelle, Yasemin Ugur-Ozekinci, Jin Ru Yan, Mike Xiaoliang Zhu
Filed: 21 Apr 21
Utility
Data size and time based replication
27 Jun 23
Techniques are provided for data size and time based replication.
Shiv S. Kumar, Jai P. Gahlot
Filed: 5 Oct 20