4565 patents
Page 35 of 229
Utility
Fast object listing in geographically distributed data storage environment
10 Jan 23
The described technology is generally directed towards quasi-listing table entries that facilitate the efficient return of an object list in response to a query for relevant objects in a data storage system.
Grigorii Skripko, Mikhail Danilov
Filed: 7 Sep 21
Utility
Unlocking a device using multiple prints
10 Jan 23
In some examples, a computing device may display a user interface (UI) to configure a multiple print unlock.
Sathish Kumar Bikumala, Lakshmi Saroja Nalam, Apoorva Sharma
Filed: 13 Nov 19
Utility
Prioritizing patching of vulnerable components
10 Jan 23
Methods, apparatus, and processor-readable storage media for prioritizing patching of vulnerable components are provided herein.
Danny V. Dhillon, Charles W. Kaufman, Eric Baize
Filed: 24 Feb 20
Utility
Method, device, and computer program product for error evaluation
10 Jan 23
Embodiments of the present disclosure provide a method, device, and computer program product for error evaluation.
Fangyuan Lin, Xiaohui Wang, Hui Li, Li Yuan
Filed: 18 Feb 20
Utility
Efficient way to perform location SLO validation
10 Jan 23
A method, apparatus, and system for performing a Location SLO check based on a location scatter table is disclosed.
Ren Wang, Scott Quesnelle, Mengze Liao
Filed: 11 Jul 19
Utility
Continuous video generation from voice data
10 Jan 23
One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.
Seth Jacob Rothschild, Alex Robbins
Filed: 21 Jul 21
Utility
Generating shared authentication keys using network connection characteristics
3 Jan 23
The described technology is generally directed towards generating shared authentication keys using network connection characteristics.
Venkata L. R. Ippatapu, Kenneth Dorman
Filed: 27 Aug 19
Utility
Smart compressor based on adaptive CPU/QAT scheduling method
3 Jan 23
A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware accelerator is disclosed.
Bing Liu, Tao Chen, Wei Lin, Yong Zou
Filed: 30 Sep 19
Utility
Encapsulated FICON communication
3 Jan 23
Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system.
Douglas E. LeCrone, Jeffrey L. Jones
Filed: 28 May 20
Utility
Method for managing artificial intelligence application, device, and program product
3 Jan 23
The present disclosure relates to a method for managing an artificial intelligence (AI) application, a device, and a program product.
Qiang Chen, Jiacheng Ni, Jinpeng Liu, Zhen Jia
Filed: 12 Oct 20
Utility
Latching mechanism
3 Jan 23
A latching mechanism includes a body having a trip-latch with a protruding portion that protrudes from the body, a release button coupled to a release shaft disposed inside the body, and a holding edge disposed on the release shaft.
Jeffrey Michael Lewis
Filed: 22 May 20
Utility
Array driven fabric performance notifications for multi-pathing devices
3 Jan 23
A host device is configured to communicate over a network with a storage system.
Peniel Charles, Gopinath Marappan, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 30 Nov 20
Utility
Techniques for software recovery and restoration
3 Jan 23
Techniques for rebooting a node may include: performing first processing that fails to reboot the node using a primary storage device of the node; responsive to the first processing failing to reboot the node using the primary storage device of the node, performing second processing that reboots the node using a secondary storage device of the node and executes a recovery operating system of the secondary storage device; determining, by the recovery operating system executing first code, whether the primary storage device of the node meets one or more criteria indicating that the primary storage device is faulty or defective; and responsive to determining the primary storage device of the node meets the one or more criteria, performing third processing that restores the primary storage device using the secondary storage device.
Roko Peros, Kenneth D. Lee, Peter J. McCann
Filed: 22 Sep 20
Utility
Tracking application programming interface requests in a cloud computing system
3 Jan 23
Techniques are provided for tracking application programming interface (API) requests in a cloud computing environment.
Scott E. Joyce, Yingying Wang Martin, Dan Yuan
Filed: 31 Jan 20
Utility
Leveraging sentiment in data protection systems
3 Jan 23
Systems and methods for providing data protection operations including cyber-threat protection operations.
Amihai Savir, Assaf Natanzon, Avitan Gefen
Filed: 19 Jul 19
Utility
Automated data routing in a data confidence fabric
3 Jan 23
Routing data in a data confidence fabric.
Stephen J. Todd
Filed: 24 Jun 20
Utility
Reducing storage required for an indexing structure through index merging
3 Jan 23
A method includes extracting variable length strings from text data, associating the extracted strings with indexes in an indexing structure that maintain identifiers for instances of the strings in the text data, selecting a set of the strings having corresponding indexes whose size exceeds a threshold size value, and determining whether to merge a first index corresponding to a first string with a second index corresponding to a second string, the second string being a sub string of the first string, wherein the determination is based at least in part on a comparison of a first size of the first index and a second size of the second index.
Kevin J. Arunski, Sashka T. Davis
Filed: 23 Oct 18
Utility
Identifying allocated blocks in a storage system
27 Dec 22
Techniques are used for identifying allocated blocks in a storage system.
Ashok Tamilarasan, Philippe Armangau, Vamsi K. Vankamamidi, Samuel L. Mullis, II
Filed: 30 Apr 21
Utility
Maintaining replication consistency during distribution instance changes
27 Dec 22
An apparatus comprises a source system comprising a distribution layer, a management component and a plurality of replication components.
Adi Bar Shalom, Zeev Shusterman, Lior Zilpa, German Goft, Oren Ashkenazi
Filed: 5 May 21
Utility
Dual cast mirroring from host devices
27 Dec 22
Mirrored volatile memory in a storage system is configured with a dual cast region of addresses.
Jason J Duquette, James M Guyer, Thomas Mackintosh, Earl Medeiros
Filed: 11 Aug 21