4565 patents
Page 31 of 229
Utility
Snapshot performance optimizations
14 Feb 23
Techniques for creating and using snapshots may include: receiving a request to create a new snapshot of a source object; determining whether a first generation identifier associated with the source object matches a second generation identifier associated with a base snapshot of the source object; determining whether the source object has been modified since the base snapshot was created; and responsive to determining the first generation identifier matches the second generation identifier and also determining that the source object has not been modified since the base snapshot was created, associating the new snapshot with the base snapshot thereby indicating that the new snapshot and the base snapshot have matching content and denote a same point in time copy of the source object.
Nagapraveen Veeravenkata Seela, Alan L. Taylor, Nagasimha G. Haravu, Michael C. Brundage
Filed: 19 Jan 21
Utility
Integrity-preserving cold migration of virtual machines
14 Feb 23
A method includes identifying a source virtual machine to be migrated from a source domain to a target domain, extracting file-in-use metadata and shared asset metadata from virtual machine metadata of the source virtual machine, and copying one or more files identified in the file-in-use metadata to a target virtual machine in the target domain.
Vaideeswaran Ganesan, Suren Kumar, Vinod Durairaj
Filed: 13 Feb 20
Utility
tphu6bafw32ftfdge19di8qg67y1z wxzgjb6rlbrgc2uhj45y1h
14 Feb 23
One example method includes receiving, from a microservice, a service request that identifies a service needed by the microservice, and an API of an endpoint that provides the service, evaluating the service request to determine whether the service request conforms to a policy, when the service request has been determined to conform with the policy, evaluating the endpoint to determine if endpoint performance meets established guidelines, and when it is determined that the endpoint performance does not meet the established guidelines, identifying an alternative endpoint that meets the established guidelines and that provides the requested service.
Aman Wangde, Victor Fong, Malini Bhattacharjee, Xuebin He, Kenneth Durazzo
Filed: 12 Mar 21
Utility
fhw5f5ywu uixppb2ufw5krzpv0w2
14 Feb 23
A method for rebuilding data, comprising: obtaining, from a metadata node, a source file data layout for a source file and a target file data layout for a target file, wherein the source file is associated with a degraded mapped RAID group and the target file is associated with a new mapped RAID group; generating, by the client application node, a plurality of input/output (I/O) requests to read a portion of the data associated with the source file using the source file data layout; obtaining, in response to the plurality of I/O requests, the portion of the data associated with the source file; rebuilding a second portion of the data associated with source file using the portion of the data; and initiating, storage of at least the second portion of the data associated with the source file in the storage pool using the target file data layout.
Jean-Pierre Bono, Marc A. De Souter, Adrian Michaud, Qin Xin
Filed: 29 Apr 21
Utility
i0vj58rgtkc8hkx3s qfykh7w6c5
14 Feb 23
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations.
Ramprasad Chinthekindi, Philip Shilane, Abhinav Duggal
Filed: 3 May 19
Utility
wfxjvgr91oclfegvt 1jb1ab
14 Feb 23
Embodiments for a storage classifier that provides recommendations to a backup server for storage targets among a plurality of disparate target storage types.
Arun Murti, Adam Brenner, Mark Malamut
Filed: 15 Oct 20
Utility
m3m156or711ymnzt8we2hhf096r bmd1cjm21e
14 Feb 23
Techniques are disclosed for scheduling artificial intelligence model partitions for execution in an information processing system.
Jin Li, Jinpeng Liu, Christopher S. MacLellan
Filed: 12 Feb 20
Utility
gbeanvcbqi1n49x9ef9c46b
14 Feb 23
A request manager analyzes API calls from a client to a host application for state and performance information.
Aidan Hally, Paul Mcsweeney, Kenneth Byrne
Filed: 10 Feb 20
Utility
v24i2n x4m78o9u37e6d4
14 Feb 23
A method for managing data includes obtaining, by a first data node, a notification, wherein the first data node is associated with a first power zone group (PZG), and in response to the notification: selecting a second data node, wherein the second data node is not associated with the first PZG, sending a data processing request to the second data node, obtaining a response based on the data processing request, wherein the response specifies a confirmation by the second data node to service the data processing request, storing a ledger entry in a ledger service that indicates the confirmation, and initiating a data transfer based on the data processing request, wherein the first data node is associated with the PZG based on a primary power source of the first data node.
Nicole Reineke, James Robert King, Robert Anthony Lincourt, Jr.
Filed: 13 Dec 19
Utility
w57r3suwkscy4ze6ss4s esllappvu
14 Feb 23
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 2 Jun 22
Utility
gjvusmnw43 7kxp915z6x
7 Feb 23
Techniques are provided for managing host connectivity to a data storage system.
Rivka Matosevich, Doron Tal, Yakov Gerlovin
Filed: 30 Nov 20
Utility
ahpnt8fx0a9nxvdc93lxi
7 Feb 23
A method of managing extents of a file system having a protection pool includes collecting and initializing physical extent manager (PEM) metadata, using a PEM daemon thread.
Paul Nehse, Michael Thiels, Devendra Kulkarni
Filed: 6 May 21
Utility
rgsuh2xb6i0jx 44nypcmd46qaxgbr4udvt8
7 Feb 23
A synchronous destage process is used to move data from shared global memory to back-end storage resources.
Lixin Pang, Rong Yu, Peng Wu, Shao Hu, Mohammed Asher Vt
Filed: 19 Jan 21
Utility
32zoxryoqqc awdtbw9rjd3kre1m1gmgf829q21kgsx52tkmhoa0s1q
7 Feb 23
One example method includes discovering an application topology, discovering relationships between microservices that are elements of the application topology, ranking the microservices, identifying one or more of the microservices as a persistency microservice, selecting one or more persistency microservices for backup, and defining a backup policy based on the microservice relationships, the microservice rankings, and the selected persistent microservices.
Michael Rhodes, Assaf Natanzon, Luay Al-Alem, Antony Bett
Filed: 3 Feb 21
Utility
l440whemqdxggwufbxy2l1lqda340bjnw7ewokny5os560lo7r7pp
7 Feb 23
An apparatus comprises at least one processing device configured to select a snapshot lineage comprising one or more snapshots of a storage volume comprising data stored on one or more storage devices of a storage system, the snapshot lineage comprising at least one cloud snapshot lineage, the at least one cloud snapshot lineage comprising at least a subset of the one or more snapshots of the storage volume that have been copied to cloud storage of at least one cloud external to the storage system.
Michael Anthony, Mark Aldred, Shane Sullivan, Shanmuga Anand Gunasekaran
Filed: 10 Mar 20
Utility
tz14cfsaqksubor0xbge4jlr6wx58xixxuknwwwmvffltikezabawpa2
7 Feb 23
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations.
Abhinav Duggal, Ramprasad Chinthekindi, Philip Shilane
Filed: 26 Apr 19
Utility
r4qhvyojzoo5l67samzfb7
7 Feb 23
Allocating CPU cores to a thread running in a system that supports multiple concurrent threads includes training a first model to optimize core allocations to threads using training data that includes performance data, initially allocating cores to threads based on the first model, and adjusting core allocations to threads based on a second model that uses run time data and run time performance measurements.
Jon I. Krasner, Edward P. Goodwin
Filed: 31 Jul 19
Utility
nyt9tm478i799hk683xp26anhzi2d3y7e8wdxqtya
7 Feb 23
Techniques for processing data may include: receiving a data block stored in a data set, wherein a hash value is derived from the data block; determining, in accordance with selection criteria, whether the hash value is included in a subset; responsive to determining the hash value is included in the subset, performing processing that updates a table in accordance with the hash value and the data set, and determining, in accordance with the information in the table, whether to perform deduplication processing for the data block to determine whether the data block is a duplicate of another stored data block.
Anton Kucherov, David Meiri
Filed: 13 Mar 20
Utility
89w8c92ncf5lsrxazvyt pr
31 Jan 23
Using high speed data transfer protocol to transfer data between a host and a storage system includes determining if a portion of data is a candidate for being transferred using the high speed data transfer protocol if the portion is not a candidate for high speed data transfer, transferring the data using a relatively low speed data transfer protocol if the portion is a candidate for high speed data transfer, attempting to transfer the data using the high speed data transfer protocol, and if transferring the data using the high speed data transfer protocol is unsuccessful, transferring the data using the relatively low speed data transfer protocol.
Douglas E. LeCrone, Paul A. Linstead
Filed: 18 Nov 19
Utility
cqc7ios5 jsudkaegiprsud7dgj1zapld7v56
31 Jan 23
Cache slots on a storage system may be shared between entities processing write operations for logical storage unit (LSU) tracks and entities performing remote replication for write operations for the LSU tracks.
Bhaskar Bora, Benjamin Yoder
Filed: 30 Oct 20