4565 patents
Page 21 of 229
Utility
Techniques for rendering a table spanning multiple pages
9 May 23
Techniques for processing a data set include: partitioning the data set into portions each including rows of data of the data set, a different one of the portions is included in a different one of a pages of a table, and rendering the pages of the table.
Ronan Dowd, Robert Fitzgerald, Micheal Walsh
Filed: 12 Aug 19
Utility
Garbage collection integrated with physical file verification
9 May 23
System generates data structure based on unique identifiers of objects in storages and sets indicators in positions corresponding to hashes of unique identifiers of objects.
Ramprasad Chinthekindi, Abhinav Duggal
Filed: 26 Oct 18
Utility
Analyzing cloud backup service options using historical data protection activities
9 May 23
Historical activity data about backups and restorations are retrieved.
Ivan Martynov
Filed: 28 Jun 19
Utility
Logical storage device access in an encrypted storage environment
2 May 23
A method comprises associating a first logical storage device with a first host device, wherein data encrypted using a private key of the first host device is written to the first logical storage device, generating a copy of the first logical storage device, associating the copy of the first logical storage device with a second logical storage device, wherein data encrypted using a private key of a second host device is written to the second logical storage device, and providing the second host device with access to an encrypted version of a public key of the first host device, encrypted using a public key of the second host device, to allow the second host device to obtain the public key of the first host device.
Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 17 Feb 21
Utility
VM protection with true zero RTO
2 May 23
One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 21 Jul 21
Utility
Providing non-volatile storage for permanent data to virtual machines
2 May 23
One or more aspects of the present disclosure relate to allocating virtual memory to one or more virtual machines (VMs).
Serge Pirotte, John Krasner, Chakib Ouarraoui, Mark Halstead
Filed: 27 Aug 19
Utility
Method for migrating data in a raid system having a protection pool of storage units
2 May 23
A method of performing a migration of a physical extent in a redundant array of independent disks (RAID) storage system with a protection pool of storage units includes identifying a first physical extent of a first physical disk to be migrated to a second physical disk, wherein the first physical extent is associated with an array of physical extents distributed across physical disks of a storage cluster.
Paul Nehse, Michael B. Thiels, Devendra V. Kulkarni
Filed: 6 May 21
Utility
Bulk file verification
2 May 23
Systems and methods for verifying files in bulk in a file system.
Abhinav Duggal, Tony Wong
Filed: 17 Aug 21
Utility
Probabilistic model for file-specific compression selection under SLA-constraints
2 May 23
One example method includes file specific compression selection.
Rômulo Teixeira de Abreu Pinho, Vinicius Michel Gottin, Joel Christner
Filed: 12 Mar 21
Utility
System and method for an estimation of application upgrades using a device emulation system of a customer environment
25 Apr 23
A method for managing a client environment includes obtaining, by a device emulation orchestration engine in an emulation system, an upgrade estimation time request associated with an application upgrade, in response to the upgrade estimation time request: performing a device emulation container analysis to determine a client device that requires the application upgrade, wherein the client device executes in the client environment, initiating an upgrade emulation using a device emulation container corresponding to the client device, obtaining, from a device emulation agent executing in the device emulation container, an upgrade estimation, and providing the upgrade estimation to the application upgrade monitoring agent.
Parminder Singh Sethi, Lakshmi Nalam, Vasanth DS, Shelesh Chopra
Filed: 27 Jul 21
Utility
Method, device, and computer program product for managing processes based on reading speed of a message queue
25 Apr 23
Method, device, and computer program product for managing processes are disclosed.
Jun Tang, Wei Wang
Filed: 26 Feb 20
Utility
Method, electronic device, and computer program product for training failure analysis model
25 Apr 23
Embodiments of the present disclosure include a method, an electronic device, and a computer program product for training a failure analysis model.
Jiacheng Ni, Min Gong, GuangZhou Zhou, Zijia Wang, Zhen Jia
Filed: 8 Dec 21
Utility
Data encryption for directly connected host
25 Apr 23
A storage system may assign a different encryption key to each logical storage unit (LSU) of a storage system.
Seema G. Pai, Gabriel Benhanokh, Ian Wigmore, Arieh Don, Alesia A. Tringale
Filed: 15 Jan 20
Utility
Deferred reclamation of invalidated entries that are associated with a transaction log in a log-structured array
25 Apr 23
A storage control system is configured to obtain first data associated with a logical data device and to store the first data in a first entry of a log-structured array.
Dan Aharoni, Itay Keller, Sanjay Narahari, Ron Stern
Filed: 3 Aug 20
Utility
Mechanism for multi-factor authentication based on data
25 Apr 23
A request is received from a client seeking to access files stored at a backup server.
Yossef Saad, Itay Glick
Filed: 4 Aug 20
Utility
Probabilistic model for file-specific compression selection under SLA-constraints
25 Apr 23
One example method includes file specific compression selection.
Rômulo Teixeira De Abreu Pinho, Vinicius Michel Gottin, Joel Christner
Filed: 30 Jun 21
Utility
Method for distributing virtual visual content
25 Apr 23
Embodiments of the present disclosure provide a method for distributing virtual visual content, including: sending a first content portion in virtual visual content to be interacted in user equipment to a plurality of edge devices; selecting at least one edge device from the plurality of edge devices; and sending a second content portion in the virtual visual content to the selected at least one edge device, the second content portion having a higher change rate than the first content portion in the interaction.
Zhen Jia, Danqing Sha, Bin He
Filed: 27 Jan 21
Utility
Dynamic generation of cloud platform application programming interface calls
18 Apr 23
An apparatus comprises a processing device configured to receive a request to execute an action on cloud assets of a cloud platform utilizing an application programming interface (API) exposed by the cloud platform, the request comprising a set of keyword arguments, and to generate a code class instance for the API.
David Williams
Filed: 30 Dec 21
Utility
Recovering a storage volume associated with a snapshot lineage from cloud storage
18 Apr 23
An apparatus comprises a processing device configured to identify a snapshot lineage comprising snapshots of a given storage volume, the snapshot lineage comprising (i) a local snapshot lineage stored on a storage system and (ii) a cloud snapshot lineage stored on cloud storage of at least one cloud external to the storage system, the cloud snapshot lineage comprising at least a subset of the snapshots of the given storage volume.
Michael Anthony, Anurag Bhatnagar, Shanmuga Anand Gunasekaran, Mark Aldred, David King
Filed: 10 Mar 20
Utility
Managing restore workloads using Weibull modulus
18 Apr 23
One example method includes determining a modulus such as a Weibull modulus for a recovery operation.
Keyur B. Desai, Dominick J. Santangelo
Filed: 23 Nov 20