4565 patents
Page 3 of 229
Utility
Methods, systems, and computer readable mediums for securely establishing credential data for a computing device
12 Dec 23
Methods, systems, and computer readable mediums for securely establishing credential data for a computing device are disclosed.
Jonathan Peter Streete, Christopher Michael Davis
Filed: 21 Aug 20
Utility
NANON support for antivirus jobs in clustered storage
12 Dec 23
Techniques can be implemented to provide for antivirus scanning in clustered storage where not all nodes of the cluster are connected to an antivirus server.
Terry Stokes, Teng Hong, Antony Richards
Filed: 8 Apr 21
Utility
Methods and systems for differential based backups
5 Dec 23
Techniques described herein relate to a method for generating synthetic full backups.
Shraddha Chunekar, Navneet Upadhyay, Deepthi Urs, Sunder Ramesh Andra, Amith Ramachandran, Adrian Dobrean
Filed: 30 Sep 21
Utility
Forwarding incoming IO to SCM namespaces
5 Dec 23
Techniques for intelligently routing IO to a storage class memory (SCM) namespace are disclosed.
Bing Liu, Parmeshwr Prasad, Rahul Deo Vishwakarma
Filed: 12 Jul 21
Utility
Method and system for the engramic indexing of information technology infrastructure
5 Dec 23
A method and system for engramic indexing of information technology (IT) infrastructure.
Jiale Huo, Brad Corey Maltz, Hanna Yehuda, Nicole Reineke, Charles Joseph Williams
Filed: 31 Jan 20
Utility
Continuous replication and granular application level replication
5 Dec 23
A containerized environment and application that are configured for component specific continuous replication and granular application level application.
Assaf Natanzon, Luay Al-Alem, Antony Bett, Michael Rhodes
Filed: 19 Aug 21
Utility
Blockchain technology for regulatory compliance of data management systems
5 Dec 23
One example method includes performing a data management transaction, such as a data read operation, a data write operation, or a data delete operation, generating transaction metadata relating to the data management transaction, transmitting the transaction metadata to a blockchain network, and receiving, from the blockchain network, confirmation that the transaction metadata has been stored in a distributed ledger associated with the blockchain network.
David Zlotnick, Natali Gaash, Roi Wexler, Aviad Yisrael Gispan, Inbar Helbitz
Filed: 16 Jan 19
Utility
Detecting an abnormal event while data storage equipment is in transit
5 Dec 23
Techniques are directed to detecting an abnormal event while data storage equipment is in transit.
Girish Sheelvant, Natasha Gaurav, Himabindu Tummala, Gregory W. Lazar, Scott E. Joyce
Filed: 26 Jul 19
Utility
Method, device, and computer program product for rebuilding storage system
5 Dec 23
Techniques reconstruct a storage system.
Huijuan Fan, Chi Chen
Filed: 5 Feb 21
Utility
Data read method, data storage method, electronic device, and computer program product
5 Dec 23
Embodiments of the present disclosure relate to a data read method, a data storage method, an electronic device, and a computer program product.
Chenxi Hu, Sanping Li, Zhen Jia
Filed: 22 Nov 21
Utility
Intelligent metadata compression
5 Dec 23
Data segments and metadata segments to be stored in a storage system, where the data segments are deduplicated segments and each of the metadata segments includes a fingerprint for the corresponding data segment, for each of the metadata segments.
Sandeep Nirmale, Ramprasad Chinthekindi, Gobikrishnan Sundharraj, Rahul Goyal
Filed: 21 Apr 21
Utility
Virtual machine replication strategy based on predicted application failures
5 Dec 23
Data protection operations including replication operations that dynamically adapt a topology of replica virtual machines.
Bing Liu, Jehuda Shemer, Kfir Wolfson, Jawad Said
Filed: 19 May 20
Utility
Method, device, and program product for managing computing system
5 Dec 23
A method includes: acquiring a set of operations to be performed on multiple computing units in the computing system; determining, based on the set of operations, the state of the multiple computing units, and an allocation model, an allocation action for allocating the set of operations to the multiple computing units and a reward for the allocation action, wherein the allocation model describes an association relationship among a set of operations, the state of multiple computing units, the allocation action for allocating the set of operations to the multiple computing units, and the reward for the allocation action; receiving an adjustment for the reward in response to determining that a match degree between the reward for the allocation action and a performance index of the computing system after the allocation action is performed satisfies a predetermined condition; and generating, based on the adjustment, training data for updating the allocation model.
Zhen Jia, Zijia Wang
Filed: 18 Feb 21
Utility
Method, device, and computer program product for rebuilding data of a failed storage device in a storage system
28 Nov 23
Techniques manage a storage system.
Hongpo Gao, Jian Gao, Xinlei Xu
Filed: 16 Mar 20
Utility
Fast failover of a deduplicated file system through huge memory pages
28 Nov 23
A memory tier is established in a cluster system having a deduplicated file system.
Yong Zou, Rahul Ugale
Filed: 10 Jun 21
Utility
Automated creation of variable data storage environments for application testing
28 Nov 23
Described is a system for automated creation of various data storage environments for application testing.
Upanshu Singhal, Laharicharan Bejjanke, Sanjeev Kumar Lohchab, Syed Razi Rasool, Sowmya Devarahalli Nanjappa
Filed: 3 Jun 20
Utility
Storage array disk recovery
28 Nov 23
One or more aspects of the present disclosure relate to recovering at least one failed disk.
Kuolin Hua, Kunxiu Gao
Filed: 28 Jan 21
Utility
Vaulting data from a public cloud
28 Nov 23
Data moving micro-services are deployed to a public cloud and a cloud vault target (CVT).
Peter Marelas
Filed: 13 Jun 22
Utility
Managing lock information associated with a lock operation
28 Nov 23
Storage management techniques involve determining, if it is determined that lock information associated with a lock operation performed on an object is to be inserted into a storage device, a target digest for representing the lock information; determining whether an idle index not associated with a historical digest exists in an index array for indicating a plurality of storage positions in the storage device; and inserting, if it is determined that an idle index exists in the index array, the lock information into a target storage position in the plurality of storage positions by associating the target digest with the idle index.
Ming Zhang, Shuo Lv, Lei Gao
Filed: 23 Sep 20
Utility
System and method for consistency checks in cloud object stores using microservices
28 Nov 23
A microservice or serverless process consistency check process comprising locating all the necessary metadata and data objects in the cloud by storing the data objects in the cloud and synchronously mirroring the metadata, which is separately stored in local storage, to the cloud.
Shyam Burkule, Kalidas Balakrishnan, Ramprasad Chinthekindi
Filed: 3 Mar 22