4565 patents
Page 40 of 229
Utility
Employing triggered retention in an ordered event stream storage system
29 Nov 22
Retention of events of an ordered event stream according to at least one triggered retention policy is disclosed.
Mikhail Danilov, Igor Medvedev
Filed: 30 Sep 20
Utility
Dynamic modification of IO shaping mechanisms of multiple storage nodes in a distributed storage system
29 Nov 22
At least one processing device is configured to detect a failure event impacting at least a first storage node of a plurality of storage nodes of a distributed storage system, and responsive to the detected failure event, to modify an input-output (IO) shaping mechanism in each of the storage nodes in order to at least temporarily reduce a total number of IO operations that are concurrently processed in the distributed storage system.
Alex Soukhman, Lior Kamran
Filed: 8 Jun 20
Utility
n3c3iccur649n45jz6632czohhzychvbox1xyyyw xa8156danyld
29 Nov 22
Techniques manage data of a Redundant Array of Independent Disks (RAID).
Jianbin Kang, Jibing Dong, Hongpo Gao
Filed: 25 Sep 19
Utility
jybjksy4x520b7bg2eq5g4tw1g8jae1crurw0s8s9vwns
29 Nov 22
Snapshots of a first logical storage unit (LSU) (R1) on a first storage system (A1) may be taken while replication is inactive between A1 and a second storage system (A2), such that these outstanding snapshots are not replicated to a second replica LSU (R2) on A2.
Bhaskar Bora, Mark J. Halstead, Jeffrey Wilson
Filed: 22 Apr 21
Utility
r7t7r7jeopu4zuofacmcitnlk2ns7c5jbkemouu 3z3y
29 Nov 22
Embodiments are described for a heuristic configuration selection process as part of or accessible by the backup management process.
Dinesh Kumar, Anand Reddy
Filed: 6 May 21
Utility
9g34yagrpiqq7yb5ib3p6v46c xf
29 Nov 22
Embodiments provide for a primary storage array having multiple storage tiers.
Stephen Smaldone, Ian Wigmore, Arieh Don
Filed: 29 Sep 16
Utility
8dd yomubnt03eqg2ri21zxlbq
29 Nov 22
Reducing backup data by providing a data protection target for storing content data from clients running operating system and applications, and a common data protection target (CDPT) separate from the data protection target for storing Gold image data for the operating system and applications.
Mark Malamut, Stephen Smaldone
Filed: 17 Dec 20
Utility
k90fmqxcxu9zk226n3xpt8s8
29 Nov 22
A data protection application creates backups of assets.
James Morton, Ming Zhang, Lihui Su, Gerald Jourdain
Filed: 23 Jun 20
Utility
393u0epeb0 qhr31jrax7se682b84ax6yulaa
29 Nov 22
Methods and systems for data backup are described.
Pravin Kumar AshokKumar, Sunder Ramesh Andra
Filed: 10 Oct 19
Utility
2zsv7m2yrp3cvdvyp fc5dr0ukm8hn7bis
29 Nov 22
In general, the invention relates to a method for backing up data.
Navneet Upadhyay, Shelesh Chopra
Filed: 5 Feb 20
Utility
mdo33vj wln0q03x98403
29 Nov 22
A data protection system configured to backup a time series database is provided.
Kfir Wolfson, Assaf Natanzon, Jehuda Shemer
Filed: 25 Feb 21
Utility
xsic o6ghvq8i3t8obm7z5xhkjxby0n
29 Nov 22
Embodiments of a compliance service that will enable users be compliant with all regulatory, industry processes and business needs at all times.
Assaf Natanzon, Yossef Saad
Filed: 26 Apr 18
Utility
qn55xkdilim3flq25m8cy7c2
29 Nov 22
Embodiments for enabling snapshot backups in a global name space of a cluster network, by representing the name space of cluster network in an MTree, storing data files organized in a B+ Tree format on one or more data nodes, storing name specific information of the data files in a B+ Tree format in a meta node, wherein a B+ Tree of the meta node accesses each corresponding B+ Tree in each of the one or more data nodes.
George Mathew, Abhishek Rajimwale, Charles Hickey, Murthy V Mamidi
Filed: 28 Feb 20
Utility
r8j7tutb9e3ercw8euqfsnp5spdg6s4q1ykflea2scjjf
29 Nov 22
Application discovery from access patterns is disclosed.
Stephen D. Smaldone, Arieh Don, Owen Martin
Filed: 20 Mar 20
Utility
ik6u5 e4gtz9bh0iiz8687f1qfzazoua4rb
29 Nov 22
Embodiments of the present disclosure relate to a method for storage management, an electronic device, and a computer program product.
Qin Liu, Lanjun Liao
Filed: 14 Dec 20
Utility
lyejkjjejayo23d73kcn1g0rf429rgmi8aupgrwqnl6mpw
29 Nov 22
A backup management system for providing data integrity services to an application host that hosts an application that uses application data includes storage for storing threshold values for creating an application backup and a processor programmed to monitor: a rate of change associated with the application data, and an input-output rate of the application data; make a determination, based on the threshold values, the rate of change, and the input-output rate, that an unscheduled backup for the application is to be generated; obtain a micro-backup for the application in response to the determination; and obtain a restoration ready backup for the application using the micro-backup and at least one previously generated backup.
Pradeep Viveki, Mahantesh Murageppa Ambaljeri, Mahesh Reddy Appireddygari Venkataramana
Filed: 9 Apr 21
Utility
kzz2cy4aacmf1yk5r ekm1sk1a
29 Nov 22
Disclosed herein are techniques for generating fractional checkpoints on a distributed file system by snapshotting subcomponents referred to as “file sets.” The techniques include capturing a present time; calculating from configured parameters a future wakeup time for a subsequent set of checkpoints from the present time; walking a database of meta file set objects to locate at least one meta file set object; calculating a retention period for a snapshot that is being created; and generating a global data-less snapshot for the meta file set object and remote data file set objects associated with the meta file set object, and then repeating the process for subsequent file set objects in the database.
Charles Hickey, Murthy Mamidi, George Mathew, Sirisha Kapoor
Filed: 30 Dec 19
Utility
s9fm1ye06acgfq1bkgn5go 25bxe0j1vjucylap4je2afp2l85z
29 Nov 22
The described technology is generally directed towards recovering a chunk (or similar block of data) when the chunk is erasure coded into fragments, and recovery fragments need to be obtained from geographically distributed sites.
Mikhail Danilov, Konstantin Buinov
Filed: 29 Dec 20
Utility
njpc48igauzkirpq7t73t2rdr6i3ro3v8amd5lh4ga3qat45u
29 Nov 22
A method and system for leveraging file-based backups to facilitate bare-metal recovery (BMR) and/or system-state recovery (SSR) operations.
Sunil Yadav, Shelesh Chopra
Filed: 27 Jul 21
Utility
stesuf0ll1gkvd0lswi8faa3dg309elip3na5 0v
29 Nov 22
Methods, apparatus, and processor-readable storage media for artificial intelligence-based redundancy management are provided herein.
Parminder Singh Sethi, Bijan K. Mohanty, Hung T. Dinh
Filed: 24 Jun 20