4565 patents
Page 35 of 229
Utility
Fast object listing in geographically distributed data storage environment
10 Jan 23
The described technology is generally directed towards quasi-listing table entries that facilitate the efficient return of an object list in response to a query for relevant objects in a data storage system.
Grigorii Skripko, Mikhail Danilov
Filed: 7 Sep 21
Utility
Unlocking a device using multiple prints
10 Jan 23
In some examples, a computing device may display a user interface (UI) to configure a multiple print unlock.
Sathish Kumar Bikumala, Lakshmi Saroja Nalam, Apoorva Sharma
Filed: 13 Nov 19
Utility
9fboh9ekhecy4vxj2fvp7vdvg25aysmf9a5p6s6
10 Jan 23
Methods, apparatus, and processor-readable storage media for prioritizing patching of vulnerable components are provided herein.
Danny V. Dhillon, Charles W. Kaufman, Eric Baize
Filed: 24 Feb 20
Utility
p3nmwb7fqr4o29qerr8lc6t h4jo0sbfag4
10 Jan 23
Embodiments of the present disclosure provide a method, device, and computer program product for error evaluation.
Fangyuan Lin, Xiaohui Wang, Hui Li, Li Yuan
Filed: 18 Feb 20
Utility
589b7awc579sky3n43khbf3154g585w4qj0q n5t26n96stzq467
10 Jan 23
A method, apparatus, and system for performing a Location SLO check based on a location scatter table is disclosed.
Ren Wang, Scott Quesnelle, Mengze Liao
Filed: 11 Jul 19
Utility
2vof893lih0vexirsxh4bzug81t jfznt8c
10 Jan 23
One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.
Seth Jacob Rothschild, Alex Robbins
Filed: 21 Jul 21
Utility
zclaupihf43t4ou400ssqmhcm11idu6wj43oppefwcdkeui244f1
3 Jan 23
The described technology is generally directed towards generating shared authentication keys using network connection characteristics.
Venkata L. R. Ippatapu, Kenneth Dorman
Filed: 27 Aug 19
Utility
5zfydy2as2f2h2qc2s izo3
3 Jan 23
A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware accelerator is disclosed.
Bing Liu, Tao Chen, Wei Lin, Yong Zou
Filed: 30 Sep 19
Utility
h354odasr3 fhp8180p7i1zds66yzgs3l
3 Jan 23
Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system.
Douglas E. LeCrone, Jeffrey L. Jones
Filed: 28 May 20
Utility
2awxldi4p6ejvlsfctg7lwh6 rdlw
3 Jan 23
The present disclosure relates to a method for managing an artificial intelligence (AI) application, a device, and a program product.
Qiang Chen, Jiacheng Ni, Jinpeng Liu, Zhen Jia
Filed: 12 Oct 20
Utility
oagryx297zqoaakodrms86q2x66c ym1dejpuxvjq1sv82t4rh3
3 Jan 23
A latching mechanism includes a body having a trip-latch with a protruding portion that protrudes from the body, a release button coupled to a release shaft disposed inside the body, and a holding edge disposed on the release shaft.
Jeffrey Michael Lewis
Filed: 22 May 20
Utility
43p77sxm4uvvpzonwewna9e73v5y8qpfxa7la6q74t xj4
3 Jan 23
A host device is configured to communicate over a network with a storage system.
Peniel Charles, Gopinath Marappan, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 30 Nov 20
Utility
1cdjfe5vmscnovjecwj8384q6yjm8x7sj5rpgcy 9m0jzwn8k
3 Jan 23
Techniques for rebooting a node may include: performing first processing that fails to reboot the node using a primary storage device of the node; responsive to the first processing failing to reboot the node using the primary storage device of the node, performing second processing that reboots the node using a secondary storage device of the node and executes a recovery operating system of the secondary storage device; determining, by the recovery operating system executing first code, whether the primary storage device of the node meets one or more criteria indicating that the primary storage device is faulty or defective; and responsive to determining the primary storage device of the node meets the one or more criteria, performing third processing that restores the primary storage device using the secondary storage device.
Roko Peros, Kenneth D. Lee, Peter J. McCann
Filed: 22 Sep 20
Utility
6rftbhs2vhzdeqbmfpase vo95t7irw3hvh6b81lagt33y1oznykv
3 Jan 23
Techniques are provided for tracking application programming interface (API) requests in a cloud computing environment.
Scott E. Joyce, Yingying Wang Martin, Dan Yuan
Filed: 31 Jan 20
Utility
a8xbtf3tnip582bvub52 sttorzsw1mmffk1o3touyq6vttyfmlzg9f0kn
3 Jan 23
Systems and methods for providing data protection operations including cyber-threat protection operations.
Amihai Savir, Assaf Natanzon, Avitan Gefen
Filed: 19 Jul 19
Utility
d9ju7zw636h6z1kcldt7m8oyxq2xd9gze68cv6
3 Jan 23
Routing data in a data confidence fabric.
Stephen J. Todd
Filed: 24 Jun 20
Utility
25f1pxw27cvoqawehk3r1jjq0jtnhvdg263y7q5h2 cg1g1k2h
3 Jan 23
A method includes extracting variable length strings from text data, associating the extracted strings with indexes in an indexing structure that maintain identifiers for instances of the strings in the text data, selecting a set of the strings having corresponding indexes whose size exceeds a threshold size value, and determining whether to merge a first index corresponding to a first string with a second index corresponding to a second string, the second string being a sub string of the first string, wherein the determination is based at least in part on a comparison of a first size of the first index and a second size of the second index.
Kevin J. Arunski, Sashka T. Davis
Filed: 23 Oct 18
Utility
nln3tpv1jlg41bhmns6q3ri9h0fgowvf3qdu 7j4179
27 Dec 22
Techniques are used for identifying allocated blocks in a storage system.
Ashok Tamilarasan, Philippe Armangau, Vamsi K. Vankamamidi, Samuel L. Mullis, II
Filed: 30 Apr 21
Utility
5j790vsbcdlpmjxfw97d0ovnivr7f5zif0nlovm5m2piomig 4xljq2
27 Dec 22
An apparatus comprises a source system comprising a distribution layer, a management component and a plurality of replication components.
Adi Bar Shalom, Zeev Shusterman, Lior Zilpa, German Goft, Oren Ashkenazi
Filed: 5 May 21
Utility
vq09sklu6ppyx3srnpprn2awhcasuggjr7mb5fo45wbqj yxwmnhyfc5
27 Dec 22
Mirrored volatile memory in a storage system is configured with a dual cast region of addresses.
Jason J Duquette, James M Guyer, Thomas Mackintosh, Earl Medeiros
Filed: 11 Aug 21