4565 patents
Page 28 of 229
Utility
Method, electronic device and computer program product for managing cache
28 Feb 23
Techniques for cache management involve accessing, when a first data block to be accessed is missing in a first cache, the first data block from a storage device storing the first data block; selecting, when the first cache is full and based on a plurality of parameters associated with a plurality of eviction policies, an eviction policy for evicting a data block in the first cache from the plurality of eviction policies, the plurality of parameters indicating corresponding possibilities that the plurality of eviction policies are selected; evicting a second data block in the first cache to a second cache based on the selected eviction policy, the second cache being configured to record the data block evicted from the first cache; and caching the accessed first data block in the first cache.
Shuo Lv, Ming Zhang
Filed: 26 Oct 20
Utility
Method, device and computer program product for managing storage spaces
28 Feb 23
Techniques to manage storage spaces involve: determining an allocation rate of a storage pool based on a size of a storage space of the storage pool and sizes of allocated spaces for file systems from the storage space; determining a threshold allocation rate of the storage pool based on the size of the storage space of the storage pool; in accordance with a determination that the allocation rate of the storage pool is greater than the threshold allocation rate, determining a target file system from the file systems based on sizes of unused portions of the allocated spaces for the file systems; and releasing an unused portion of an allocated space for the target file system.
Chaojun Zhao, Hongyuan Zeng, Kai Li, Shuangshuang Liang
Filed: 22 Jul 20
Utility
File layer to block layer communication for selective data reduction
28 Feb 23
A method performed by a block-storage server, of storing data is described.
Sorin Faibish, Philippe Armangau, Ivan Bassov, Istvan Gonczi
Filed: 31 Jul 19
Utility
Processing device configured for efficient generation of data reduction estimates for combinations of datasets
28 Feb 23
An apparatus in one embodiment comprises at least one processing device comprising a processor coupled to a memory.
Anton Kucherov, David Meiri
Filed: 29 May 18
Utility
Destination file copying and error handling
28 Feb 23
Object service receives communication of fingerprints stream, corresponding to file segments, from file source, and identifies sequential fingerprints in fingerprints stream as fingerprints group.
Philip Shilane, Abhinav Duggal, George Mathew
Filed: 4 Oct 21
Utility
Smart data offload sync replication
28 Feb 23
Xiangping Chen, David Meiri
Filed: 23 Sep 20
Utility
System and method for managing sensitive data
28 Feb 23
A backup manager for providing backup services includes persistent storage and a backup orchestrator.
Shelesh Chopra, Manish Sharma, Aaditya Rakesh Bansal, Sunil Yadav
Filed: 30 Oct 19
Utility
Online error recovery
28 Feb 23
A technique for correcting errors in a data storage system operates while the data storage system remains online.
Alex Soukhman, Uri Shabi
Filed: 23 Jul 21
Utility
Method, device, and program product for managing spare block based on dynamic window
28 Feb 23
Techniques manage spare extents based on a dynamic window.
Chi Chen, Huijuan Fan
Filed: 17 Sep 21
Utility
Cross-stream transactions in a streaming data storage system
28 Feb 23
The described technology is generally directed towards cross-stream transactions in a streaming data storage system, which allows a writer application to commit multiple events to distinct data streams in a single transaction.
Mikhail Danilov, Yohannes Altaye
Filed: 11 May 21
Utility
Distributed raid rebuild
28 Feb 23
A technique is disclosed for generating rebuild data of a RAID configuration having one or more failed drives.
Lior Kamran, Amitai Alkalay
Filed: 19 Jan 21
Utility
Storage system having RAID stripe metadata
28 Feb 23
A processing device obtains a write operation which comprises first data and second data to be stored in first and second strips of a given stripe.
Yosef Shatsky, Doron Tal, Rivka Matosevich
Filed: 20 Jan 21
Utility
Method and system for generating immutable backups with configurable retention spans
28 Feb 23
In general, the invention relates to a method for performing backup operations.
Navneet Upadhyay, Rejith Mohan M, Shraddha Chunekar, Amith Ramachandran, Shelesh Chopra, Reshmee Jawed
Filed: 5 Feb 20
Utility
Method, device, and computer program product for managing file system
28 Feb 23
Techniques for managing a file system involve in response to receiving, at a first backup device of the file system, a request for replicating data of the file system from the first backup device to a second backup device of the file system, determining a synchronization state between the first backup device and the file system, the second backup device being a backup device located downstream of the first backup device; creating, based on the synchronization state, a target snapshot associated with the file system; and causing the data to be replicated from the first backup device to the second backup device based on the target snapshot.
Qinghua Ling, Yifeng Lu, Yue Qian
Filed: 20 May 20
Utility
System and method for ensuring compliance of protection policy requirements using visual representation of backups
28 Feb 23
A backup manager for managing backup services includes persistent storage and a backup analyzer.
Asif Khan, Amith Ramachandran, Amarendra Behera, Deepika Nagabushanam, Ashish Kumar, Pati Mohan, Tushar Dethe, Himanshu Arora, Gururaj Soma, Sapna Chauhan, Soumen Acharya, Reshmee Jawed, Yasemin Ugur-Ozekinci, Shelesh Chopra, Navneet Upadhyay, Shraddha Chunekar
Filed: 1 Nov 19
Utility
Methods for backup and recovery
28 Feb 23
Methods for backup and recovery are disclosed.
Mengze Liao, Lihui Su, Weiyang Liu, Yun Zhang, Yujun Liang
Filed: 23 Apr 21
Utility
Predictive scheduled anti-virus scanning
28 Feb 23
Implementations are provided herein for systems, methods, and a non-transitory computer product configured to use predictive analysis of quantifiable parameters associated with individual files stored on a distributed file storage system.
Abhijit Toley, Sachin Bochare
Filed: 24 Jul 18
Utility
Decentralized data protection system for multi-cloud computing environment
28 Feb 23
In a multi-cloud computing environment comprising a plurality of cloud platforms with each cloud platform comprising one or more nodes, a method maintains a decentralized metadata database framework, wherein each node comprises a decentralized metadata database component operatively coupled to each other decentralized metadata database component of the framework and wherein each of at least two of the decentralized metadata database components stores a set of metadata records corresponding to protected data stored across the plurality of cloud platforms.
Pengfei Wu, Kun Wang, Stephen J. Todd, Assaf Natanzon
Filed: 23 Apr 18
Utility
Method, apparatus and computer program product for managing data access
28 Feb 23
In response to receiving a read request for target data, an external address of the target data is obtained from the read request, which is an address unmapped to a storage system; hit information of the target data in cache of the storage system is determined based on the external address; and based on the hit information, an address from the external address and an internal address for providing the target data is determined.
Ruiyong Jia, Jibing Dong, Baote Zhuo, Chun Ma, Jianbin Kang
Filed: 24 Sep 19
Utility
Anomaly-based retention policies for snapshot-based data protection systems
28 Feb 23
One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
Filed: 10 Nov 21