4565 patents
Page 31 of 229
Utility
Snapshot performance optimizations
14 Feb 23
Techniques for creating and using snapshots may include: receiving a request to create a new snapshot of a source object; determining whether a first generation identifier associated with the source object matches a second generation identifier associated with a base snapshot of the source object; determining whether the source object has been modified since the base snapshot was created; and responsive to determining the first generation identifier matches the second generation identifier and also determining that the source object has not been modified since the base snapshot was created, associating the new snapshot with the base snapshot thereby indicating that the new snapshot and the base snapshot have matching content and denote a same point in time copy of the source object.
Nagapraveen Veeravenkata Seela, Alan L. Taylor, Nagasimha G. Haravu, Michael C. Brundage
Filed: 19 Jan 21
Utility
Integrity-preserving cold migration of virtual machines
14 Feb 23
A method includes identifying a source virtual machine to be migrated from a source domain to a target domain, extracting file-in-use metadata and shared asset metadata from virtual machine metadata of the source virtual machine, and copying one or more files identified in the file-in-use metadata to a target virtual machine in the target domain.
Vaideeswaran Ganesan, Suren Kumar, Vinod Durairaj
Filed: 13 Feb 20
Utility
Dynamic service mesh
14 Feb 23
One example method includes receiving, from a microservice, a service request that identifies a service needed by the microservice, and an API of an endpoint that provides the service, evaluating the service request to determine whether the service request conforms to a policy, when the service request has been determined to conform with the policy, evaluating the endpoint to determine if endpoint performance meets established guidelines, and when it is determined that the endpoint performance does not meet the established guidelines, identifying an alternative endpoint that meets the established guidelines and that provides the requested service.
Aman Wangde, Victor Fong, Malini Bhattacharjee, Xuebin He, Kenneth Durazzo
Filed: 12 Mar 21
Utility
Methods and systems parallel raid rebuild in a distributed storage system
14 Feb 23
A method for rebuilding data, comprising: obtaining, from a metadata node, a source file data layout for a source file and a target file data layout for a target file, wherein the source file is associated with a degraded mapped RAID group and the target file is associated with a new mapped RAID group; generating, by the client application node, a plurality of input/output (I/O) requests to read a portion of the data associated with the source file using the source file data layout; obtaining, in response to the plurality of I/O requests, the portion of the data associated with the source file; rebuilding a second portion of the data associated with source file using the portion of the data; and initiating, storage of at least the second portion of the data associated with the source file in the storage pool using the target file data layout.
Jean-Pierre Bono, Marc A. De Souter, Adrian Michaud, Qin Xin
Filed: 29 Apr 21
Utility
Garbage collection for a deduplicated cloud tier using functions
14 Feb 23
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations.
Ramprasad Chinthekindi, Philip Shilane, Abhinav Duggal
Filed: 3 May 19
Utility
Automatic storage target recommendations using a storage classifier
14 Feb 23
Embodiments for a storage classifier that provides recommendations to a backup server for storage targets among a plurality of disparate target storage types.
Arun Murti, Adam Brenner, Mark Malamut
Filed: 15 Oct 20
Utility
Scheduling artificial intelligence model partitions based on reversed computation graph
14 Feb 23
Techniques are disclosed for scheduling artificial intelligence model partitions for execution in an information processing system.
Jin Li, Jinpeng Liu, Christopher S. MacLellan
Filed: 12 Feb 20
Utility
Processing rest API requests based on resource usage satisfying predetermined limits
14 Feb 23
A request manager analyzes API calls from a client to a host application for state and performance information.
Aidan Hally, Paul Mcsweeney, Kenneth Byrne
Filed: 10 Feb 20
Utility
Method and system for predicting resource reallocation in a power zone group
14 Feb 23
A method for managing data includes obtaining, by a first data node, a notification, wherein the first data node is associated with a first power zone group (PZG), and in response to the notification: selecting a second data node, wherein the second data node is not associated with the first PZG, sending a data processing request to the second data node, obtaining a response based on the data processing request, wherein the response specifies a confirmation by the second data node to service the data processing request, storing a ledger entry in a ledger service that indicates the confirmation, and initiating a data transfer based on the data processing request, wherein the first data node is associated with the PZG based on a primary power source of the first data node.
Nicole Reineke, James Robert King, Robert Anthony Lincourt, Jr.
Filed: 13 Dec 19
Utility
Data masking in a microservice architecture
14 Feb 23
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 2 Jun 22
Utility
Managing host connectivity to a data storage system
7 Feb 23
Techniques are provided for managing host connectivity to a data storage system.
Rivka Matosevich, Doron Tal, Yakov Gerlovin
Filed: 30 Nov 20
Utility
Method for managing extents of a system having a protection pool
7 Feb 23
A method of managing extents of a file system having a protection pool includes collecting and initializing physical extent manager (PEM) metadata, using a PEM daemon thread.
Paul Nehse, Michael Thiels, Devendra Kulkarni
Filed: 6 May 21
Utility
Synchronous destage of write data from shared global memory to back-end storage resources
7 Feb 23
A synchronous destage process is used to move data from shared global memory to back-end storage resources.
Lixin Pang, Rong Yu, Peng Wu, Shao Hu, Mohammed Asher Vt
Filed: 19 Jan 21
Utility
Smart dynamic restore for Kubernetes based applications
7 Feb 23
One example method includes discovering an application topology, discovering relationships between microservices that are elements of the application topology, ranking the microservices, identifying one or more of the microservices as a persistency microservice, selecting one or more persistency microservices for backup, and defining a backup policy based on the microservice relationships, the microservice rankings, and the selected persistent microservices.
Michael Rhodes, Assaf Natanzon, Luay Al-Alem, Antony Bett
Filed: 3 Feb 21
Utility
Generating configuration data enabling remote access to portions of a snapshot lineage copied to cloud storage
7 Feb 23
An apparatus comprises at least one processing device configured to select a snapshot lineage comprising one or more snapshots of a storage volume comprising data stored on one or more storage devices of a storage system, the snapshot lineage comprising at least one cloud snapshot lineage, the at least one cloud snapshot lineage comprising at least a subset of the one or more snapshots of the storage volume that have been copied to cloud storage of at least one cloud external to the storage system.
Michael Anthony, Mark Aldred, Shane Sullivan, Shanmuga Anand Gunasekaran
Filed: 10 Mar 20
Utility
Garbage collection for a deduplicated cloud tier using microservices
7 Feb 23
Systems and methods for performing data protection operations including garbage collection operations and copy forward operations.
Abhinav Duggal, Ramprasad Chinthekindi, Philip Shilane
Filed: 26 Apr 19
Utility
Allocating cores to threads running on one or more processors of a storage system
7 Feb 23
Allocating CPU cores to a thread running in a system that supports multiple concurrent threads includes training a first model to optimize core allocations to threads using training data that includes performance data, initially allocating cores to threads based on the first model, and adjusting core allocations to threads based on a second model that uses run time data and run time performance measurements.
Jon I. Krasner, Edward P. Goodwin
Filed: 31 Jul 19
Utility
Techniques for data deduplication
7 Feb 23
Techniques for processing data may include: receiving a data block stored in a data set, wherein a hash value is derived from the data block; determining, in accordance with selection criteria, whether the hash value is included in a subset; responsive to determining the hash value is included in the subset, performing processing that updates a table in accordance with the hash value and the data set, and determining, in accordance with the information in the table, whether to perform deduplication processing for the data block to determine whether the data block is a duplicate of another stored data block.
Anton Kucherov, David Meiri
Filed: 13 Mar 20
Utility
Using high speed data transfer protocol
31 Jan 23
Using high speed data transfer protocol to transfer data between a host and a storage system includes determining if a portion of data is a candidate for being transferred using the high speed data transfer protocol if the portion is not a candidate for high speed data transfer, transferring the data using a relatively low speed data transfer protocol if the portion is a candidate for high speed data transfer, attempting to transfer the data using the high speed data transfer protocol, and if transferring the data using the high speed data transfer protocol is unsuccessful, transferring the data using the relatively low speed data transfer protocol.
Douglas E. LeCrone, Paul A. Linstead
Filed: 18 Nov 19
Utility
Resolving cache slot locking conflicts for remote replication
31 Jan 23
Cache slots on a storage system may be shared between entities processing write operations for logical storage unit (LSU) tracks and entities performing remote replication for write operations for the LSU tracks.
Bhaskar Bora, Benjamin Yoder
Filed: 30 Oct 20