4565 patents
Page 36 of 229
Utility
Automatically predicting device failure using machine learning techniques
27 Dec 22
Methods, apparatus, and processor-readable storage media for automatically predicting device failure using machine learning techniques are provided herein.
Parminder Singh Sethi, Hung T. Dinh, Bijan K. Mohanty
Filed: 27 Mar 20
Utility
Automation and optimization of data recovery after a ransomware attack
27 Dec 22
In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities.
Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
Filed: 21 Aug 20
Utility
qib2ofl59jsazbqcl2mqolus93uhwnt
27 Dec 22
An apparatus includes a processing device configured to identify a snapshot policy for creating a snapshot lineage comprising snapshots of a storage volume comprising data stored on a storage system, the snapshot lineage comprising (i) a local snapshot lineage stored on the storage system and (ii) at least one cloud snapshot lineage stored on cloud storage.
Mark Aldred, Michael Anthony, Shanmuga Anand Gunasekaran, Shane Sullivan, Mithun Mahendra Varma, Anurag Bhatnagar
Filed: 10 Mar 20
Utility
re7weicj1fk0g4vvdxwcg9ktuqkfxx72y2mngg3x8ru1plk3lwydgot3ii
27 Dec 22
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Shivasharan Dalasanur Narayana Gowda, Sunil Kumar, Prashant Pokharna
Filed: 15 Dec 20
Utility
815i4s3sj87ug513x64ix70cphaw1ha5lpudu6lf8ufqaar7f
27 Dec 22
Facilitating antivirus scan filing locking based on cluster lock mechanism in distributed file systems is provided herein.
David Leimbach, Douglas Kilpatrick
Filed: 20 Oct 20
Utility
yeaz41dcyitf8ngdeisez90rucu13wfwl052fabg
27 Dec 22
One example method includes checking an asset against an Inclusion List and/or an Exclusion List to determine if the asset is permitted to contribute data, generated by the asset, to an enterprise data confidence fabric, when the asset is present on the Inclusion List, or not present on the Exclusion List, designating the asset as a trusted asset and appending the data generated by the asset to a ledger of the enterprise data confidence fabric, updating a ledger content index to reflect the data that was appended to the ledger, and annotating the data generated by the asset with trust metadata.
Stephen J. Todd, Nicole Reineke
Filed: 30 Sep 20
Utility
a5r3clmbnzy khp9ldir97wf6c3w4uobgu
27 Dec 22
Methods, apparatus, and processor-readable storage media for processing order experience data across multiple data structures are provided herein.
Aditya Aggarwal, Abhishek Mishra
Filed: 29 Oct 18
Utility
9w20d1gxof1rlzufn4y1pihjqtcll1aklwdf7r0sfw2hqammqhdz8h
27 Dec 22
One example method includes collecting data concerning operation of a vehicle, and the collecting is performed by one or more sensors of the vehicle, storing the data in the data storage locally at the vehicle, automatically caching the stored data in the cache memory locally at the vehicle, and uploading the cached data to a node over a THz wireless link.
Seán Ahearne, Liam Murphy
Filed: 29 Jun 20
Utility
djdbkoh8ugjjd58nfwu834g7krycux4okmfmw6bahxc9lip
27 Dec 22
The present disclosure relates to a method, a device, and a computer program product for abnormality detection.
Fei Peng, Kaikai Jia
Filed: 9 Oct 20
Utility
tlskbme2w4ozkjdr62m4rmgmi04hpsqi6od81gcblu74fw3tn036vjocgdr
20 Dec 22
A storage system comprises a plurality of storage devices that are configured to store data pages.
Lior Kamran, Amitai Alkalay
Filed: 21 Oct 20
Utility
epkyupibpkhzkf7ccqk2oyaqplvbvgvdmr6sh00tph0kpps7j9hwjx5
20 Dec 22
Techniques described herein relate to a method for deploying workflows with data management services.
Shelesh Chopra, Hemant Ramesh Gaikwad, Rahul Deo Vishwakarma
Filed: 27 Jul 21
Utility
hl11igc7orh64 q2p4sdnwxukjvg91cxkk3eqcqnbb9l
20 Dec 22
A system for providing backup services for limited-access user data includes persistent storage for storing a user data visualization enhanced user data backup and a manager.
Shelesh Chopra, Sunil Yadav, Amarendra Behera, Himanshu Arora, Tushar Dethe, Sapna Chauhan, Anjana Rao, Deependra Pratap Singh, Jigar Premajibhai Bhanushali, Ravi V. Chitloor
Filed: 28 May 20
Utility
7dsvn3ob1e3rr5pfo5u6
20 Dec 22
On-the-fly point-in-time recovery operations are disclosed.
Tomer Kushnir, Jehuda Shemer, Jawad Said, Kfir Wolfson
Filed: 21 May 20
Utility
qfbw6rbuxhsne5knvddi3hnghfwdp1ntwu08lje5 rthc6
20 Dec 22
On-the-fly point-in-time recovery operations are disclosed.
Jehuda Shemer, Kfir Wolfson, Tomer Kushnir, Jawad Said
Filed: 24 Jun 20
Utility
c9bxe9xgh2j4n2f2w6j8bsu2eqdp0v
20 Dec 22
A method of capturing a fractional snapshot of a distributed file system includes receiving a snapshot request to generate a factional snapshot of a file system.
Charles J. Hickey, Murthy V. Mamidi, Geetha Shendge, Sai Chivukula, Xiaohong W. Wang, George Mathew, Abhishek Rajimwale
Filed: 14 Oct 20
Utility
ytdyocgc1ghexe9w1px6 q3sv2142ry9ue3
20 Dec 22
Described is a system for providing quick and efficient identification of a desired version of content from an editing history of the content.
James Morton, Lihui Su, Gerald Jourdain, Ming Zhang
Filed: 29 Jun 20
Utility
l0u1aemkppnwqtjrkql3rp34yw
20 Dec 22
Tiers of compression algorithms may be determined using compression information collected regarding compression ratios achieved for data sets using compression algorithms.
Owen Martin, Alesia A. Tringale
Filed: 1 Aug 19
Utility
vxf1 rhctrei9k63fimikj
20 Dec 22
A serverless application center is provided for multi-cloud deployment of serverless applications.
Ruixue Zhang, Jaumir Valença da Silveira Junior
Filed: 30 Sep 19
Utility
a6nrbxfej 6u8basov3im2z3mu0hwwwjiow61mvylkg6cbf7bratd8mcq49g
13 Dec 22
An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor and a memory, with the processor coupled to the memory.
Sanjib Mallick, Amit Pundalik Anchi
Filed: 14 Jul 21
Utility
asyu6o512qrvjf3pzplrkcyxx0ox7mjtk2
13 Dec 22
Data may be replicated from a host storage system to a target storage system.
Benjamin Yoder, William R. Stronge
Filed: 28 May 20