4565 patents
Page 18 of 229
Utility
Method, device and computer program product for managing dedicated processing resources
30 May 23
A resource management method comprises: in response to receiving, from an application operating on a client, a resource allocation request indicating an amount of dedicated processing resources required by the application, acquiring a mapping between a group of physical dedicated processing resources provided by a group of servers and a group of logical dedicated processing resources, the group of physical dedicated processing resources being divided into the group of logical dedicated processing resources; determining allocation statuses of the group of logical dedicated processing resources; determining, based at least on the mapping and the allocation statuses, a first amount of logical dedicated processing resources to be allocated to the application from the group of logical dedicated processing resources; and indicating the first amount of logical dedicated processing resources to the application, to allow the application to utilize physical dedicated processing resources provided by at least one of the group of servers.
Layne Lin Peng, Junping Zhao, Wei Cui
Filed: 15 Apr 19
Utility
Method, electronic device, and computer program product for managing file system
30 May 23
A method, an electronic device, and a computer program product for managing a file system are provided.
Chaojun Zhao, Jia Huang, Hongyuan Zeng, Hao Wang, Mingyi Luo
Filed: 22 Oct 20
Utility
Method, device and computer program product for managing log
30 May 23
Techniques perform log management.
Naifeng Li, Jiajie Sun, Jun Wu, Zihao Jiang, Minggang Lu
Filed: 25 Mar 19
Utility
Fine-grained shared multi-tenant de-duplication system
30 May 23
In one example, a method includes receiving, at a cloud storage site, chunks that each take the form of a hash of a combination that includes two or more salts and a file object, and one of the salts is a retention salt shared by the chunks, monitoring a time period associated with the retention salt, when the time period has expired, removing the chunks that include the retention salt, and depositing the removed chunks in a deleted items cloud store.
Peter Marelas
Filed: 28 Oct 21
Utility
Redirecting access requests between access engines of respective disk management devices
30 May 23
Embodiments that process data are described.
Xiaochen Liu, Ao Sun
Filed: 30 Jun 21
Utility
Method, electronic equipment, and computer program product for managing backup data
30 May 23
A method, electronic device, and a computer readable medium for managing backup data that includes determining an expiration time of backup data in a data set to be backed up in a source storage device, and determines a priority of the backup data to be migrated in a migration operation to be performed based on the expiration time.
Yi Wang, Jun Tang, Qingxiao Zheng, Bing Liu
Filed: 25 Aug 21
Utility
Selection of computer system deployments to mock for testing
30 May 23
Systems and methods facilitating selection of computer system deployments to mock for testing are described herein.
Matthew Bryan
Filed: 22 Oct 20
Utility
Performing file-based time series management
30 May 23
A technique performs file-based time series management.
Alexander Rayev
Filed: 5 Jan 21
Utility
Post-processing global deduplication algorithm for scaled-out deduplication file system
30 May 23
A method, apparatus, and system for redistributing files in a multi-node storage system to improve global deduplication storage savings is disclosed.
Tony Wong, Abhinav Duggal, Smriti Thakkar, Yu Qiu, Pei Jie Sim, Rahul Nihalani
Filed: 17 Sep 20
Utility
Allocation of accelerator resources based on job type
30 May 23
A resource use method, an electronic device, and a computer program product are provided in embodiments of the present disclosure.
Jet Chen, Bing Liu
Filed: 30 Jun 20
Utility
Reducing false positive failure events in a health monitoring system using directional graphs
30 May 23
Embodiments for reducing panic shutdown of components in a pipelined data processing system.
Nitin Madan, Fani Jenkins, Deepa Ramesh, Gobikrishnan Sundharraj
Filed: 30 Jun 21
Utility
Cyber-related data recovery
30 May 23
Embodiments of the present disclosure include receiving one or more input/output (IO) requests at a storage array from a host device.
Brett Quinn, Doug Lecrone
Filed: 29 Oct 21
Utility
Method, device and computer program product for implementing file system
30 May 23
Techniques involve implementing a file system.
Shuo Lv, Ming Zhang
Filed: 8 Apr 20
Utility
Fine-grained shared multi-tenant de-duplication system
30 May 23
In one example, a method includes receiving, at a cloud storage site, chunks that each take the form of a hash of a combination that includes two or more salts and a file object, and one of the salts is a retention salt shared by the chunks, monitoring a time period associated with the retention salt, when the time period has expired, removing the chunks that include the retention salt, and depositing the removed chunks in a deleted items cloud store.
Peter Marelas
Filed: 28 Oct 21
Utility
Fine-grained shared multi-tenant de-duplication system
30 May 23
In one example, a method includes receiving, at a cloud storage site, chunks that each take the form of a hash of a combination that includes two or more salts and a file object, and one of the salts is a retention salt shared by the chunks, monitoring a time period associated with the retention salt, when the time period has expired, removing the chunks that include the retention salt, and depositing the removed chunks in a deleted items cloud store.
Peter Marelas
Filed: 28 Oct 21
Utility
Reliable virtual machine discovery and storage association
30 May 23
A technique of managing virtual volumes includes receiving, by a storage system, instructions to create specified virtual volumes in the storage system, the instructions including virtual volume metadata that identifies virtual machines to which the specified virtual volumes are assigned, and providing a database that associates such virtual volumes with the virtual machines identified by the virtual volume metadata.
Sergey Alexandrovich Alexeev, Alexey Vladimirovich Shusharin, Dmitry Nikolayevich Tylik, Fedor Kusov
Filed: 10 Mar 21
Utility
System and method for object detection
30 May 23
An information handling system for managing detection of objects includes a storage and a processor.
Vinicius Michel Gottin, Tiago Salviano Calmon, Paulo Abelha Ferreira
Filed: 28 Jan 21
Utility
Tracking a virus footprint in data copies
30 May 23
Techniques are provided for tracking a virus footprint in data copies.
Shiv S. Kumar, Jai P. Gahlot, Avadut Mungre
Filed: 15 Jan 21
Utility
Optimizing docker image encryption-tradeoff between performance and protection level
30 May 23
One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 30 Jun 22
Utility
Services using AI/ML to select virtual network functions and vendors for supplying the virtual network functions
30 May 23
The disclosed systems and methods are directed to a computer-implemented method for use in designing a service.
Sathish Kumar Bikumala, Vasile Radoaca, Deepak NagarajeGowda
Filed: 29 Jul 20