4565 patents
Page 29 of 229
Utility
Methods, systems, and computer readable mediums for implementing a data protection policy for a transferred enterprise application
28 Feb 23
Methods, systems, and computer readable mediums for logically remediating infrastructure resource components are disclosed.
Gregory Lawrence Smith, Michael Barcello
Filed: 31 Aug 20
Utility
Transient software error handling in a distributed system
28 Feb 23
A method for use in a storage system is disclosed, comprising: receiving, at a first server in the storage system, a given block layer request for reservation of a storage resource, by the first server, an identifier corresponding to the given block layer request; performing a search of a database to detect whether the given block layer request has been completed, the search being performed by the first server, the search being performed based on the identifier corresponding to the given block layer request; when the database indicates that the given block layer request has not been completed: completing the given block layer request and transmitting a notification that the given block layer request is completed; and when the database indicates that given block layer request has been completed, re-transmitting a notification that the given block layer request is completed.
Yuval Harduf, Chen Reichbach, Shulamit Katz
Filed: 9 Oct 19
Utility
Message-less B2B transaction processing
28 Feb 23
A method is provided for recording purchase transactions, including: receiving a purchase order request that is associated with a purchase order, the purchase order request being received from a purchaser-side system, the purchase order request including purchase information identifying a product, a product quantity, and a first order identifier that is assigned to the purchase order by the purchaser-side system; generating a transaction document in response to the purchase order request, including the purchase information into the transaction document, and recording the transaction document in a document sharing platform or shared cryptographically protected ledger; and progressively updating the transaction document with information provided by the purchaser-side system and a seller-side system as the purchase order is being fulfilled, wherein each update to the transaction document is recorded in the cryptographically protected ledger.
Donal Carpenter, Carlos Martins Rodrigues, Tomislav Lokas
Filed: 1 Feb 19
Utility
Secure approval chain for runtime protection
28 Feb 23
A secure approval chain for runtime protection is disclosed.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 13 Oct 20
Utility
Digital twin architecture for multi-access edge computing environment
28 Feb 23
Techniques are disclosed for generating a virtual representation (e.g., one or more digital twin models) of a multi-access edge computing system environment, and managing the multi-access edge computing system environment via the virtual representation.
Danqing Sha, Zhen Jia, Kenneth Durazzo, Min Zhao, Anzhou Hou, Bin He
Filed: 20 Jul 21
Utility
Adaptive re-keying in a storage system
28 Feb 23
Techniques for adaptive re-keying of encrypted data are provided.
Xuan Tang, Marion Meirlaen
Filed: 4 Jun 19
Utility
Two-way secure channels with certification by one party
28 Feb 23
Two-way secure channels are provided between two parties to a communication with certification being provided by one party.
Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
Filed: 7 Apr 21
Utility
Method, electronic device and computer program product for storage management
28 Feb 23
Techniques for storage management involve: receiving, at a storage server, an access request for target data from a client, wherein the access request occurs in a session between the storage server and the client; determining, based on attribute information of the client, security information of the session, wherein the security information indicates whether the session is subjected to antivirus protection; and executing, based on the security information, an access operation specified by the access request on the target data.
Ying Yu, Jing Li, Ming Yue, Jia Huang, Nan Wang
Filed: 27 Jan 21
Utility
Singular control path for mainframe storage
28 Feb 23
Providing TCP/IP control commands to a storage system includes intercepting TCP/IP data provided on a TCP/IP network, determining if the TCP/IP data corresponds to a control command directed to the storage system, and converting the TCP/IP data to a Fibre Channel control command that is forwarded to the storage system if the TCP/IP data is a control command directed to the storage system.
Douglas E. LeCrone, Brett A. Quinn
Filed: 27 Jan 21
Utility
Apparatus for housing storage processor, and storage server
28 Feb 23
An apparatus for housing a storage processor includes first and second side portions each extending in a plane defined by a first direction and a second direction, and separated from each other in a third direction; first and second flapper components disposed between the first side portion and the second side portion, extending in a first plane and a second plane, respectively, and rotatable about a first axis and a second axis, respectively, the first flapper component coupled to the first side portion and having a first end face, the second flapper component coupled to the second side portion and having a second end face; and first and second magnetic components disposed in the first end face and the second end face, respectively, and configured to be coupled to each other by a magnetic force so as to couple the first end face to the second end face.
Aiqin Liu, Xu Chen
Filed: 31 Mar 20
Utility
Electronic equipment that provides multi-function slots
28 Feb 23
An electronic equipment assembly has an interconnect including columns of signal conductors, connectors mounted to the columns of signal conductors, and a chassis coupled with the interconnect.
Kunzheng Zhang, Sandburg Hu, Aric Hadav, Xiang Yu, Yuxin Chen
Filed: 22 Apr 21
Utility
Techniques for role assignment of components of a distributed application
21 Feb 23
The role of a node component of a distributed application may be changed without the need to terminate a current OS process implementing the node component.
Bathulwar Akash, Piyush Tibrewal, Aditya Sriram Mattaparthi, Suprava Das
Filed: 29 Jan 21
Utility
Method, device and computer program product for storing data
21 Feb 23
Embodiments of the present disclosure provide a method, device and computer program product for storing data.
Jingrong Zhao, Yi Wang
Filed: 30 Apr 20
Utility
System and method for file system metadata file region segmentation for deduplication
21 Feb 23
A method for managing file based backups (FBBs) includes obtaining, by a backup agent, a backup request for a FBB, in response to the backup request, generating a FBB, generating a FBB metadata file corresponding to the FBB, wherein the FBB metadata file comprises a set of attribute regions, performing, using the set of attribute regions, a deduplication on the FBB metadata file to obtain a deduplicated FBB metadata file, and storing the deduplicated FBB metadata file in a backup storage system.
Shelesh Chopra, Sunil Yadav, Aaditya Rakesh Bansal, Ravi Vijayakumar Chitloor, Manish Sharma
Filed: 25 May 21
Utility
Method, device, and computer program for storing index values of monitored objects
21 Feb 23
Index values of monitored objects are stored.
Min Gong, Yi Shang
Filed: 5 Mar 21
Utility
Configuring unused SCM memory space to support namespaces based on IO patterns
21 Feb 23
Techniques for configuring unused memory into namespaces based on determined attributes of incoming input/output (IO).
Parmeshwr Prasad, Bing Liu, Rahul Deo Vishwakarma
Filed: 23 Aug 21
Utility
N-way active-active storage configuration techniques
21 Feb 23
A stretched volume may be configured from N volumes of N data storage systems configured as a cluster.
David Meiri, Xiangping Chen
Filed: 6 Jul 21
Utility
Centralized high-availability flows execution framework
21 Feb 23
Techniques for providing a framework for handling execution of HA flows in an active-active storage node configuration.
Inna Reznik, Ahia Lieber, Eran Banin
Filed: 20 Jan 21
Utility
Adaptation of resource allocation for multiple workloads using interference effect of resource allocation of additional workloads on performance
21 Feb 23
Techniques are provided for adaptive resource allocation for multiple workloads.
Tiago Salviano Calmon, VinÃcius Michel Gottin, Eduardo Vera Sousa
Filed: 28 Jun 19
Utility
Deployment of services with dependencies
21 Feb 23
Metadata includes runtime dependencies for services that form an application.
Roger Che, Zak Liang, James Morton, Lihui Su, Ming Zhang
Filed: 2 Jun 21